node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
3,986 | 9 | Zend_Technologies:zend technologies zend technologies ltd. world wide web infrastructure software company headquarters cupertino california u.s. technology center ramat gan tel aviv israel offices france italy germany company operations currently centered development products relating development deployment management php-based web applications including zend studio zend technologies founded andi gutmans zeev suraski along israeli graduates technion developed php initial creation rasmus lerdorf name zend combination suraski gutmans forenames zeev andi 1997 gutmans suraski rewrote parser php-fi originally written lerdorf resulting php 3 1998 redesigned parser completely named zend engine php 4 based first version zend engine 1999 company zend technologies formally established received initial funding israeli venture capital funds platinum neurone ventures walden israel doron gerstel experienced business executive recruited head company ceo 2000 jim jagielski hired cto us operations july 2004 zend technologies raised 8m series c funding established headquarters usa january 2005 intel capital sapphire ventures formerly sap ventures joined existing investors zend technologies june 2006 zend technologies received best startup software company award israeli venture association annual hi tech conference tel aviv award presented israeli prime minister ehud olmert august 2006 zend raised 20 million series funding february 2009 zend co-founder andi gutmans appointed chief executive officer previously serving company vp research development zend also recruited mark burton previously served evp worldwide sales mysql executive chairman october 2015 rogue wave software acquired zend shortly acquired co-founder andi gutmans left company february 2016 zend server web application server running managing php applications zend server comes built-in application monitoring application problem diagnostics caching optimization capabilities web-based administrator console zend server ’ installers native os rpm/deb/msi include tested php distribution zend framework out-of-the-box connectivity common databases java connectivity scalable php-integrated download server linux community edition zend server free complete php stack advertised company suited developing php applications running non-critical applications production zend server community edition supported linux windows iseries i5/os mac os x periodically updated zend starting zend server 7.0 free edition discontinued available paid upgrade zend platform product runs web server monitoring php applications reporting performance possible problems also offers php accelerator often confused free zend optimizer content caching solution including api partial page caching session clustering numerous management tools zend platform used conjunction zend studio remote debugging profiling php applications native server environment zend studio commercial proprietary integrated development environment ide php 2013 along zend server deployed 40,000 companies zend guard product prevent peeping php scripts zend also provides php certification test certifies people succeeding exam zend certified php engineers zce confused zend framework certification intended prove person fully qualified develop php web applications 10,000 zend certified engineers world either php 4 php 5 php 5.3 certifications help zend certified engineers gain employment zend lists persons passed zend php certification exam directory yellow pages php professionals also allow zces place zce logo personal web site/resume php mainly used web development language zce tests candidate variety skills necessary developing web applications php 5 certification exam covers although study guide contents topics consider order prepared exam use new extension php data object pdo layer access databases standard php library spl new set classes specially created manipulate objects sets arrays files zend considers required score pass test confidential well questions inform failing candidates topics made fail known candidates must pass every topic pass test whole believed required score per topic might 75–85 passing zend certification test every candidate gets listing zend certified directory lifetime free enables recruiters hire qualified certified php engineers zend engine heart php originally written andi gutmans zeev suraski first version zend engine shipped php4 zend sponsors developers actively contribute engine main development zend engine today comes contributors php project zend framework open-source object-oriented web application framework written php5 licensed new bsd license simple cloud api open-source php api accessing services multiple cloud vendors configuration changes alone project first project zend launched facilitate php development cloud apigility api builder designed simplify creation maintenance apis zend technologies visits events worldwide spread oss message 2005 zeev suraski delivered speech oss technical seminar organized open standard support organization sunwah pearl linux hong kong trade development council | [
2465,
3553,
899,
2372,
4997,
4198,
8644,
10020,
10413,
7022,
479
] | Test |
3,987 | 0 | Russell_Gray:russell gray russell david gray evolutionary biologist psychologist working applying quantitative methods study cultural evolution human prehistory worked professor university auckland located new zealand although originally trained biology psychology gray become well known studies evolution austronesian language family using computational phylogenetic methods gray also performs research animal cognition one main research-projects studies tool-use among new caledonian crows summer 2014 max planck society announced max planck institute economics jena germany would receive new different mandate along johannes krause gray appointed director new max planck institute science human history commencing february 1 2014 | [] | Test |
3,988 | 8 | Template_Toolkit:template toolkit template toolkit tt template engine used primarily building web sites also suitable creating type digital document pdf latex file template toolkit based mini-language allow direct perl templates default unlike competing products e.g mason forces developers separate business logic perl libraries leaving presentation logic templates written perl popular accessories c. released free software licence perl artistic licence gpl tt used templating system various perl application frameworks including catalyst mvc framework cgi :application maypole framework template toolkit written andy wardley prototype tt text :metatext perl module released 1996 first version tt proper released 1999 version 2.00 released 2001 version 3 development last touched january 2010 | [
5249,
5253,
8582,
10276,
6313,
1837,
4398,
8627,
9014,
4294,
9926,
7764,
11610,
7518,
11492,
2281,
8941,
2804,
3837
] | None |
3,989 | 7 | ClearSlide:clearslide clearslide saas-based sales engagement platform lets users share content sales materials via email links viewer ’ link ‘ live pitch ’ clearslide designed sales marketing teams accessible primarily via annual subscription model users also sign limited time free trial software full access features regular subscription company ’ headquarters san francisco ’ financial district clearslide found october 2009 funded founders initial subscribers company fundraise year following launch august 2012 clearslide raised 28 million series b round financing announcing fuel rapid growth expansion plans march 5 2013 company bought sliderocket vmware second acquisition announced july 2 2013 clearslide bought crunched rival cloud-based sales engagement platform february 2014 clearslide raised 50 million series c funding partnership social+capital partnership led additional contributions greylock partners bessemer venture partners felicis ventures | [
6153
] | Test |
3,990 | 9 | Thread-local_storage:thread-local storage thread-local storage tls computer programming method uses static global memory local thread use global variables generally discouraged modern programming legacy operating systems unix designed uniprocessor hardware require additional mechanism retain semantics pre-reentrant apis example situations functions use global variable set error condition example global variable codice_1 used many functions c library codice_1 global variable call system function one thread may overwrite value previously set call system function different thread possibly following code different thread could check error condition solution codice_1 variable looks like global fact exists per thread—i.e. lives thread-local storage second use case would multiple threads accumulating information global variable avoid race condition every access global variable would protected mutex alternatively thread might accumulate thread-local variable definition read written threads implying race conditions threads synchronise final accumulation thread-local variable single truly global variable many systems impose restrictions size thread-local memory block fact often rather tight limits hand system provide least memory address pointer sized variable thread-local allows use arbitrarily sized memory blocks thread-local manner allocating memory block dynamically storing memory address block thread-local variable application programming interface api function codice_4 used obtain unused tls slot index tls slot index considered ‘ used ’ codice_5 codice_6 functions used read write memory address thread-local variable identified tls slot index codice_6 affects variable current thread codice_8 function called release tls slot index win32 thread information block thread one entries block thread-local storage table thread tlsalloc returns index table unique per address space call thread copy thread-local storage table hence thread independently use tlssetvalue index obtain specified value via tlsgetvalue index set look entry thread table apart tlsxxx function family windows executables define section mapped different page thread executing process unlike tlsxxx values pages contain arbitrary valid addresses addresses however different executing thread therefore passed asynchronous functions may execute different thread otherwise passed code assume virtual address unique within whole process tls sections managed using memory paging size quantized page size 4kb x86 machines sections may defined inside main executable program dlls contain sections correctly initialized loading loadlibrary pthreads api memory local thread designated term thread-specific data functions codice_9 codice_10 used respectively create delete key thread-specific data type key explicitly left opaque referred codice_11 key seen threads thread key associated thread-specific data via codice_12 data later retrieved using codice_13 addition codice_9 optionally accept destructor function automatically called thread exit thread-specific data null destructor receives value associated key parameter perform cleanup actions close connections free memory etc. even destructor specified program must still call codice_10 free thread-specific data process level destructor frees data local thread apart relying programmers call appropriate api functions also possible extend programming language support thread local storage tls c11 keyword codice_16 used define thread-local variables header codice_17 supported defines codice_18 synonym keyword example usage c++11 introduces codice_18 keyword used following cases aside various compiler implementations provide specific ways declare thread-local variables windows versions vista server 2008 codice_23 works dlls dlls bound executable work loaded loadlibrary protection fault data corruption may occur common lisp provides feature called dynamically scoped variables dynamic variables binding private invocation function children called function abstraction naturally maps thread-specific storage lisp implementations provide threads common lisp numerous standard dynamic variables threads sensibly added implementation language without variables thread-local semantics dynamic binding instance standard variable codice_24 determines default radix integers printed variable overridden enclosing code print integers alternate radix functions execute concurrently different threads binding properly thread-local otherwise thread fight controls global printing radix version 2 static global variables thread-local default declared syntax similar normal global static variables languages global variables must explicitly requested using shared keyword shared keyword works storage class type qualifier – shared variables subject restrictions statically enforce data integrity declare classic global variable without restrictions unsafe __gshared keyword must used java thread-local variables implemented class object threadlocal holds variable type accessible via get/set methods example threadlocal variable holding integer value looks like least oracle/openjdk use native thread-local storage spite os threads used aspects java threading instead thread object stores non-thread-safe map threadlocal objects values opposed threadlocal map thread objects values incurring performance overhead .net framework languages c static fields marked threadstatic attribute .net 4.0 system.threading.threadlocal class available allocating lazily loading thread-local variables also api available dynamically allocating thread-local variables object pascal delphi free pascal threadvar reserved keyword used instead 'var declare variables using thread-local storage cocoa gnustep openstep nsthread object thread-local dictionary accessed thread threaddictionary method perl threads added late evolution language large body extant code already present comprehensive perl archive network cpan thus threads perl default take local storage variables minimise impact threads extant non-thread-aware code perl thread-shared variable created using attribute python programming language |python version 2.4 later local class threading module used create thread-local storage ruby programming language |ruby create/access thread-local variables using =/ methods category threads computing category variable computer science category software design patterns | [
1152,
1280,
8582,
7175,
1801,
5257,
4107,
5772,
7307,
2062,
9225,
10510,
3733,
2456,
9245,
5663,
5537,
8100,
6184,
5165,
2222,
5677,
8640,
8266,
333,
11343,
5840,
337,
4817,
7760,
6868,
9425,
10581,
2011,
734,
8928,
8929,
4194,
2281,
8554... | Test |
3,991 | 4 | Scunthorpe_problem:scunthorpe problem scunthorpe problem unintentional blocking websites e-mails forum posts search results spam filter search engine text contains string letters appear obscene otherwise unacceptable meaning names abbreviations technical terms often cited affected issue problem arises since computers easily identify strings text within document interpreting words kind requires considerable ability interpret wide range contexts possibly across many cultures extremely difficult task result broad blocking rules may result false positives affecting innocent phrases problem named incident 1996 aol profanity filter prevented residents town scunthorpe north lincolnshire england creating accounts aol town name contains substring cunt years later google opt-in safesearch filters apparently made mistake preventing residents searching local businesses included scunthorpe names mistaken decisions obscenity filters include | [
3462,
488,
6762,
7627,
7541,
7739,
8735
] | None |
3,992 | 3 | Socket_604:socket 604 socket 604 604-pin microprocessor socket designed interface intel xeon processor rest computer provides electrical interface well physical support socket designed support heatsink socket 604 designed intel zero insertion force socket intended workstations server platforms socket contains 604 pins 603 electrical contacts last dummy pin contact 1.27mm pitch regular pin array mate 604-pin processor package socket 604 processors utilize bus speed either 400 533 667 800 1066 mhz manufactured either 130 90 65 45 nm process socket 604 processors inserted socket 603 designed motherboards due one additional pin present socket 603 processors inserted socket 604 designed motherboards since extra pin slot anything 603 cpu socket 604 processors range 1.60 ghz 3.80 ghz higher clock rates found among older slower netburst-based xeons following intel xeon chipsets used socket 604 late socket 604 revivals | [
3588,
5901,
5523,
4246,
2455,
3352,
8855,
11417,
3995,
4252,
6175,
7714,
10019,
4523,
2604,
2350,
6192,
9649,
4537,
7105,
4805,
7110,
8394,
3403,
4427,
4179,
3798,
4185,
7002,
9945,
11484,
9570,
10468,
613,
8552,
7657,
1260,
4717,
10225,
... | Test |
3,993 | 7 | Elasticity_(cloud_computing):elasticity cloud computing cloud computing elasticity defined degree system able adapt workload changes provisioning de-provisioning resources autonomic manner point time available resources match current demand closely possible elasticity defining characteristic differentiates cloud computing previously proposed computing paradigms grid computing dynamic adaptation capacity e.g. altering use computing resources meet varying workload called elastic computing let us illustrate elasticity simple example service provider wants run website iaas cloud moment formula_1 website unpopular single machine commonly virtual machine sufficient serve web users moment formula_2 website suddenly becomes popular example result flash crowd single machine longer sufficient serve users based number web users simultaneously accessing website resource requirements web server might ten machines needed elastic system immediately detect condition provision nine additional machines cloud serve web users responsively time formula_3 website becomes unpopular ten machines currently allocated website mostly idle single machine would sufficient serve users accessing website elastic system immediately detect condition deprovision nine machines release cloud elasticity aims matching amount resource allocated service amount resource actually requires avoiding over- under-provisioning over-provisioning i.e. allocating resources required avoided service provider often pay resources allocated service example amazon ec2 m4 extra-large instance costs us 0.239/hour service allocated two virtual machines one required service provider wastes 2,095 every year hence service provider expenses higher optimal profit reduced under-provisioning i.e. allocating fewer resources required must avoided otherwise service serve users good service example under-provisioning website may make seem slow unreachable web users eventually give accessing thus service provider loses customers long term provider income decrease also reduces profit one potential problem elasticity takes time cloud virtual machine vm acquired time user however may take several minutes acquired vm ready use vm startup time dependent factors image size vm type data center location number vms etc cloud providers different vm startup performance implies control mechanism designed elastic applications must consider decision process time needed elasticity actions take effect provisioning another vm specific application component elastic applications allocate deallocate resources vms demand specific application components makes cloud resources volatile traditional monitoring tools associate monitoring data particular resource i.e vm ganglia nagios longer suitable monitoring behavior elastic applications example lifetime data storage tier elastic application might add remove data storage vms due cost performance requirements varying number used vms thus additional information needed monitoring elastic applications associating logical application structure underlying virtual infrastructure turn generates problems aggregate data multiple vms towards extracting behavior application component running top vms different metrics might need aggregated differently e.g. cpu usage could averaged network transfer might summed deploying applications cloud infrastructures iaas/paas requirements stakeholder need considered order ensure proper elasticity behavior even though traditionally one would try find optimal trade-off cost quality performance real world cloud users requirements regarding behavior complex target multiple dimensions elasticity e.g. sybl cloud applications varying types complexities multiple levels artifacts deployed layers controlling structures must take consideration variety issues approach sense rsybl multi-level control control systems need consider impact lower level control upon higher level ones vice versa e.g. controlling virtual machines web containers web services time well conflicts may appear various control strategies various levels elastic strategies clouds take advantage control-theoretic methods e.g. predictive control experimented cloud scenarios showing considerable advantages respect reactive methods | [
225,
4194,
8962,
5956,
5958,
1935,
7537,
9974,
1211
] | None |
3,994 | 4 | Center_for_Internet_Security:center internet security nowiki /nowiki center internet security cis 501 c 3 nonprofit organization formed october 2000 mission identify develop validate promote sustain best practice solutions cyber defense build lead communities enable environment trust cyberspace organization headquartered east greenbush new york members including large corporations government agencies academic institutions cis employs closed crowdsourcing model identify refine effective security measures individuals developing recommendations shared community evaluation consensus decision-making process national international level cis plays important role forming security policies decisions maintaining cis controls cis benchmarks hosting multi-state information sharing analysis center ms-isac cis several program areas including ms-isac cis controls cis benchmarks cis communities cis cybermarket program areas cis works wide range entities including academia government private sector general public increase online security providing products services improve security efficiency effectiveness multi-state information sharing analysis center ms-isac round-the-clock cyber threat monitoring mitigation center state local governments operated cis partnership office cybersecurity communications united states department homeland security dhs ms-isac established late 2002 officially launched january 2003 william f. pelgrin chief security officer state new york beginning small group participating states northeast ms-isac came include 50 u.s. states district columbia well u.s. territorial tribal local governments order facilitate expanding scope late 2010 ms-isac transitioned not-for-profit status auspices center internet security transition facilitated cis established reputation providing cybersecurity resources public private sectors ms-isac helps government agencies combat cyberthreats works closely federal law enforcement designated dhs key cyber security resource nation state local territorial tribal sltt governments ms-isac 24x7 cyber security operations center performs network monitoring issues early cyber threat warnings advisories performs vulnerability identification mitigation well incident response main objectives ms-isac described follows elections infrastructure information sharing analysis center ei-isac established election infrastructure subsector government coordinating council gcc critical resource cyber threat prevention protection response recovery nation ’ state local territorial tribal sltt election offices ei-isac operated center internet security inc mission ei-isac improve overall cybersecurity posture sltt election offices collaboration information sharing among members u.s. department homeland security dhs federal partners private sector partners keys success ei-isac provides central resource gathering information cyber threats election infrastructure two-way sharing information among public private sectors order identify protect detect respond recover attacks public private election infrastructure ei-isac comprises representatives sltt election offices contractors supporting sltt election infrastructure cis controls cis benchmarks provide global standards internet security recognized global standard best practices securing systems data attacks cis maintains cis controls popular set 20 security controls map many compliance standards applicable internet things independent consensus process cis benchmarks provide frameworks help organizations bolster security cis offers variety free resources include secure configuration benchmarks automated configuration assessment tools content security metrics security software product certifications cis controls advocate defense-in-depth model help prevent detect malware may 2017 study showed average organizations fail 55 compliance checks established center internet security half violations high severity issues march 2015 cis launched cis hardened images amazon web services response growing concern surrounding data safety information housed virtual servers cloud resources made available amazon machine images six cis benchmarks-hardened systems including microsoft windows linux ubuntu additional images cloud providers added later cis released companion guides cis controls recommendations actions counter cybersecurity attacks new guides released october december 2015 april 2018 cis launched information security risk assessment method implement cis controls called cis ram based upon risk assessment standard docra council cis benchmarks collaboration consensus community cis securesuite members class cis members access additional sets tools resources consensus community made experts field security use knowledge experience help global internet community cis securesuite members made several different types companies ranging size including government agencies colleges universities nonprofits auditors consultants security software vendors organizations cis benchmarks tools cis provides cost allow workers create reports compares system security universal consensus standard fosters new structure internet security everyone accountable shared top executives technology professionals internet users throughout globe cis provides internet security tools scoring feature rates configuration security system hand example cis provides securesuite members access cis-cat pro cross-platform java app scans target systems produces report comparing settings published benchmarks intended encourage motivate users improve scores given software bolsters security internet systems universal consensus standard cis employs draws upon uses accumulated knowledge skillful technology professionals since internet security professionals volunteer contributing consensus reduces costs cis makes cost effective cis cybermarket collaborative purchasing program serves u.s. state local tribal territorial sltt government organizations nonprofit entities public health education institutions improve cybersecurity cost-effective group procurement intent cis cybermarket combine purchasing power governmental nonprofit sectors help participants improve cybersecurity condition lower cost would able attain program assists time intensive costly complex daunting task maintaining cybersecurity working public private sectors bring partners cost-effective tools services combined purchasing opportunities reviewed domain experts three main objectives cis cybermarket cis cybermarket like ms-isac serves government entities non-profits achieving greater cyber security resources page multiple newsletters documents available free charge including cybersecurity handbook cities counties cis communities volunteer global community professionals continuously refine verify cis best practices cybersecurity tools develop structure benchmarks cis uses strategy members organization first form teams teams collect suggestions advice official work recommendations participating organizations teams analyze data information determine vital configuration settings would improve internet system security many work settings possible member team constantly works teammates critically analyzes critiques rough draft consensus forms among team benchmark released general public available download testing among community reviewing feedback testing making necessary adjustments changes final benchmark relevant security tools made available public download cis website process extensive carefully executed thousands security professionals across globe participate according isaca development cis benchmark sun microsystems solaris 2,500 users downloaded benchmark monitoring tools organizations participated founding cis october 2000 include isaca american institute certified public accountants aicpa institute internal auditors iia international information systems security certification consortium isc2 sans institute system administration networking security cis since grown hundreds members varying degrees membership cooperates works variety organizations members national international levels organizations include public private sectors government isacs law enforcement | [
9665,
2084,
2628,
326,
2343,
4936,
1897,
8613,
10437,
6797,
7248,
2865,
823,
9049,
10717
] | Test |
3,995 | 3 | Socket_603:socket 603 socket 603 motherboard socket intel xeon processor socket 603 designed intel zero insertion force socket intended workstations server platforms contains 603 contacts arrayed grid center socket contact 1.27mm pitch regular pin array mate 603-pin processor package intel design notes distinguish socket 603 socket 604 low cost low risk robust high volume manufacturable multi-sourceable socket 603 processors bus speed 400 mhz manufactured either 180 nm process 130 nm process socket 603 processors inserted socket 604 designed motherboards socket 604 processors inserted socket 603 designed motherboards due one additional pin present socket 603 processors range 1.4 ghz 3.2 ghz old link http //www.intel.com/assets/pdf/designguide/249672.pdf 11/19/2016 http //www.intel.com/content/dam/www/public/us/en/documents/design-guides/603-pin-socket-guidelines.pdf | [
3588,
5901,
5523,
4246,
2455,
3992,
8855,
11417,
4252,
6175,
7714,
10019,
4523,
2604,
2350,
6192,
9649,
4537,
7105,
4805,
7110,
8394,
3403,
4427,
4179,
3798,
4185,
7002,
9945,
11484,
9570,
10468,
613,
8552,
7657,
1260,
4717,
10225,
371,
9... | Test |
3,996 | 4 | Blackshades:blackshades blackshades name malicious trojan horse used hackers control infected computers remotely malware targets computers using microsoft windows -based operating systems according us officials 500,000 computer systems infected worldwide software 2014 united states federal bureau investigation fbi arrested hundreds people blackshade computer fbi crackdown blackshades sold us 40 hack forums reportedly generated us 350,000.00 sales blackshades infects computer systems downloading onto victim computer victim accesses malicious webpage sometimes downloading onto victim computer without victim knowledge known drive-by download external storage devices usb flash drives blackshades also included tools assisted hackers maximizing amount computer systems infected tool sends infected links masquerade innocuous site potential victims via victim social networking service blackshades reportedly used remotely access infected computer without authorization blackshades allows hackers perform many actions infected computer remotely without authorization including ability blackshades reportedly used computer hackers little experience script kiddies hackers use programs developed others attack computer systems blackshades also act ransomware hackers using blackshades restrict access victim computer demand ransom paid hacker order restriction lifted many antivirus programs successfully detect remove blackshades however hackers using blackshades software usually avoid detection blackshades infections using software obfuscates blackshades binary avoid detection antivirus programs blackshades organization also sold along blackshades software 2012 citizen lab eff reported use blackshades target opposition forces syria 2015 stefan rigo leeds given 40-week suspended sentence using blackshades 14 people 7 knew personally reported paid software using ex-girlfriend payment card 2012 fbi ran sting operation called operation card shop led 24 arrests hackers eight countries one arrested michael hogue also known xvisceral online hacking communities hogue co-creator blackshades arrested indicted charges commonly known computer fraud abuse act sentenced five years probation 20 years suspended prison sentence 2014 fbi coordinated worldwide operation combat use malware leading arrest almost one hundred people nineteen countries may 19 charges laid united states five individuals two men identified developers blackshades three men sold software used infiltrate people computers exactly 359 searches conducted 1,100 electronic devices seized part operation according fbi 500,000 computers 100 countries infected malware blackshades sold typically us 40 reportedly generated us 350,000 sales | [
3555,
10756,
2213,
4903,
9227,
8172,
6797,
7983,
1970,
4883,
8978,
4725,
1271,
4956
] | None |
3,997 | 8 | WCF_Data_Services:wcf data services wcf data services formerly ado.net data services codename astoria platform microsoft calls data services actually combination runtime web service services exposed also includes data services toolkit lets astoria data services created within asp.net astoria project announced mix 2007 first developer preview made available april 30 2007 first ctp made available part asp.net 3.5 extensions preview final version released part service pack 1 .net framework 3.5 august 11 2008 name change ado.net data services wcf data services announced 2009 pdc wcf data services exposes data represented entity data model edm objects via web services accessed http data addressed using rest-like uri data service accessed via http get method uri return data web service configured return data either plain xml json rdf+xml initial release formats like rss atom supported though may future addition using http methods like put post delete data updated well post used create new entities put updating entity delete deleting entity windows communication foundation wcf comes rescue find able achieve want achieve using web services i.e. protocols support even duplex communication wcf define service configure way used via http tcp ipc even message queues consume web services using server side scripts asp.net javascript object notations json even rest representational state transfer understanding basics say wcf service used communicate using different protocols different kinds applications need understand achieve want use wcf service application three major questions 1.where wcf service located client perspective 2.how client access service i.e. protocols message formats 3.what functionality service providing clients answer three questions creating consuming wcf service lot easier us wcf service concept endpoints wcf service provides endpoints client applications use communicate wcf service answer questions known abc wcf services fact main components wcf service let tackle question one one address like webservice wcf service also provides uri used clients get wcf service uri called address wcf service solve first problem locate wcf service us binding able locate wcf service one think communicate service protocol wise binding defines wcf service handles communication could also define communication parameters like message encoding etc solve second problem communicate wcf service us contract question one left functionalities wcf service provides contract defines public data interfaces wcf service provides clients uris representing data contain physical location service well service name also need specify edm entity-set specific entity instance respectively former list entities collection set whereas latter list entity indexed someartist uris also specify traversal relationship entity data model example traverses relationship genre sql parlance joins genre table retrieves instances genre associated entity somesong simple predicates also specified uri like fetch items indexed someartist release 2006 filtering partition information also encoded url although presence skip top keywords indicates paging support data services version 1 method determining number records available thus impossible determine many pages may odata 2.0 spec adds support count path segment return count entities inlinecount retrieve page worth entities total count without separate round-trip ... | [
4384,
2145,
10624,
1347,
1348,
9348,
10020,
4231,
11559,
2603,
3821,
9263,
3573,
4853,
3224,
9434,
9726,
479
] | Train |
3,998 | 0 | Language_model:language model statistical language model probability distribution sequences words given sequence say length assigns probability formula_1 whole sequence language model provides context distinguish words phrases sound similar example american english phrases recognize speech wreck nice beach sound similar mean different things data sparsity major problem building language models possible word sequences observed training one solution make assumption probability word depends previous n words known n -gram model unigram model n 1 unigram model also known bag words model estimating relative likelihood different phrases useful many natural language processing applications especially generate text output language modeling used speech recognition machine translation part-of-speech tagging parsing optical character recognition handwriting recognition information retrieval applications speech recognition sounds matched word sequences ambiguities easier resolve evidence language model integrated pronunciation model acoustic model language models used information retrieval query likelihood model separate language model associated document collection documents ranked based probability query q document language model formula_2 commonly unigram language model used purpose unigram model treated combination several one-state finite automata splits probabilities different terms context e.g formula_3 formula_4 model probability word depends word probability document one-state finite automata units automaton probability distribution entire vocabulary model summing 1 following illustration unigram model document probability generated specific query calculated different documents unigram models different hit probabilities words probability distributions different documents used generate hit probabilities query documents ranked query according probabilities example unigram models two documents information retrieval contexts unigram language models often smoothed avoid instances p term 0 common approach generate maximum-likelihood model entire collection linearly interpolate collection model maximum-likelihood model document smooth model n -gram model probability formula_1 observing sentence formula_8 approximated assumed probability observing word w context history preceding − 1 words approximated probability observing shortened context history preceding n − 1 words n order markov property conditional probability calculated n -gram model frequency counts terms bigram trigram language models denote n -gram models n 2 n 3 respectively typically n -gram model probabilities derived directly frequency counts models derived way severe problems confronted n -grams explicitly seen instead form smoothing necessary assigning total probability mass unseen words n -grams various methods used simple add-one smoothing assign count 1 unseen n -grams uninformative prior sophisticated models good-turing discounting back-off models bidirectional representations condition pre- post- context e.g. words layers bigram n 2 language model probability sentence saw red house approximated whereas trigram n 3 language model approximation note context first n – 1 n -grams filled start-of-sentence markers typically denoted nowiki /nowiki additionally without end-of-sentence marker probability ungrammatical sequence *i saw would always higher longer sentence saw red house maximum entropy language models encode relationship word n-gram history using feature functions equation formula_13 formula_14 partition function formula_15 parameter vector formula_16 feature function simplest case feature function indicator presence certain n-gram helpful use prior formula_15 form regularization log-bilinear model another example exponential language model neural language models continuous space language models use continuous representations embeddings words make predictions models make use neural networks continuous space embeddings help alleviate curse dimensionality language modeling language models trained larger larger texts number unique words vocabulary increases number possible sequences words increases exponentially size vocabulary causing data sparsity problem exponentially many sequences thus statistics needed properly estimate probabilities neural networks avoid problem representing words distributed way non-linear combinations weights neural net alternate description neural net approximates language function neural net architecture might feed-forward recurrent former simpler latter common typically neural net language models constructed trained probabilistic classifiers learn predict probability distribution i.e. network trained predict probability distribution vocabulary given linguistic context done using standard neural net training algorithms stochastic gradient descent backpropagation context might fixed-size window previous words network predicts feature vector representing previous words another option use future words well past words features estimated probability third option allows faster training invert previous problem make neural network learn context given word one maximizes log-probability called skip-gram language model basis word2vec program instead using neural net language models produce actual probabilities common instead use distributed representation encoded networks hidden layers representations words word mapped onto -dimensional real vector called word embedding size layer output layer representations skip-gram models distinct characteristic model semantic relations words linear combinations capturing form compositionality example models function maps word -d vector representation ≈ made precise stipulating right-hand side must nearest neighbor value left-hand side positional language model assesses probability given words occurring close one another text necessarily immediately adjacent similarly bag-of-concepts models leverage semantics associated multi-word expressions buy_christmas_present even used information-rich sentences like today bought lot nice christmas presents various data sets developed use evaluate language processing systems include | [
3808,
6336,
867,
1443,
5635,
7780,
9798,
264,
2602,
2858,
3635,
1044,
4468,
5399,
6362,
7164,
10557,
3646
] | Train |
3,999 | 3 | Joule_(programming_language):joule programming language joule concurrent dataflow programming language designed building distributed applications concurrent order statements within block irrelevant operation block statements executed whenever possible based inputs everything joule happens sending messages control flow instead programmer describes flow data making dataflow programming language considered precursor e programming language numerals consist ascii digits 0-9 identifiers unicode sequences digits letters operator characters begin letter also possible form identifiers using unicode sequences including whitespace enclosed either straight standard ‘ ’ single quotes backslash escape character keywords start letter except • keyword send information operators consist unicode sequences digits letters operator characters beginning operator character labels identifiers followed colon root joule imperative language statement-based language rich expression syntax transforms easily relational syntax underneath complex expressions become separate statements site original expression replaced reference acceptor results channel therefore nested expressions still compute completely concurrently embedding statement identifiers may name channel communicate server case said bound channel | [
256,
9345,
2951,
9224,
6813,
10146,
547,
7480,
10813,
4417,
4034,
8262,
7884,
11596,
10835,
6102,
728,
5483,
8435,
3700,
10614,
2936,
5503
] | None |
4,000 | 8 | Jello_framework:jello framework jello end-to-end java application framework optimized google app engine including comprehensive data authorization model powerful restful engine out-of-the-box ui views jello rest offers clean simple follow json format protocol schema follows odata specification following components part jello framework | [
11105,
9467,
5677
] | Test |
4,001 | 2 | Ssh-keygen:ssh-keygen ssh-keygen standard component secure shell ssh protocol suite found unix unix-like microsoft windows computer systems used establish secure shell sessions remote computers insecure networks use various cryptographic techniques ssh-keygen utility used generate manage convert authentication keys ssh-keygen able generate key using one three different digital signature algorithms help ssh-keygen tool user create passphrase keys key types provide unattended operation passphrase left empty increased risk keys differ keys used related tool gnu privacy guard openssh-based client server programs included windows 10 since version 1803 ssh client key agent enabled available default ssh server optional feature-on-demand originally ssh protocol version 1 deprecated rsa algorithm supported 2016 rsa still considered strong recommended key length increased time ssh protocol version 2 additionally introduced support dsa algorithm dsa algorithm ties american national security agency nsa aspects security called question edward snowden global surveillance disclosures particularly light bullrun decryption program subsequently openssh added support third digital signature algorithm ecdsa key format longer uses previous pem file format private keys depend upon openssl library provide cryptographic implementation fourth format supported using ed25519 originally developed independent cryptography researcher daniel j. bernstein syntax ssh-keygen command follows important options ssh-keygen command follows ssh-keygen utility uses various files storing public private keys files used ssh-keygen utility follows | [
2050,
515,
3970,
8834,
9733,
9735,
2568,
3976,
6281,
10631,
6797,
4750,
3856,
6674,
5397,
2198,
4248,
8729,
6812,
4771,
3495,
808,
7847,
4398,
7983,
7088,
10033,
9780,
1336,
1978,
7356,
5437,
7486,
10428,
960,
965,
8517,
8522,
3659,
1741,... | Test |
4,002 | 2 | Berkeley_printing_system:berkeley printing system berkeley printing system one several standard architectures printing unix platform originated 2.10bsd used bsd derivatives freebsd netbsd openbsd dragonfly bsd system running print architecture could traditionally identified use user command lpr primary interface print system opposed system v printing system lp command typical user commands available berkeley print system lpd program daemon programs communicate programs support line printer daemon protocol machines network submit jobs print queue machine running berkeley printing system berkeley printing system user commands submit jobs machines support protocol | [
3976,
8360,
7626,
3916,
10352,
5492
] | Validation |
4,003 | 2 | Nokia_E65:nokia e65 nokia e65 smartphone eseries range s60 platform third edition device slide action shared many features n95 quad band gsm 3g wifi bluetooth released around time thinner lighter without gps followed fairly quickly e66 similar gained fm radio newer release s60 a2dp bluetooth gps 3.2 mpixel camera operation times vary depending network usage many users experienced problems sim connecting network using phone time bring phone nokia center get phone repaired replaced cause seems design problem sim container chassis phone sim container mainly built thin metal foil time tends bend thus disconnecting sim mobile phone sim contacts problem apparently solved putting bit paper metal foil sim enabling make contact also difficulties making connection wlan networks use eap-peap mschapv2 protocols update phone firmware true firmware version 3.0633.69 users experience problems phone connecting third party gps devices bluetooth seems compatibility flaw nokia bluetooth stack nokia maps devices connect well used google maps e65 | [
1537,
8577,
3205,
11655,
9359,
1424,
529,
2449,
8083,
10770,
5143,
2072,
7063,
5274,
5019,
5659,
669,
8472,
11545,
4132,
6310,
167,
40,
3626,
5290,
10410,
10802,
7220,
821,
5175,
7866,
1083,
1728,
7617,
4291,
7877,
10053,
199,
967,
9292,
... | None |
4,004 | 2 | Marionnet:marionnet marionnet virtual network laboratory allows users define configure run complex computer networks without need physical setup single possibly even non-networked gnu/linux host machine required simulate whole ethernet network complete computers routers hubs switches cables support also provided integrating virtual network physical host network marionnet born april 2005 simple textual interface netkit written ocaml jean-vincent loddo paris 13 university networking course code since completely rewritten redesigned september 2005 order remove dependency netkit ease construction graphical interface partly built dot architecture extended system made general luca saiu joined project 2007 contributing particular dynamic reconfiguration aspects system active use several universities metropolitan france countries marionnet reached fairly stable state successfully used teaching networks several universities around world current development centered around making system easier use average end user particular emphasis documentation internationalization way mostly marionnet_i18n branch gnu gettext far marionnet presented two international computer science conferences many french events fosdem top gnu/linux host emulation guest machines achieved user mode linux technology allows run many linux kernels user space regular processes vde virtual distributed ethernet project responsible linking together uml machines virtual network purpose emulate cable hub switch devices allowing also introduce perturbations communication top raw emulated network marionnet acts coherent manager gui marionnet example complex concurrent application written functional language using relatively advanced programming techniques marionnet showed good performance complex networks ~15 machines even relatively old machines remaining responsive main concern disk usage largely depends distribution choice pinocchio custom distro developed meet average needs main goal marionnet teaching computers networks university laboratories although could valuable tool also high schools despite teaching-oriented marionnet may used emulate networks test development purposes quite easy set fast even complicated configurations possibility reverting filesystem changes virtual machines makes quite flexible | [
5120,
4734,
7983
] | Validation |
4,005 | 4 | Network_mapping:network mapping network mapping study physical connectivity networks e.g internet network mapping discovers devices network connectivity confused network discovery network enumerating discovers devices network characteristics operating system open ports listening network services etc. field automated network mapping taken greater importance networks become dynamic complex nature images first attempts large scale map internet produced internet mapping project appeared wired magazine maps produced project based layer 3 ip level connectivity internet see osi model different aspects internet structure also mapped recent efforts map internet improved sophisticated methods allowing make faster sensible maps example effort opte project attempting develop system capable mapping internet single day map internet project maps 4 billion internet locations cubes 3d cyberspace users add urls cubes re-arrange objects map early 2011 canadian based isp peer 1 hosting created map internet depicts graph 19,869 autonomous system nodes connected 44,344 connections sizing layout autonomous systems calculated based eigenvector centrality measure central network autonomous system graph theory used better understand maps internet help choose many ways visualize internet maps projects attempted incorporate geographical data internet maps example draw locations routers nodes map world others concerned representing abstract structures internet allocation structure purpose ip space many organizations create network maps network system maps made manually using simple tools microsoft visio mapping process simplified using tools integrate auto network discovery network mapping one example ip fabric platform many vendors notable network mappers list enable customize maps include labels add un-discoverable items background images sophisticated mapping used help visualize network understand relationships end devices transport layers provide service items bottlenecks root cause analysis easier spot using tools three main techniques used network mapping snmp based approaches active probing route analytics snmp based approach retrieves data router switch mibs order build network map active probing approach relies series traceroute-like probe packets order build network map route analytics approach relies information routing protocols build network map three approaches advantages disadvantages methods use two prominent techniques used today create internet maps first works data plane internet called active probing used infer internet topology based router adjacencies second works control plane infers autonomous system connectivity based bgp data bgp speaker sends 19-byte keep-alive messages every 60 seconds maintain connection technique relies traceroute-like probing ip address space probes report back ip forwarding paths destination address combining paths one infer router level topology given pop active probing advantageous paths returned probes constitute actual forwarding path data takes networks also likely find peering links isp however active probing requires massive amounts probes map entire internet likely infer false topologies due load balancing routers routers multiple ip address aliases decreased global support enhanced probing mechanisms source-route probing icmp echo broadcasting ip address resolution techniques leaves type probing realm network diagnosis technique relies various bgp collectors collect routing updates tables provide information publicly bgp entry contains path vector attribute called path path represents autonomous system forwarding path given origin given set prefixes paths used infer as-level connectivity turn used build topology graphs however paths necessarily reflect data actually forwarded adjacencies nodes represent policy relationship single link reality several router links also much harder infer peerings two nodes peering relationships propagated isp customer networks nevertheless support type mapping increasing isp offer peer public route collectors route-views ripe new toolsets emerging cyclops netviews take advantage new experimental bgp collector bgpmon netviews build topology maps seconds visualize topology changes moments occurring actual router hence routing dynamics visualized real time comparison tools using bgpmon another tool nettransformer able discover generate bgp peering maps either snmp polling converting mrt dumps graphml file format nettransformer allows us also perform network diffs two dumps thus reason bgp peering evolved years whatsup gold monitoring tool tracks networks servers applications storage devices virtual devices incorporates infrastructure management application performance management | [
5472,
2085,
4005,
6172,
7983,
11249,
2739,
5402,
5469,
3133,
9983
] | Validation |
4,006 | 9 | KeY:key key tool used formal verification java programs accepts specifications written java modeling language java source files transformed theorems dynamic logic compared program semantics likewise defined terms dynamic logic key significantly powerful supports interactive i.e hand fully automated correctness proofs failed proof attempts used efficient debugging verification-based testing several extensions key order apply verification c programs hybrid systems key jointly developed karlsruhe institute technology germany technische universität darmstadt germany chalmers university technology gothenburg sweden licensed gpl usual user input key consists java source file annotations jml translated key internal representation dynamic logic given specifications several proof obligations arise discharged i.e proof found ends program symbolically executed resulting changes program variables stored so-called updates program processed completely remains first-order logic proof obligation heart key system lies first-order theorem prover based sequent calculus used close proof interference rules captured called taclets consist simple language describe changes sequent theoretical foundation key formal logic called java card dl dl stands dynamic logic version first-order dynamic logic tailored java card programs example allows statements formulas like formula_1 intuitively says post-condition formula_2 must hold program states reachable executing java card program formula_3 state satisfies pre-condition formula_4 equivalent formula_5 hoare calculus formula_4 formula_2 purely first order dynamic logic however extends hoare logic formulas may contain nested program modalities formula_8 quantification formulas contain modalities possible also dual modality formula_9 includes termination dynamic logic seen special multi-modal logic infinite number modalities java block formula_3 modalities formula_8 formula_9 heart key system lies first-order theorem prover based sequent calculus sequent form formula_13 formula_14 assumptions formula_15 propositions sets formulas intuitive meaning formula_16 holds true means deduction initial sequent representing proof obligation shown constructible fundamental first-order axioms equality formula_17 program modalities eliminated symbolic execution instance formula formula_18 logically equivalent formula_19 example shows symbolic execution dynamic logic similar calculating weakest preconditions formula_20 formula_21 essentially denote thing – two exceptions firstly formula_22 function meta-calculus formula_20 really formula given calculus secondly symbolic execution runs program forward actual execution would save intermediate results assignments key introduces concept called updates similar substitutions applied program modality fully eliminated syntactically updates consist parallel side-effect free assignments written curly braces front modality example symbolic execution updates formula_24 transformed formula_25 first step formula_26 second step modality empty backwards application update postcondition yields precondition formula_27 could take value suppose one wants prove following method calculates product non-negative integers formula_27 formula_29 one thus starts proof premise formula_30 to-be-shown conclusion formula_31 note tableaux sequent calculi usually written upside-down i.e. starting sequent appears bottom deduction steps go upwards proof seen figure right symbolic execution debugger visualizes control flow program symbolic execution tree contains feasible execution paths program certain point provided plugin eclipse development platform key usable model-based testing tool generate unit tests java programs model test data test case derived consists formal specification provided jml symbolic execution tree implementation test computed key system key free software written java licensed gpl downloaded project website source currently pre-compiled binaries available another possibility key executed directly via java web start without need compilation installation key-hoare built top key features hoare calculus state updates state updates means describing state transitions kripke structure calculus seen subset one used main branch key due simplicity hoare calculus implementation essentially meant exemplify formal methods undergraduate classes keymaera previously called hykey deductive verification tool hybrid systems based calculus differential dynamic logic dl extends key tool computer algebra systems like mathematica corresponding algorithms proof strategies used practical verification hybrid systems keymaera developed university oldenburg carnegie mellon university name tool chosen homophone chimera hybrid animal ancient greek mythology keymaerax developed carnegie mellon university successor keymaera completely rewritten key c adaption key system misra c subset c programming language variant longer supported also adaptation use key symbolic execution abstract state machines developed eth zürich variant longer supported information found weblink | [
5677,
2045,
4006,
7983
] | Validation |
4,007 | 4 | William_F._Friedman:william f. friedman william frederick friedman september 24 1891 – november 12 1969 us army cryptographer ran research division army signal intelligence service sis 1930s parts follow-on services 1950s 1940 subordinates led frank rowlett broke japan purple cipher thus disclosing japanese diplomatic secrets america entrance world war ii friedman born wolf friedman chişinău bessarabia son frederick friedman jew bucharest worked translator linguist russian postal service daughter well-to-do wine merchant friedman family fled russia 1892 escape virulent anti-semitism ending pittsburgh pennsylvania three years later first name changed william child friedman introduced cryptography short story gold-bug edgar allan poe studied michigan agricultural college known today michigan state university east lansing received scholarship work genetics cornell university meanwhile george fabyan ran private research laboratory study personally interesting project decided set genetics project referred friedman friedman joined fabyan riverbank laboratories outside chicago september 1915 head department genetics one projects ran studied effects moonlight crop growth experimented planting wheat various phases moon another fabyan pet projects research secret messages sir francis bacon allegedly hidden various texts reigns elizabeth james research carried elizabeth wells gallup believed discovered many messages works william shakespeare convinced bacon written many shakespeare works friedman become something expert photographer working projects asked travel england several occasions help gallup photograph historical manuscripts research became fascinated work courted elizebeth smith gallup assistant accomplished cryptographer married soon became director riverbank department codes ciphers well department genetics time friedman wrote series 23 papers cryptography collectively known riverbank publications including first description index coincidence important mathematical tool cryptanalysis entry united states world war fabyan offered services department codes ciphers government federal department existed kind work although army navy embryonic departments various times soon riverbank became unofficial cryptographic center us government period friedmans broke code used german-funded indian radicals us planned ship arms india gain independence britain analyzing format messages riverbank realized code based dictionary sort cryptographic technique common time friedmans soon managed decrypt messages long case come trial book come light german-english dictionary published 1880 united states government decided set cryptological service sent army officers riverbank train friedman support program friedman wrote series technical monographs completing seven early 1918 enlisted army went france serve personal cryptographer general john j. pershing returned us 1920 published eighth monograph index coincidence applications cryptography considered important publication modern cryptography time texts army cryptographic training well thought remained classified several decades 1921 became chief cryptanalyst war department later led signals intelligence service sis —a position kept quarter century 1929 american black chamber new york city disbanded files entrusted sis cryptographic intelligence services reorganized suit new position war department friedman coined several terms including cryptanalysis wrote many monographs cryptography one written mostly spare time first draft elements cryptanalysis later expanded four volumes became u.s. army cryptographic main textbook reference realizing mathematical language skills essential sis work friedman managed get authority hire three men mathematical training language knowledge solomon kullback frank rowlett abraham sinkov went distinguished service decades addition also finally able hire man fluent japanese john hurt period elizebeth friedman continued work cryptology became famous number trials involving rum-runners coast guard fbi prohibition 1920s several new cipher machines developed generally based using typewriter mechanics basic electrical circuitry early example hebern rotor machine designed us 1915 edward hebern system offered security simplicity use hebern heavily promoted investors friedman realized new rotor machines would important devoted time analyzing hebern design period years developed principles analysis discovered several problems common rotor-machine designs examples dangerous features allowed cracking generated code included rotors step one position keypress putting fastest rotor one turns every keypress either end rotor series case collecting enough ciphertext applying standard statistical method known kappa test showed could albeit great difficulty crack cipher generated machine friedman used understanding rotor machines develop several immune attacks best lot sigaba—which destined become us highest-security cipher machine world war ii—was co-invented frank rowlett least one patent related finally granted friedman died 1939 japanese introduced new cipher machine sensitive diplomatic traffic replacing earlier system sis referred red new cipher sis called purple different much difficult navy cryptological unit op-20-g sis thought might related earlier japanese cipher machines agreed sis would handle attack system several months trying discover underlying patterns purple ciphertexts sis team led friedman rowlett extraordinary achievement figured purple unlike german enigma hebern design use rotors stepper switches like automated telephone exchanges leo rosen sis built machine — later discovered using identical model switch japanese designer chosen thus end 1940 sis constructed exact analog purple machine without ever seen one duplicate machines understanding purple sis could decrypt increasing amounts japanese traffic one intercept message japanese embassy washington d.c. ordering end december 7 1941 negotiations us message gave clear indication impending war delivered us state department hours prior attack pearl harbor controversy whether us foreknowledge pearl harbor attack roiled well 21st century 1941 friedman hospitalized nervous breakdown widely attributed mental strain work purple remained hospital four-man team — abraham sinkov leo rosen sis lt. prescott currier lt. robert weeks u.s. navy op-20-g — visited british establishment government code cypher school bletchley park gave british purple machine exchange details design enigma machine british decrypted enigma cipher however friedman visited bletchley park april 1943 played key role drawing 1943 brusa agreement. ref name=bletchleyparkdiary-2013 | [
6755,
11397,
6599,
7275,
6572,
173,
4719,
6928,
7887,
6578,
9615,
2580,
1941,
5310
] | None |
4,008 | 4 | Elm_information_security:elm information security elm saudi joint stock company owned public investment fund pif investment arm saudi ministry finance elm services provided forms beneficiaries including government corporate sector individuals elm services provided following sectors | [
5373
] | None |
4,009 | 4 | POP_before_SMTP:pop smtp pop smtp smtp pop method authentication used mail server software helps allow users option send e-mail location long demonstrably also fetch mail place pop smtp approach superseded smtp authentication due smtp authentication widely used recent years purposes technically users allowed use smtp ip address long previously made successful login pop service mail hosting provider address within predefined timeout period main advantage process generally transparent average user connecting email client almost always make connection fetch new mail sending new mail disadvantages include potentially complex setup mail hosting provider requiring sort communication channel pop service smtp service uncertainty much time users take connect via smtp send mail connecting pop users handled method need resort authorization methods also cases users come externally controlled dynamically assigned addresses smtp server must careful giving much leeway allowing unauthorized connections possibility race conditions leaving open mail relay unintentionally exposed | [
1125,
6184,
10167,
9909,
823,
5433,
5435
] | Test |
4,010 | 2 | Web_Platform_Installer:web platform installer web platform installer web pi freeware closed-source package management system installs non-commercial development tools dependencies part microsoft web platform including ability install third-party software added version 2.0 released september 24 2009. web pi install 82 titles web pi 2.0 options populated dynamically runtime microsoft servers allowing installation options updated without need download newer versions web pi july 7 2010 microsoft announced web pi 3 includes webmatrix new set integrated tools web development web pi 3 installs additional tools web development including iis developer express sql server compact dotnetnuke web pi features offline mode products downloaded local cache machine internet access available use cached files different machine later however web pi still usable environments internet connectivity local administrator privileges mutually exclusive i.e given process either authenticate transparent proxy high system integrity level | [
5380,
10900,
10902,
11030,
3224,
537,
5401,
7064,
11414,
4384,
9121,
8227,
11683,
11559,
10157,
7983,
9263,
11570,
6709,
8246,
315,
10939,
7486,
4674,
1347,
1348,
8644,
4423,
5320,
1353,
5067,
10828,
4174,
847,
83,
1366,
4439,
9434,
603,
... | Test |
4,011 | 2 | Linux_Foundation:linux foundation linux foundation lf non-profit technology consortium founded 2000 merger open source development labs free standards group standardize linux support growth promote commercial adoption also hosts promotes collaborative development open source software projects began 2000 open source development labs osdl became organization today osdl merged free standards group fsg linux foundation sponsors work linux creator linus torvalds lead maintainer greg kroah-hartman supported members cisco fujitsu hitachi huawei ibm intel microsoft nec oracle qualcomm samsung vmware well developers around world recent years linux foundation expanded services events training certification open source projects projects hosted linux foundation include open network automation platform onap hyperledger cloud native computing foundation cloud foundry foundation xen project many others origins linux foundation traced 1993 patrick d'cruze started linux international email list known li 1993 comdex bob young introduced mark bolzern li list shortly thereafter bolzern shared vision asked make members list bolzern funded li activities others eventually joined vision defined among things entity deal traditional public relations behalf linus torvalds file trademark behalf linus among many things described bolzern direction li became collaboration linux related vendors technologists heading single direction served everyone entire linux movement according original vision became clear bolzern could continue ceo workgroup solutions/linuxmall executive director linux international time perceived conflict interest mid 1994 bolzern young recruited jon maddog hall executive director position turn filed corporate paperwork behalf new board directors bolzern also remained board well continued leading trade show marketing efforts late 1999 included many trips press relations user groups bolzern maddog bolzern also organized managed launch linux pavilions major trade shows time uniforum comdex usenix eventually maddog helping establish atlanta linux showcase helped larry augustin li board member silicon valley linux user group create san francisco linux expo especially notable 94–98 timeframe anti-fraud linux trademark filing led li already included li suite projects mid 90s linux mark institute linux base standard certification programs trade show press relationships along actually vendor association page outlining linux international membership latter half 90s list presented alphabetical agreed order merit li linux bolzern maddog continued provide bulk funding 1998 augmented vendor individual membership fees individuals sponsors joined li vision 1999 li already become vendor-neutral 501c6 non-profit industry association linux linus torvalds blessing linus focused development technical excellence linux li primary purpose industry marketing organization also supported linux related certification programs along development essential projects education vision huge large vendors began come party expected sophistication thus help needed even bolzern distracted wife diagnosed cancer maddog becoming weary load everyone support augustin took action suggested another organization formed continue 2000 osdl founded appealing linux international board directors number fundamental projects still part linux foundation today osdl non-profit organization supported global consortium aimed accelerate deployment linux enterprise computing recognized center-of-gravity linux industry 9 jon maddog hall went different direction li.org 2003 linus torvalds creator freely available linux kernel announced would join organization osdl fellow work full-time future versions linux 2007 osdl merged free standards group another organization promoting adoption linux time jim zemlin headed fsg took executive director linux foundation remains today september 11 2011 linux foundation website taken due breach discovered 27 days prior including limited attendant subdomains linux foundation linux.com major parts including openprinting still offline october 20 2011 restoration complete january 4 2012 although one site linux developer network restored march 2014 linux foundation announced would begin building mooc program nonprofit education platform edx aim collaboration serve rapidly growing demand linux expertise vehicle available anyone anywhere world time point first offering basic introduction linux course library since expanded include intro cloud infrastructure technologies intro devops intro openstack november 16 2016 linux foundation announced microsoft traditionally seen competitor joined organization platinum member news widely recognized evidence industry-wide embrace open source software scott guthrie executive vice president microsoft cloud enterprise group explained company excited join linux foundation partner community help developers capitalize shift intelligent cloud mobile experiences linux foundation brought number notable changes open source industry 2017 inaugural open source summit los angeles collection open source guides enterprise created partnership todo group open source managers/executives announced provide transparency new open source projects looking solidify stance strategy staying power event also platform announce foundation chaoss project build platform analyzing open source projects despite rivalry rideshare market uber lyft displayed unity announcing two new projects cloud native computing foundation cncf umbrella open source summit january 23 2018 linux foundation announced six open source networking projects onap opnfv opendaylight fd.io pnda snas would united one umbrella project called lf networking fund lfn arpit joshipura formerly director networking orchestration foundation became executive director lfn heather kirksey formerly director opnfv became linux foundation vp nfv participation lfn voluntary networking projects free decide whether join fund projects continues maintain technical independence linux foundation dedicated building sustainable ecosystems around open source projects accelerate technology development commercial adoption home linux creator linus torvalds lead maintainer greg kroah-hartman provides neutral home linux kernel development protected accelerated years come also fosters innovation hosting collaborative events among linux technical community software developers industry end users solve pressing issues facing linux open source linux foundation supports linux community offering technical information education annual events open source leadership summit linux kernel developers summit open source summit formerly known linuxcon inaugurated september 2009 developer travel fund available introduced october 2017 community data license agreement cdla legal framework sharing data two initial cdla licenses march 3 2009 linux foundation announced would take management linux.com previous owners sourceforge inc site relaunched may 13 2009 shifting away previous incarnation news site become central source linux tutorials information software documentation answers across server desktop/netbook mobile embedded areas also includes directory linux software hardware much like linux linux.com plans rely community create drive content conversation linux foundation training program features instructors content straight leaders linux developer open source communities participants receive linux training vendor-neutral technically advanced created actual leaders linux development community linux foundation linux training courses online in-person events corporate onsite give attendees broad foundational knowledge networking needed thrive careers march 2014 linux foundation edx partnered offer free massive open online class titled introduction linux first series ongoing free offerings organizations whose current catalogue moocs include intro devops intro cloud foundry cloud native software architecture intro apache hadoop intro cloud infrastructure technologies intro openstack december 2015 linux foundation introduced self-paced course designed help prepare administrators openstack foundation certified openstack administrator exam part partnership microsoft announced december 2015 linux azure certification would awarded individuals pass microsoft exam 70-533 implementing microsoft azure infrastructure solutions linux foundation certified system administrator lfcs exam early 2017 annual open source leadership summit announced linux foundation would begin offering inclusive speaker orientation course partnership national center women information technology free course designed give participants practical skills promote inclusivity presentations patent commons consists patented software made available open source community software considered commons patent owner must guarantee developers sued infringement though may restrictions use patented code concept first given substance red hat 2001 published patent promise patent commons project launched november 15 2005 open source development labs osdl core project online patent commons reference library aggregating documenting information patent-related pledges legal solutions directed open-source software community project listed 53 patents linux foundation projects originally collaborative projects independently funded software projects harness power collaborative development fuel innovation across industries ecosystems 500 companies thousands developers around world contribute open source software projects september 2015 total lines source code present linux foundation collaborative projects 115,013,302 estimated total amount effort required retrace steps collaborative development projects 41,192.25 person years words would take 1,356 developers 30 years recreate code bases time total economic value development costs linux foundation collaborative projects estimated 5 billion continued investment open source projects growth number projects hosted number rose 15.6 billion september 2017 projects include alphabetical order alljoyn open source application framework connected devices services formed allseen alliance 2013 project sponsored independent linux foundation project open connectivity foundation ocf automotive grade linux agl collaborative open source project developing linux-based open platform connected car serve de facto standard industry although initially focused in-vehicle infotainment ivi agl roadmap includes instrument cluster heads display telematics autonomous driving goals agl provide june 30 2014 agl announced first release based tizen ivi primarily demo applications agl expanded first reference platform unified code base ucb distribution first ucb release nicknamed agile albacore released january 2016 leverages software components agl tizen genivi alliance ucb 2.0 nicknamed brilliant blowfish made available july 2016 included new features like rear seat display video playback audio routing application framework ucb 3.0 charming chinook released january 2017 agl plans support additional use cases instrument clusters telematics systems cgl workgroup main purpose interface network equipment providers carriers gather requirements produce specifications linux distribution vendors implement also serves use unimplemented requirements foster development projects assist upstream integration requirements cloud foundry open source multi cloud application platform service paas governed cloud foundry foundation 501 c 6 organization january 2015 cloud foundry foundation created independent not-for-profit linux foundation project foundation exists increase awareness adoption cloud foundry grow contributor community create cohesive strategy across member companies foundation serves neutral party holding cloud foundry intellectual property cloud native computing foundation cncf founded 2015 promote containers announced kubernetes 1.0 open source container cluster manager contributed foundation google seed technology founding members included google coreos mesosphere red hat twitter huawei intel cisco ibm docker univa vmware order establish qualified representatives technologies governed cncf program announced inaugural cloudnativeday toronto august 2016 serial entrepreneur dan kohn also helped launch cii project current executive director august 2018 google announced handing operational control project community kubernetes open source framework automating deployment managing applications containerized clustered environment aims provide better ways managing related distributed components across varied infrastructure originally designed google donated linux foundation form cloud native computing foundation kubernetes seed technology large diverse community supporting project made staying power robust older technologies ilk container network interface cni cloud native computing foundation project provides networking linux containers containerd industry-standard core container runtime currently available daemon linux windows manage complete container lifecycle host system 2015 docker donated oci specification linux foundation reference implementation called runc coredns dns server chains plugins cloud native computing foundation member project originally built lyft move architecture away monolith envoy high-performance open source edge service proxy makes network transparent applications lyft contributed envoy cloud native computing foundation september 2017 fluentd open source data collector allowing user unify data collection consumption better use understanding data grpc modern open source high performance rpc framework run environment project formed 2015 google decided open source next version rpc infrastructure stubby project number early large industry adopters square inc. netflix cisco created uber engineering jaeger open source distributed tracing system inspired google dapper paper openzipkin community used tracing microservice-based architectures including distributed context propagation distributed transaction monitoring root cause analysis service dependency analysis performance/latency optimization cloud native computing foundation technical oversight committee voted accept jaeger 12th hosted project september 2017 linkerd cncf member project providing resilient service mesh cloud native applications tool based jvm java virtual machine developers help improve communications among microservices notary open source project allows anyone trust arbitrary collections data opentracing cloud native computing foundation member project offers consistent expressive vendor-neutral apis popular platforms cloud native computing foundation member project prometheus cloud monitoring tool sponsored soundcloud early iterations tool currently used digital ocean ericsson coreos docker red hat google august 2018 tool designated graduated project cloud native computing foundation rkt cloud native computing foundation project pod-native container engine linux composable secure built standards update framework tuf helps developers secure new existing software update systems often found vulnerable many known attacks tuf addresses widespread problem providing comprehensive flexible security framework developers integrate software update system community health analytics open source software chaoss project announced 2017 open source summit north america los angeles overall project aims provide transparency health security metrics open-source projects code aurora forum consortium companies projects serving mobile wireless industry software projects concerns e.g android msm femto linux project llvm msm wlan linux-msm cord central office re-orchestrated datacenter combines sdn nfv cloud commodity infrastructure open building blocks project introduced on.lab june 2015 open networking summit team originally composed linux foundation onos project pmc-sierra sckipio started 2003 core embedded linux project aims provide vendor-neutral place establish core embedded linux technologies beyond linux foundation projects start linux foundation member company allowed apply membership core embedded linux project announced wake heartbleed fund support free open-source software projects critical functioning internet diamon workgroup works toward improving interoperability open source tools improve linux-based tracing profiling logging monitoring features according workgroup diamon aims accelerate development making easier work together common pieces data plane development kit consists libraries accelerate cpu architecture-running packet processing workloads according intel dpdk improve packet processing performance ten times started 2014 dronecode began open source collaborative project unite current future open source drone initiatives auspices linux foundation goal common shared open source stack unmanned aerial vehicles uavs chris anderson ceo 3d robotics founder diy drones serves chairman board directors lorenz meier creator px4 mavlink qgc pixhawk serves community representative board founded 2017 edgex foundry acts vendor-neutral interoperability framework hosted hardware os agnostic reference platform seeks enable ecosystem plug-and-play components uniting marketplace accelerating iot deployment project wants enable collaborators freely work open interoperable iot solutions existing self-created connectivity standards fast data project-referred fido provides io services framework next wave network storage software stack fd.io universal data plane fd.io runs completely user space said ed warnicke consulting engineer cisco chair fd.io technical steering committee fossology primarily project dedicated open source license compliance software system toolkit users able run licenses copyright export control scans command line database web ui provided compliance workflow frrouting frr ip routing protocol suite unix linux platforms incorporates protocol daemons bgp is-is ldp ospf pim rip hyperledger project global open source effort based around advancing cross-industry blockchain technologies addition hosted linux foundation backed finance banking iot supply chain manufacturing technology leaders project foundation fastest growing date boasting 115 members since founding 2016 may 2016 co-founder apache software foundation brian behlendorf joined project executive director io visor open source project community developers enable new way innovate develop share io networking functions advance io networking technologies address new requirements presented cloud computing internet things iot software-defined networking sdn network function virtualization nfv iotivity oss framework enabling seamless device-to-device connectivity aid internet things grows allseen alliance open connectivity foundation merged october 2016 iot projects alljoyn iotivity respectively continue operating linux foundation two projects collaborate support future versions ocf specification single iotivity implementation janusgraph aims continue open source development titandb graph database fork titandb distributed graph database originally released 2012 enable users find connections among large data sets composed billions vertices edges js foundation previously known jquery foundation according by-laws jsfoundation inc aims help development adoption important javascript technology foundation works facilitate collaboration within javascript development community foster javascript applications server-side projects providing best practices policies 2016 dojo foundation merged jquery foundation subsequently rebranded js foundation became linux foundation project notable projects supported js foundation include node-red appium jquery dojo toolkit qunit eslint grunt 2019 js foundation merged node.js foundation form new openjs foundation stated mission foster healthy growth javascript web ecosystem whole kinetic open storage project dedicated creating open source standard around ethernet-enabled key/value kinetic devices accessing drives creating standard expands available ecosystem software hardware systems developers project result alliance including major hard drive manufacturers- seagate toshiba western digital- addition cisco cleversafe dell digitalsense netapp open vstorage red hat scality linux standard base lsb joint project several linux distributions organizational structure linux foundation standardize software system structure filesystem hierarchy used linux operating system lsb based posix specification single unix specification several open standards extends certain areas according lsb lsb compliance may certified product certification procedure lsb specifies example standard libraries number commands utilities extend posix standard layout file system hierarchy run levels printing system including spoolers cups tools like foomatic several extensions x window system ltsi project created/supported hitachi lg electronics nec panasonic qualcomm atheros renesas electronics samsung electronics sony toshiba hosted linux foundation aims maintain common linux base use variety consumer electronics products similar linux foundation overall mission encouraging widespread adoption linux open source technology node.js foundation exists primarily accelerate development node.js platform foundation also operates open governance model heighten participation amongst vendors developers general node.js community structure gives enterprise users assurance innovation continuity without risk since launching 2015 foundation seen strong growth resulting new initiatives node security platform tool allowing continuous security monitoring node.js apps node interactive series professional conferences aimed today average node.js user node.js reports 3.5 million users annual growth rate 100 percent foundation among linux foundation fastest growing projects 2019 node.js foundation merged js foundation form new openjs foundation.. stated mission foster healthy growth javascript web ecosystem whole odpi hosts open source projects accelerate development delivery big data solutions.. aims deliver well-defined open source open data technologies run across distributed devices promotes technologies worldwide certification programs forms marketing onos open network operating system open source community mission bringing promise software-defined networking sdn communications service providers order make networks agile mobile data center applications better economics users providers oai committed standardizing rest apis described smartbear software donated swagger specification directly initiative new name specification openapi specification openbmc project collaborative open-source project whose goal produce open source implementation baseboard management controllers bmc firmware stack openchain project centered around managing enterprise compliance open source supply chains generally project described community effort establish best practices effective management open source software compliance 2015 docker coreos launched oci partnership linux foundation create set industry standards open around container formats runtime opendaylight leading open sdn platform aims accelerate adoption software-defined networking sdn network functions virtualization nfv service provider enterprise research networks openjs foundation founded 2019 merger js foundation node.js foundation stated mission foster healthy growth javascript web ecosystem providing neutral organization host projects collaboratively fund activities benefit ecosystem whole openjs foundation made 29 open source javascript projects including appium dojo jquery node.js webpack founding members included google microsoft ibm paypal godaddy joyent open mainframe project aims drive harmony across mainframe community developed shared tool sets resources project also endeavors heighten participation academic institutions educating mainframe linux engineers developers openmama open middleware agnostic messaging api lightweight vendor-neutral integration layer systems built top variety message-oriented middleware announced october 2017 goal openmessaging act vendor-neutral open standard distributed messaging/stream project supported alibaba verizon oath business unit others openprinting workgroup website belonging linux foundation provides documentation software support printing linux formed linuxprinting.org 2006 became part free standards group developed database lists wide variety printers various manufacturers database allows people give report support quality printer also give report support given linux printer vendor also created foomatic formerly cupsomatic script plugs common unix printing system cups opensds open source software defined storage controller journalist swapnil bhartiya explained cio formed create industry response address software-defined storage integration challenges goal driving enterprise adoption open standards supported storage users/vendors including dell huawei fujitsu hds vodafone oregon state university originally created nicira moving vmware eventually linux foundation ovs open source virtual switch supporting standard management interfaces protocols open network automation platform result open-o open ecomp projects merging april 2017 platform allows end users design manage automate services virtual functions open platform network function virtualization nfv aims carrier-grade integrated platform introduces new products services industry quickly 2016 project began internship program created working group end user advisory group founded users board pnda platform network data analytics platform scalable network analytics rounding data multiple sources network works apache spark crunch numbers order find useful patterns data effectively r consortium dedicated expanding use r language developing r consortium works r foundation organizations working broaden reach language consortium supported collection tech industry heavyweights including microsoft ibm oracle google esri real-time linux overall goal encouraging widespread adoption real time formed coordinate efforts mainline preempt rt assist maintainers continuing development work long-term support future research rt rethinkdb announced shutdown business linux foundation announced purchased intellectual property cloud native computing foundation project relicensed apache license aslv2 rethinkdb describes first open-source scalable json database built ground realtime web software package data exchange spdx project started 2010 create standard format communicating components licenses copyrights associated software packages part project team curates spdx license list defines list identifiers commonly found licenses exceptions used open source collaborative software streaming network analytics system project snas.io open source framework collect track millions routers peers prefixes routing objects real time snas.io linux foundation project announced may 2017 tizen free open-source standards-based software platform supported leading mobile operators device manufacturers silicon suppliers multiple device categories smartphones tablets netbooks in-vehicle infotainment devices smart tvs todo talk openly develop openly open source collective housed linux foundation helps companies interested open source collaborate better efficiently todo aims reach companies organizations want turn best open source projects programs todo group reaches across industries collaborate open source technical business leaders share best practices tools programs building dependable effective projects long term said jim zemlin collaboration summit 2016 xen project team global open source community develops xen hypervisor contributes linux pvops framework xen® cloud platform xen® arm yocto project open source collaboration project provides templates tools methods help create custom linux-based systems embedded products regardless hardware architecture founded 2010 collaboration among many hardware manufacturers open-source operating systems vendors electronics companies bring order chaos embedded linux development zephyr small real-time operating system connected resource-constrained devices supporting multiple architectures developed open source collaboration project released apache license 2.0 zephyr became project linux foundation february 2016 linux kernel community linux foundation hosts infrastructure organizes conferences linux kernel summit linux plumbers conference also hosts technical advisory board made linux kernel developers one developers appointed sit linux foundation board january 2016 linux foundation announced partnership goodwill central texas help hundreds disadvantaged individuals underserved communities variety backgrounds get training need start new lucrative careers linux fund deserving developers accelerate technical problem solving collaboration open source community linux foundation launched community developer travel fund sponsorships open elite community developers proven track record open source development achievement get funding attend technical events employers applications available core infrastructure initiative cii project managed linux foundation enables technology companies industry stakeholders esteemed developers collaboratively identify fund critical open source projects need assistance june 2015 organization announced financial support nearly 500,000 three new projects better support critical security elements global information infrastructure may 2016 cii launched best practice badge program raise awareness development processes project governance steps help projects better security outcomes may 2017 cii issued 100th badge passing project linux foundation open compliance program provides array programs open source software compliance focus initiative educate assist developers companies license requirements order build programs without friction program consists primarily self-administered training modules also meant include automated tools help programmatically identify license compliance issues june 2018 1000 members identify ideals mission linux foundation projects 500 silver members actively donate linux foundation funding linux foundation comes primarily platinum members paying us 500,000 per year according schedule lf bylaws adding us 4 million gold members contribute combined total us 1.6 million smaller members less april 2014 foundation collects annual fees worth least 6,245,000 usd linux foundation uses funds help fund infrastructure fellows including linus torvalds help develop linux kernel december 2018 100 donations received go towards funding diversity programs according organization web site linux foundation events creators maintainers practitioners important open source projects meet linux foundation events 2017 attract nearly 25,000 developers maintainers system administrators thought leaders business executives industry professionals 4,000 organizations across 85 countries many open source projects also co-locate events linux foundation events take advantage cross-community collaboration projects industry 2017 events cover various trends open source including big data cloud native containers iot networking security | [
2560,
4616,
2569,
3082,
6153,
5644,
5139,
9237,
10780,
4637,
9248,
10785,
3618,
546,
6180,
1573,
9255,
9257,
1584,
8242,
9266,
4149,
9786,
10303,
4161,
10817,
8772,
6213,
5708,
589,
1101,
8268,
593,
2134,
3162,
2658,
10851,
6244,
5222,
42... | None |
4,012 | 6 | High_Throughput_File_System:high throughput file system high throughput file system htfs journaling file system used current versions sco openserver successor eafs | [
5120,
2564,
6669,
3598,
10257,
9236,
6677,
5142,
8214,
3611,
9249,
9762,
5158,
7225,
11323,
8772,
1109,
4708,
9836,
7789,
9333,
6263,
9335,
9343,
7818,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
5286,
10405,
5293,
7344,
2230,
5816,
1... | Train |
4,013 | 4 | Genieo:genieo genieo innovation israeli company specializing unwanted software includes advertising user tracking software commonly referred potentially unwanted program adware privacy-invasive software grayware malware best known genieo application type also operate installmac distributes additional 'optional search modifying software applications 2014 genieo innovation acquired 34 million somoto another company bundles legitimate applications offers additional third party applications may unwanted user sector israeli software industry frequently referred download valley genieo innovation founded april 2008 sol tzvi jacob tenenboem first version genieo released september 2009 beta version launched demo2010 conference march 2010 genieo website suspected changed name inkeepr software installs onto computers makes almost impossible users remove hijacks user browser tracks browser usage intention mining information users complain acts like virus need run special programs remove genieo listed malware apple inc. xprotect anti-malware service built macintosh computers running mac os x snow leopard later may 2013 malicious installer distributed genieo partner softonic found security software company intego installer masquerades necessary update adobe flash player attempts install genieo.app without user interaction dynamic libraries added safari browser intercept searches intended bing google versions genieo mac also offered 'codecs required video playback testing carried genieo mac june 2013 found left active software behind using supplied uninstaller required detailed manual removal november 2013 another fake application installer reported include genieo adware january 2014 sophos added genieo mac threat list category viruses spyware trojan horse computing adware november 2014 genieo mac flagged intego mentioned according analysis virustotal 25 55 surveyed anti-malware solutions including ad-aware avast bitdefender comodo dr web eset fortinet f-secure kaspersky trend micro housecall sophos symantec july 2014 genieo acquired 34 million somoto another company bundles legitimate applications offers additional third party applications may unwanted user august 2015 malware researchers discovered genieo installer acquired access mac keychain automated click allow permission dialog keychain displayed code safari browser extension added genieo also contained immediately used earlier versions installer april 2019 osx.genieo locked user macbook air computer passwords stored secure note found missing mail account settings tampered genieo case became impetus rapid emergence similar adware search macshop ads macvx etc | [
1664,
131,
10756,
4490,
10126,
10392,
11418,
2076,
8615,
1834,
9771,
559,
7983,
9908,
10166,
7488,
9537,
10057,
1994,
5069,
10574,
2005,
4310,
5078,
5205,
6231,
2907,
7515,
6237,
735,
9055,
9569,
10722,
5605,
8169,
9451,
877,
8557,
11000,
... | Validation |
4,014 | 7 | HPCx:hpcx hpcx supercomputer actually cluster ibm eserver p5 575 high-performance servers located daresbury laboratory cheshire england supercomputer maintained hpcx consortium uoe hpcx ltd led university edinburgh epcc science technology facilities council ibm project funded epsrc hpcx service ended january 2010 | [
1480,
3323
] | Test |
4,015 | 4 | Electronic_seal:electronic seal electronic seal piece data attached electronic document data ensures data origin integrity term used eu regulation 910/2014 eidas regulation electronic transactions within internal european market conceptually similar electronic signatures usually technically realized digital signatures electronic seals serve evidence electronic document issued specific legal entity purpose electronic seal must linked data sealed way subsequent change data detectable also way fake seal created without access data usually private key used creation digital seal usually achieved use qualified digital certificate involved creation digital seal unique private key used creation digital seal ensures non-repudiation entity created digital seal later deny created seal document document modified digital seal created digital seal valid modified document checked anyone access public key corresponding private key used creation digital seal ensuring integrity sealed document besides authenticating document issued legal entity e-seals also used authenticate digital asset legal person software code servers important difference digital signature electronic seal latter usually created legal person digital signatures created natural person creation digital signature action person signing document data required contrast creation digital seals automatised incorporated processes executed automatically digital environment qualified electronic seal electronic seal compliant eu regulation 910/2014 eidas regulation electronic transactions within internal european market enables verify issuer document long periods time qualified electronic seals considered digital equivalent seals legal entities paper according eidas regulation qualified electronic seal must created qualified electronic device based qualified certificate electronic seal | [
1496,
8018,
5200,
3264
] | None |
4,016 | 4 | Medical_device_hijack:medical device hijack medical device hijack also called medjack type cyber attack weakness target medical devices hospital covered extensively press 2015 2016 medjack received additional attention 2017 function increase identified attacks globally research released early year hijacks may endanger patients remote control critical devices theft sensitive data medjack.3 seems additional sophistication designed reveal searches older vulnerable operating systems found embedded within medical devices ability hide sandboxes defense tools safe non vm environment considerable discussion debate topic rsa 2017 event special session medjack.3 debate ensued various medical device suppliers hospital executives audience vendors ownership financial responsibility remediate massive installed base vulnerable medical device equipment notwithstanding discussion fda guidance well intended may go far enough remediate problem mandatory legislation part new national cyber security policy may required address threat medjack sophisticated attacker tools used hospitals new variants ransomware seem targeted hospitals cyberattack attacker places malware within networks variety methods malware laden website targeted email infected usb stick socially engineered access etc malware propagates within network time existing cyber defenses clear attacker tools standard serves workstations endpoints cyber defense software access embedded processors within medical devices embedded operating systems within medical devices running microsoft windows 7 windows xp security operating systems longer supported relatively easy targets establish attacker tools inside medical devices cyber attacker finds safe harbor establish backdoor command control noted since medical devices fda certified hospital cyber security team personnel access internal software without perhsp incurring legal liability impacting operation device violating certification given open access medical devices penetrated attacker free move laterally discover targeted resources ss patient data quietly identified exfiltrated organized crime targets healthcare networks order access steal patient records virtually medical device impacted attack one earliest documented examples testing identified malware tools blood gas analyzer magnetic resonance imaging mri system computerized tomogram ct scan xray machines 2016 case studies became available showed attacker presence also centralized pacs imaging systems vital important hospital operations attack primarily centers largest 6,000 hospitals global basis healthcare data highest value stolen identity data given weakness security infrastructure within hospitals creates accessible highly valuable target cyber thieves besides hospitals impact large physician practices accountable care organizations acos independent physician associations ipas skilled nursing facilities snfs acute care long term surgical centers diagnostic laboratories many reports hospitals hospital organizations getting hacked including ransomware attacks windows xp exploits viruses data breaches sensitive data stored hospital servers various informal assessments estimated medjack currently impacts majority hospitals worldwide remains undetected bulk technologies necessary detect medjack lateral movement attackers command control within targeted medical devices installed great majority hospitals time 3.2.2017 statistic would note hospital 500 beds roughly 15 medical devices usually internet things iot connected per bed addition centralized administration systems hospital diagnostic labs utilized medical devices emr/ehr systems ct/mri/x-ray centers within hospital attacks hard detect even harder remediate deception technology evolution automation honeypot honeygrid networks trap lure attackers move laterally within networks medical devices typically must software reloaded manufacturer hospital security staff equipped able access internals fda approved devices become reinfected quickly takes one medical device potentially re-infect rest hospital 28 december 2016 us food drug administration released recommendations legally enforceable medical device manufacturers maintain security internet-connected devices | [
1251,
5002,
4689,
1970,
2324,
7899,
2558
] | Test |
4,017 | 3 | POWER7:power7 power7 family superscalar symmetric multiprocessors based power isa 2.06 instruction set architecture released 2010 succeeded power6 power7 developed ibm several sites including ibm rochester mn austin tx essex junction vt t. j. watson research center ny bromont qc ibm deutschland research development gmbh böblingen germany laboratories ibm announced servers based power7 8 february 2010 ibm 244 million darpa contract november 2006 develop petascale supercomputer architecture end 2010 hpcs project contract also states architecture shall available commercially ibm proposal percs productive easy-to-use reliable computer system contract based power7 processor aix operating system general parallel file system one feature ibm darpa collaborated modifying addressing page table hardware support global shared memory space power7 clusters enables research scientists program cluster single system without using message passing productivity standpoint essential since scientists conversant mpi parallel programming techniques used clusters power7 superscalar symmetric multiprocessor architecture substantial evolution power6 design focusing power efficiency multiple cores simultaneous multithreading smt power6 architecture built ground maximize processor frequency cost power efficiency achieved remarkable 5 ghz power6 features dual-core processor capable two-way simultaneous multithreading smt ibm power 7 processor eight cores four threads per core total capacity 32 simultaneous threads ibm stated isca 29 peak performance achieved high frequency designs 10–20 fo4 delays per pipeline stage cost power efficiency however power6 binary floating-point unit achieves 6-cycle 13-fo4 pipeline therefore pipeline power7 cpu changed power5 power6 designs respects rework similar intel turn 2005 left p4 7th-generation x86 microarchitecture power7 superscalar symmetric multiprocessor available 4 6 8 physical cores per microchip 1 32-way design 1024 smts slightly different microarchitecture interfaces supporting extended/sub-specifications reference power isa and/or different system architectures example supercomputing hpc system power 775 packaged 32-way quad-chip-module qcm 256 physical cores 1024 smts also special turbocore mode turn half cores eight-core processor 4 cores access memory controllers l3 cache increased clock speeds makes core performance higher important workloads require fastest sequential performance cost reduced parallel performance turbocore mode reduce software costs half applications licensed per core increasing per core performance software new ibm power 780 scalable high-end servers featuring new turbocore workload optimizing mode delivering double performance per core power6 based systems core capable four-way simultaneous multithreading smt power7 approximately 1.2 billion transistors 567 mm large fabricated 45 nm process notable difference power6 power7 executes instructions out-of-order instead in-order despite decrease maximum frequency compared power6 4.25 ghz vs 5.0 ghz core higher performance power6 processor 4 times number cores power7 specifications power7 processor core implements aggressive out-of-order ooo instruction execution drive high efficiency use available execution paths power7 processor instruction sequence unit capable dispatching six instructions per cycle set queues eight instructions per cycle issued instruction execution units power7 processor set twelve execution units described gives following theoretical single precision sp performance figures based 4.14 ghz 8 core implementation 4 64-bit simd units per core 128-bit simd vmx unit per core 12 multiply-adds per cycle giving 24 sp fp ops per cycle 4.14 ghz gives 4.14 billion 24 99.36 sp gflops 8 cores 794.88 sp gflops peak double precision dp performance roughly half peak sp performance comparison latest microarchitecture intel haswell came 3 years later power7 16 dp flops 32 sp flops per cycle 8/16 dp/sp fused multiply-add spread across 2× 256 bit avx2 fp vector units 3.4 ghz i7-4770 translates 108.8 sp gflops per core 435.2 sp gflops peak performance across 4-core chip giving roughly similar levels performance per core without taking account effects benefits intel turbo boost technology theoretical peak performance comparison holds practice power7 i7-4770 obtaining similar scores spec cpu2006 floating point benchmarks single-threaded 71.5 power7 versus 74.0 i7-4770 notice power7 chip significantly outperformed 2×–5× i7 benchmarks bwaves cactusadm lbm also significantly slower 2x-3x others indicative major architectural differences two chips mainboards memory systems etc designed different workloads mind however overall broad sense one say floating-point performance power7 similar haswell i7 ibm introduced power7+ processor hot chips 24 conference august 2012 updated version higher speeds cache integrated accelerators manufactured 32 nm fabrication process first boxes ship power7+ processors ibm power 770 780 servers chips 80 mb l3 cache 10 mb/core improved clock speeds 4.4 ghz 20 lpars per core range power7 systems includes express models 710 720 730 740 750 enterprise models 770 780 795 high performance computing models 755 775 enterprise models differ capacity demand capabilities maximum specifications shown table ibm also offers 5 power7 based bladecenters specifications shown table following supercomputer projects use power7 processor | [
6914,
4868,
10501,
3846,
4743,
6663,
5642,
1548,
1933,
398,
3472,
4881,
5393,
6677,
407,
7065,
1563,
1309,
6815,
3493,
6949,
6311,
8102,
1321,
9391,
10543,
5297,
7218,
10675,
8120,
6715,
9020,
1725,
2237,
1983,
1985,
10180,
1480,
8523,
62... | Validation |
4,018 | 1 | Australian_Research_Data_Commons:australian research data commons australian research data commons ardc limited company formed 1 july 2018 combining australian national data service ands nectar national eresearch collaboration tools resources research data services rds purpose enable australian researchers industry access nationally significant einfrastructure skills platforms data collections ands established 2008 order help address challenges storing managing making accessible australia research data joint collaboration monash university australian national university csiro manages research data australia web portal enables access data 100 australian research organisations cultural institutions government agencies nectar established 2009 australian government project directorate establish infrastructure university melbourne created 2011 research data services project provides service development prioritised areas research continuing operational support infrastructure accesses data national collections project led monash university collaboration australian national university anu csiro created basis full ands implementation aim allow researchers identify locate access analyse available research data transforming large number scattered disparate collections around australia cohesive accessible body resources importance eresearch infrastructure australian future research competitiveness emphasised prime reason funding provided australian government national collaborative research infrastructure strategy ncris part funding agreement department innovation industry science research diisr monash university september 2008 mid-2009 ands funded education investment fund eif establishment australian research data commons australian government ’ super science initiative research data australia formerly ands collections registry ands significant service web portal enables access data 100 australian research organisations cultural institutions government agencies online research collections australia orca registry software utility drove ands collections registry precursor research data australia used names online discovery service run ands allows researchers publicise existence research data enables prospective users data find research data australia made use iso 2146-based rif-cs metadata standard research data services project continuation research data storage infrastructure rdsi national collaboration tools resources project nectar established 2009 australian government budget part super science initiative financed education investment fund eif since received government funding well similar investment australian universities research institutions project got ground 2011 university melbourne partners research communities develop manage 12 virtual laboratories 16 e-research tools national research cloud known nectar cloud 10,000 users three organisations created aligned set investments business plans 2017/8 order integrate work line 2016 national research infrastructure ncris roadmap created department education training monash university remains lead agent ands university queensland lead agent rds university melbourne lead agent nectar | [] | Test |
4,019 | 9 | Gekko_(optimization_software):gekko optimization software gekko python package solves large-scale mixed-integer differential algebraic equations nonlinear programming solvers ipopt apopt bpopt snopt minos modes operation include machine learning data reconciliation real-time optimization dynamic simulation nonlinear model predictive control addition package solves linear programming lp quadratic programming qp quadratically constrained quadratic program qcqp nonlinear programming nlp mixed integer programming mip mixed integer linear programming milp gekko available python installed pip pypi python software foundation gekko works platforms python 2.7 3+ default problem sent public server solution computed returned python windows macos linux arm raspberry pi processor options solve without internet connection gekko extension apmonitor optimization suite integrated modeling solution visualization directly within python mathematical model expressed terms variables equations hock schittkowski benchmark problem 71 used test performance nonlinear programming solvers particular optimization problem objective function formula_1 subject inequality constraint formula_2 equality constraint formula_3 four variables must lower bound 1 upper bound 5 initial guess values formula_4 optimization problem solved gekko shown applications include cogeneration power heat drilling automation severe slugging control solar thermal energy production solid oxide fuel cells flow assurance enhanced oil recovery essential oil extraction unmanned aerial vehicles uavs many references apmonitor gekko sample types applications solved gekko developed national science foundation nsf research grant 1547110 detailed special issue collection combined scheduling control notable mentions gekko listing decision tree optimization software added support apopt bpopt solvers projects reports online dynamic optimization course international participants gekko topic online forums users solving optimization optimal control problems gekko used advanced control temperature control lab tclab process control education 20 universities one application machine learning perform regression training data build correlation example deep learning generates model training data generated function formula_5 artificial neural network three layers used example first layer linear second layer hyperbolic tangent activation function third layer linear program produces parameter weights minimize sum squared errors measured data points neural network predictions points gekko uses gradient-based optimizers determine optimal weight values instead standard methods backpropagation gradients determined automatic differentiation similar popular packages problem solved constrained optimization problem converged solver satisfies karush–kuhn–tucker conditions using gradient-based optimizer allows additional constraints may imposed domain knowledge data system neural network model tested across range training data well extrapolation demonstrate poor predictions outside training data predictions outside training data set improved hybrid machine learning uses fundamental principles available impose structure valid wider range conditions example hyperbolic tangent activation function hidden layer 2 could replaced sine cosine function improve extrapolation final part script displays neural network model original function sampled data points used fitting optimal control use mathematical optimization obtain policy constrained differential formula_6 equality formula_7 inequality formula_8 equations minimizes objective/reward function formula_9 basic optimal control solved gekko integrating objective transcribing differential equation algebraic form orthogonal collocation finite elements | [
5830,
329,
8554,
7983,
1039,
8113,
9915,
6718
] | Test |
4,020 | 7 | Techila_Grid:techila grid techila distributed computing engine earlier known techila grid commercial grid computing software product speeds simulation analysis computational applications enabling scalability across resources user on-premises data center user cloud account techila distributed computing engine developed licensed techila technologies ltd privately held company headquartered tampere finland product also available on-demand solution google cloud launcher online marketplace created operated google according idc solution enables organizations create hpc infrastructure without major capital investments operating expenses required new hpc hardware techila distributed computing engine distributed computing middleware management solution used access manage on-premises cloud resources various high-performance computing hpc computing uses including high-throughput computing htc scenarios creates scalable computing service execution environment also support applications deployed within production environments technology techila distributed computing engine built autonomic computing architecture patented techila technologies enabled features automated system management fault tolerance simplify deployment use administration large-scale distributed computing systems techila distributed computing engine includes techila distributed computing engine set limitations physical location distance computing resources used system product description techila distributed computing engine lists three supported system designs techila technologies offers also tools enable automated provisioning integration cloud-based resources grid techila server java-based software product optimizes performance techila distributed computing engine environment jobs optimization done techila server supports large jobs also makes system suitable running small computational jobs performance techila distributed computing engine different scenarios evaluated thesis tampere university technology originally techila server delivered embedded appliance embedded appliance product discontinued 2012 currently techila server delivered either virtual appliance using cloud-specific deployment tools techila worker software agent must installed computer participate techila distributed computing engine environment computers physical virtualized computers running hypervisor cloud virtual machine techila distributed computing engine supports following public cloud services microsoft azure amazon ec2 amazon elastic compute cloud google compute engine techila worker software installed computer authenticate computer techila server using certificate system use self-management automatically configure computer run jobs received techila server techila worker java-based client middleware component run microsoft windows linux client computers participating techila distributed computing engine system different hardware software platforms techila worker software runs lowest possible priority computer techila worker also interoperable batch-queuing systems like slurm torque oracle grid engine previously known sun grid engine sge interoperability allows existing hpc users use existing infrastructures part techila distributed computing engine system without techila worker interfering system techila sdk earlier known techila grid management kit techila gmk library software components connect applications techila distributed computing engine environment sdk includes plug-ins many commonly used research development tools languages matlab r python perl java c .net c/ c++ fortran command-line interface script applications developed using application programming interfaces techila sdk also deployed within production environments run service soa environment techila sdk supports windows linux operating systems web-based administrator user interface provides administrators simplified easy-to-use interface techila server administrator user interface allows monitoring system activity view control job execution execution policy monitor control techila workers techila worker groups control security settings manage users techila technologies says development techila distributed computing engine technology started initially vision grid computing enablement fast simulation analysis without complexity traditional high-performance computing security techila distributed computing engine evaluated nixu ltd 2008 nixu finland largest specialist company information security consulting many global corporates customers techila distributed computing engine accepted security-sensitive industry sectors finance insurance engineering pharmaceutical techila distributed computing engine demonstrated research team university helsinki 2011 capable providing autonomic management computing environments large numbers windows azure cloud instances university helsinki also demonstrated techila distributed computing engine ability enhance usability utilization large-scale cluster resources projects implemented using matlab r python java c/ c++/ c techila distributed computing engine system computational resources arranged device groups organizational security compliance administrative control despite performance large-scale systems csc center science also suitable smaller environments tutgrid utilizes idle capacity desktop pcs computers tampere university technology tut scientific computing | [
5956,
8582,
5833,
8554,
940,
5677,
6797,
1935,
7983,
3573,
2710,
823,
8122,
2045,
7326
] | Test |
4,021 | 3 | Jose_Duato:jose duato josé francisco duato marín alberic valencia 1958 spanish professor researcher awarded national prize research julio rey pastor 2009 king jaime prize new technologies 2006 research based mainly field interconnection networks develops role full professor department computer engineering disca polytechnic university valencia first author book interconnection networks engineering approach published united states ieee computer society press 1997 morgan kaufmann 2002 quoted book interconnection networks existence today 1400 citations used engineers designing interconnection networks market-leading companies ibm compaq intel sun microsystems provide doctoral programs especially united states co-author chapter interconnection networks fourth edition book computer architecture quantitative approach john hennessy dave patterson widely used cited book computer architecture available today 8000 citations total 2009 prof. duato received prestigious national award “ julio rey pastor “ field mathematics information technologies communications contributions international importance field interconnection networks transference results industry | [
9665,
3323,
9932
] | None |
4,022 | 6 | United_States_v._Fricosu:united states v. fricosu united states v. fricosu 841 f.supp.2d 1232 d. col 2012 federal criminal case colorado addressed whether person compelled reveal encryption passphrase password despite u.s. constitution fifth amendment protection self-incrimination january 23 2012 judge robert e. blackburn held writs act fricosu required produce unencrypted hard drive fricosu attorney claimed possible remember password month later fricosu ex-husband handed police list potential passwords one passwords worked rendering self-incrimination issue moot electronic frontier foundation filed amicus brief support fricosu fricosu subsequently entered plea agreement 2013 meaning question defendant right resist mandatory decryption addressed higher court time future case addressing issue arises | [
7040,
3629,
4022
] | Validation |
4,023 | 4 | Code_Shikara:code shikara code shikara hassan arshad computer worm related dorkbot family attacks social engineering 2011 code first identified danish cyber security company csis av-company sophos reported november 2011 threat mainly spreads malicious links social network facebook 2013 bitdefender labs caught blocked worm capable spying users browsing activities meanwhile stealing personal online/offline information and/or credentials commonly known cybercrime infection originally flagged online backup service mediafire detected worm distributed camouflaged image file despite misleading extension mediafire successfully identified malicious image .exe-file malicious shikara code poses .jpeg image indeed executable file irc bot malware simply integrated attackers control command server besides stealing usernames passwords bot herder may also order additional malware downloads mediafire taken steps address incorrect misleading file extensions update identifies displays short description identifying specific file types help users specific threat file sharing service also blocks files double extensions .jpg.exe .png.exe .bmp.exe like usual malware backdoor.ircbot.dorkbot update installed victim computer related devices biggest risk someone facebook contacts may account already compromised due sloppy password security granting access rogue application account user allured clicking link seemingly posted one friends although links pretend point image truth malicious screensaver hidden behind icon two blonde women code launched attempts download malicious software hosted specific compromised israeli domain malware currently present israeli website remains message seemingly intruders says likely using additional websites continuing spreading cyber attack popular baits tricking users click malicious links include rihanna taylor swift sex tapes | [
3072,
3969,
6786,
7809,
7044,
10245,
10756,
8,
9356,
9233,
8978,
4863,
4883,
8959,
278,
10392,
1690,
3867,
2075,
10141,
5281,
2213,
6565,
8998,
9256,
939,
9771,
1970,
10166,
3643,
6588,
7739,
9791,
1088,
3395,
4165,
2508,
4945,
467,
7515,... | Test |
4,024 | 3 | GoWarrior:gowarrior gowarrior open-source community-supported computing platform gowarrior designed world makers hackers educators hobbyists newbies build electronics projects offers complete package hardware software cloud service tiger board single-board computer performs hardware gowarrior platform contains arm cortex a9 based m3733-afaaa soc arm mali-400 mp2 well integrated 1gb ddr3 ram gowarrior specifications godroid android kitkat 4.4.4. based optimized operating system gowarrior platform addition original android functionalities godroid pre-integrates useful middleware components libraries well self-developed function blocks makes also software development kit android applications godroid supports booting nand flash microsd card contains boot code image files replacing android native media engine stagefright gstreamer utilizing hardware acceleration facilities godroid supports various audio/video/container hardware decoding multiple network protocols including microsoft smooth streaming http live streaming kodi 14.2 variety supported video/audio plug-ins besides screen mirroring function android miracast godroid also implements dlna system service sharing digital media among multimedia devices dmr dms dmp supported addition c/c++/java godroid also integrates qpython2engine python2 programming android tiger board provides 2 sets 40-pin expansion headers one compatible raspberry pi connector raspberry pi python applications ported run godroid godroid supports android studio application ide api level 19 configuration match godroid provides availability original android api also proprietary extended api gpio/ic2/spi/pwm godroid supports standard adb debugging via ethernet wi-fi usb gobian linux-embedded operating system running tiger board gowarrior platform gobian developed based raspbian debian 7 wheezy armhf differs raspbian extra features example gobian encapsulates rpi.gpio i/o libraries facilitate transplanting projects use related libraries raspberry pi tiger board furthermore gobian provides support multimedia integrating gof kodi middle-ware modules applications out-of-the-box gobian enables internet connection ethernet wi-fi ethernet port wi-fi module tiger board thus supports various methods access projects transfer data ftp ssh gobian automatically synchronizes system time internet time servers using ntp protocol gobian integrates built-in file system data management c c++ python perl shell script gobian lets call gpio/i2c/uart/spi interfaces directly projects built-in rpi.gpio libraries gobian makes easy secondary development multimedia applications customized gof middle-ware tiger board on-board m3733-afaaa processor makes gobian multitasking system good performance software programs available debian basically compatible gobian gobian supports ultra-power-saving sleep mode pmu standby entire board power consumption low 0.35w gobian integrates dlna fully support multimedia sharing multi-screen interaction gowarrior community already launched support projects gobian cloudq comprehensive back-end community support help users easily build projects | [
8582,
1427,
10387,
2838,
11674,
10658,
5677,
8122,
7745,
7364,
11601,
11487,
4194,
3045,
10341,
8554,
8940,
1776,
2811,
2045
] | Test |
4,025 | 9 | Alain_Colmerauer:alain colmerauer alain colmerauer 24 january 1941 – 12 may 2017 french computer scientist professor aix-marseille university creator logic programming language prolog alain colmerauer born 24 january 1941 carcassonne graduated grenoble institute technology earned ph.d. ensimag grenoble colmerauer spent 1967–1970 assistant professor university montreal created q-systems one earliest linguistic formalisms used development taum-meteo machine translation prototype developing prolog iii 1984 one main founders field constraint logic programming colmerauer became associate professor aix-marseille university luminy 1970 promoted full professor 1979 1993 1995 head laboratoire d'informatique de marseille lim joint laboratory centre national de la recherche scientifique university de provence university de la mediterranee despite retiring emeritus professor 2006 remained member artificial intelligence taskforce luminy colmerauer award regional council provence-alpes-côte d'azur 1985 michel monpetit award french academy sciences 1986 made knight legion honour french government became fellow american association artificial intelligence 1991 received acp research excellence award principles practice constraint programming 2008 also correspondent french academy sciences area mathematics colmerauer died 12 may 2017 | [
5187,
8421,
4774,
1672,
3276,
9264,
1269,
8057,
7164
] | Test |
4,026 | 7 | Cluster-aware_application:cluster-aware application cluster-aware application software application designed call cluster apis order determine running state case manual failover triggered cluster nodes planned technical maintenance automatic failover required computing cluster node encounters hardware software failure maintain business continuity cluster-aware application may capable failing lan wan | [
4274,
3450,
5658
] | Train |
4,027 | 4 | February_2010_Australian_cyberattacks:february 2010 australian cyberattacks february 2010 australian cyberattacks series denial-of-service attacks conducted anonymous online community australian government response proposed web censorship regulations operation titstorm name given cyber attacks perpetrators resulted lapses access government websites 10 11 february 2010 accompanied emails faxes phone calls harassing government offices actual size attack number perpetrators involved unknown estimated number systems involved ranged hundreds thousands amount traffic caused disruption multiple government websites australian telecommunications minister stephen conroy proposed regulations would mainly filter sites pornographic content various groups advocating uncensored access internet along companies like google yahoo object proposed filter spokesperson conroy said actions legitimate form protest called irresponsible attacks also drew criticism filter protest groups initial stage followed small in-person protests 20 february called project freeweb attack began protest responding plan australian telecommunications minister stephen conroy would require internet service providers block australian users accessing illegal government deemed unwanted content websites blocked feature pornography showing rape bestiality child sex abuse small-breasted women may appear legal age female ejaculation drawn depictions acts included proposal proposed filter also includes gambling sites along others showing drug use leaked version proposed blacklist also referred refused classification rc list also showed sites include adult content name operation titstorm reference material would censored google questioned proposal saying prohibitions would broad strongly opposed free speech groups poll conducted mcnair ingenuity research hungry beast television program found 80 1,000 respondents favour concept plan survey also found 91 concerned government intent keep list filtered websites secret department defence cyber security operations centre discovered attack coming 5 february statement released anonymous press two days attack said government right refuse citizens access information solely perceive 'unwanted went read australian government learn one mess porn one messes access perfectly legal illegal content reason anonymous previously garnered media attention protests church scientology project chanology iranian government september 2009 prime minister kevin rudd website hacked similar protest proposed web censorship reforms flyers distributed recruit participants said attack begin 8 pm aest 10 february day government websites targeted denial-of-service attacks communications department said hackers infiltrated government security instead swamped government computer servers sites left unavailable sporadic periods throughout attack one point australian parliament website offline two days due high volume requests rudd government site also inaccessible time primary target communications department also received large amount traffic government offices also flooded e-mail spam junk faxes prank phone calls prime minister homepage vandalized pornographic images flyer released attack called faxes focus cartoon pornography female ejaculation small-breasted pornography reports actual size attack varied one cyber security expert described attacks equivalent parking truck across driveway shopping centre firm marketing security technology said peak attack relatively low 16.84 megabits per second one writer described 7.5 million requests per second initially brought parliament website massive site usually receives hundred per second appears botnets made compromised computers used estimates number attacking systems involved ranged hundreds thousands spokeswoman conroy said attacks legitimate political protest according totally irresponsible potentially deny services australian public systems administrators guild australia said condemned ddos attacks wrong way express disagreement proposed law anti-censorship groups criticised attacks saying hurt cause purported spokesperson attackers recommended wider australian public protest filter signing petition electronic frontiers australia anonymous coordinated second phase small protests outside parliament house canberra major cities throughout australia 20 february additional demonstrations held country embassies overseas organizers called follow-up protests project freeweb differentiate criticised cyber attacks several supporters attack later said messageboard taking websites enough convince government back web filtering policy called violence others disagreed actions proposed launching additional attack popular government site spokesman electronic frontiers australia said believed real intention capacity follow violent threats attack also resulted criticism australia terrorism laws university new south wales law journal one writer wrote provisions leave place legitimate acts online protest least sets penalty far high relatively minor cyber-vandalism australian teenager charged four counts inciting hackers impair electronic communications two unauthorised access restricted data role attack ordered pay bond instead convicted pleading guilty showing good behaviour july 2010 conroy delayed implementing plan pending 12-month review refused classification content rated proposal expected go forward due opposition coalition greens internet service providers telstra optus agreed voluntarily block content | [
1024,
5636,
4117,
8726,
535,
8735,
9761,
4644,
4133,
1608,
3657,
8779,
4703,
8288,
8292,
10875,
3711,
8320,
5764,
2187,
4240,
1688,
2717,
9375,
9904,
9395,
8886,
3789,
4304,
4314,
9435,
4830,
3807,
5349,
1254,
10477,
9460,
7418,
2815,
384... | Test |
4,028 | 0 | Conceptual_dependency_theory:conceptual dependency theory conceptual dependency theory model natural language understanding used artificial intelligence systems roger schank stanford university introduced model 1969 early days artificial intelligence model extensively used schank students yale university robert wilensky wendy lehnert janet kolodner schank developed model represent knowledge natural language input computers partly influenced work sydney lamb goal make meaning independent words used input i.e two sentences identical meaning would single representation system also intended draw logical inferences model uses following basic representational tokens set conceptual transitions act representation e.g atrans used represent transfer give take ptrans used act locations move go mtrans represents mental acts tell etc sentence john gave book mary represented action atrans two real world objects john mary | [
2167
] | None |
4,029 | 9 | Sysquake:sysquake sysquake numerical computing environment based programming language mostly-compatible matlab offers facilities interactive graphics give insights problems analyzed used teaching research engineering sysquake supports two kinds codes libraries collections related functions extend sysquake capabilities sq files applications interactive graphics menus sysquake pro also extended plugins several applications share large part sysquake code libraries usually compatible applications | [
8262,
6797,
7983,
2804,
823,
7326
] | None |
4,030 | 3 | Explicit_data_graph_execution:explicit data graph execution explicit data graph execution edge type instruction set architecture isa intends improve computing performance compared common processors like intel x86 line edge combines many individual instructions larger group known hyperblock hyperblocks designed able easily run parallel parallelism modern cpu designs generally starts plateau eight internal units one four cores edge designs intend support hundreds internal units offer processing speeds hundreds times greater existing designs major development edge concept led university texas austin darpa polymorphous computing architectures program stated goal producing single-chip cpu design 1 tflops performance 2012 yet realized 2018 almost computer programs consist series instructions convert data one form another instructions require several internal steps complete operation time relative performance cost different steps changed dramatically resulting several major shifts isa design 1960s memory relatively expensive cpu designers produced instruction sets densely encoded instructions data order better utilize resource instance codice_1 instruction would provided many different forms would gather b different places main memory indexes registers providing different instructions allowed programmer select instruction took least possible room memory reducing program needs leaving room data instruction set tried provide every possible access mode every possible instruction like dec vax known orthogonal considered paragon design style memory access wide variety modes led instruction sets hundreds different instructions style known today cisc complex instruction set computing late 1970s memory become cheap cost lower performance cpu designs ran many times faster memory talked new regime orthogonality became undesirable versions instructions took room cpu little nothing improve performance communicated slow memory time memory savings unnecessary period risc reduced instruction set computing design philosophy flourished basic aim reduce access memory much possible using internal high-performance registers instructions side-effect wide variety different modes instructions disappeared might one codice_2 instruction instead many removing instructions reduced complexity instruction decoder freed considerable space cpu space used greatly increase number registers 1990s chip design fabrication process grew point possible build commodity processor every potential feature built improve performance cpu designs started adding internal parallelism becoming superscalar program instructions work unrelated data adding functional units instructions run time new portion cpu scheduler looks independent instructions feeds units taking outputs re-ordering externally appears ran succession amount parallelism extracted superscalar designs limited number instructions scheduler examine interdependencies examining greater number instructions improve chance finding instruction run parallel cost increasing complexity scheduler despite massive efforts cpu designs using classic risc cisc isa plateaued three four functional units additional performance wrung systems examining instructions find ones operate different types data adding units dedicated sort data led introduction floating point units recently single instruction multiple data simd units drawback approach makes cpu less generic feeding cpu program uses almost floating point instructions instance bog fpus units sit idle recent problem modern cpu designs delay talking registers general terms size cpu die remained largely time size units within cpu grown much smaller units added means relative distance one function unit global register file grown time introduced order avoid delays talking main memory global register file become delay worth avoiding delays talking memory price fell suggested radical change isa instruction set architecture cisc risc designers considering whether problems scaling parallelism increasing delays talking registers demands another switch basic isa among ways introduce new isa long instruction word vliw architectures typified itanium vliw moves scheduler logic cpu compiler much memory longer timelines examine instruction stream static placement static issue execution model works well delays known presence cache latencies filling instruction words proven difficult challenge compiler instruction might take five cycles data cache could take hundreds compiler way know whether data cache runtime determined overall system load factors nothing program compiled key performance bottleneck traditional designs data instructions operate theoretically scattered memory memory performance dominates overall performance classic dynamic placement dynamic issue designs seem reached limit performance capabilities vliw uses static placement static issue model proven difficult master runtime behavior programs difficult predict properly schedule advance edge architectures new class isa based static placement dynamic issue design edge systems compile source code form consisting statically-allocated hyperblocks containing many individual instructions hundreds thousands hyperblocks scheduled dynamically cpu edge thus combines advantages vliw concept looking independent data compile time superscalar risc concept executing instructions data becomes available vast majority real-world programs linkage data instructions obvious explicit programs divided small blocks referred subroutines procedures methods depending era programming language used generally well-defined entrance exit points data passed information lost high level language converted processor much simpler isa information useful modern compilers generalized concept basic block attempting identify within programs optimize memory access registers block instructions control statements predicated instructions dataflow graph encoded using blocks specifying flow data one block instructions another storage area basic idea edge directly support operate blocks isa level since basic blocks access memory well-defined ways processor load related blocks schedule output one block feeds directly one consume data eliminates need global register file simplifies compiler task scheduling access registers program whole instead basic block given local registers compiler optimizes access within block much simpler task edge systems bear strong resemblance dataflow languages 1960s–1970s 1990s dataflow computers execute programs according dataflow firing rule stipulates instruction may execute time operands available due isolation data similar edge dataflow languages inherently parallel interest followed general interest massive parallelism solution general computing problems studies based existing cpu technology time demonstrated would difficult dataflow machine keep enough data near cpu widely parallel precisely bottleneck modern fabrication techniques solve placing hundreds cpu memory single die another reason dataflow systems never became popular compilers era found difficult work common imperative languages like c++ instead dataflow systems used dedicated languages like prograph limited commercial interest decade compiler research eliminated many problems key difference dataflow edge approaches edge designs intend work commonly used languages edge-based cpu would consist one small block engines local registers realistic designs might hundreds units units interconnected using dedicated inter-block communication links due information encoded block compiler scheduler examine entire block see inputs available send engine execution need examine individual instructions within small increase complexity scheduler examine multiple blocks see outputs one fed inputs another place blocks units reduce inter-unit communications delays modern cpu examines thousand instructions potential parallelism complexity edge allows examine thousand hyperblocks one consisting hundreds instructions gives scheduler considerably better scope additional cost pattern operation gives concept name graph string blocks connected data flowing another advantage edge concept massively scalable low-end design could consist single block engine stub scheduler simply sends blocks called program edge processor intended desktop use would instead include hundreds block engines critically changes designs physical layout chip private information known scheduler program written single-unit machine would run without changes desktop version albeit thousands times faster power scaling likewise dramatically improved simplified block engines turned required linear effect power consumption perhaps greatest advantage edge concept suitable running sort data load unlike modern cpu designs different portions cpu dedicated different sorts data edge cpu would normally consist single type alu-like unit desktop user running several different programs time would get much parallelism scientific user feeding single program using floating point cases scheduler would simply load every block could units low level performance individual block engines would match dedicated fpu instance would attempt overwhelm advantage massive parallelism university texas austin developing edge isa known trips order simplify microarchitecture cpu designed run trips isa imposes several well-defined constraints trips hyperblock trips compiler statically bundles instructions hyperblocks also statically compiles blocks run particular alus means trips programs dependency precise implementation compiled 2003 produced sample trips prototype sixteen block engines 4 4 grid along megabyte local cache transfer memory single chip version trips fabbed ibm canada using 130 nm process contains two grid engines along shared level-2 cache various support systems four chips gigabyte ram placed together daughter-card experimentation trips team set ultimate goal producing single-chip implementation capable running sustained performance 1 tflops 50 times performance high-end commodity cpus available 2008 dual-core xeon 5160 provides 17 gflops cmu cash compiler produces intermediate code called pegasus cash trips similar concept cash targeted produce output specific architecture therefore hard limits block layout university washington wavescalar architecture substantially similar edge statically place instructions within waves instead special instructions phi rho mark boundaries waves allow scheduling | [
7173,
9739,
2066,
7699,
5655,
10779,
10781,
6181,
8231,
3630,
6705,
7218,
2623,
2113,
7234,
3142,
2638,
1122,
3175,
8815,
9330,
630,
8822,
6268,
3197,
7313,
6815,
8352,
5793,
6818,
6821,
7852,
9391,
2224,
2226,
7858,
9911,
8890,
4286,
224... | Test |
4,031 | 8 | StormCrawler:stormcrawler stormcrawler open-source collection resources building low-latency scalable web crawlers apache storm provided apache license written mostly java programming language stormcrawler modular consists core module provides basic building blocks web crawler fetching parsing url filtering apart core components project also provide external resources like instance spout bolts elasticsearch apache solr parserbolt uses apache tika parse various document formats project used production various companies linux.com published q october 2016 author stormcrawler infoq ran one december 2016 comparative benchmark apache nutch published january 2017 dzone.com several research papers mentioned use stormcrawler 2018 particular project wiki contains list videos slides available online stormcrawler used notably common_crawl generating large publicly available dataset news | [
5677,
8718,
113,
8408,
1913,
6458
] | Test |
4,032 | 4 | USBKill:usbkill usbkill anti-forensic software distributed via github written python bsd linux os x operating systems designed serve kill switch computer installed fall control individuals entities owner operator wish free software available gnu general public license program developer goes online name hephaest0s created response circumstances arrest silk road founder ross ulbricht u.s. federal agents able get access incriminating evidence laptop without needing cooperation copying data flash drive distracting maintains whitelist devices allowed connect computer usb ports device whitelist connects take actions ranging merely returning lock screen encrypting hard drive even deleting data however also used part computer security regimen prevent surreptitious installment malware spyware clandestine duplication files according creator law enforcement agencies began making computer crime arrests 1990s would often ask judges knock search warrants order deny targets time delete incriminating evidence computers storage media extreme circumstances likely targets could get advance notice arriving police judges would grant power-off warrants allowing utilities turn electricity location raid shortly beforehand forestalling efforts destroy evidence could seized methods effective criminals produced distributed pirated software movies primary large-scale computer crime era 2010s circumstances computer crime changed along legitimate computer use criminals likely use internet facilitate crimes needed remain online time still keep activities discreet used computer security features like lock screens password protection reasons law enforcement attempts apprehend suspected cybercriminals computers use accounts computer online open logged thus easily searchable succeed seizing computer condition methods available bypass password protection may take time police available may legally possible compel suspect relinquish password—in united states many computer-crime investigations take place courts distinguished forcing suspect use material means protecting data thumbprint retinal scan key opposed password passcode purely product suspect mental processes thus protected compelled disclosure fifth amendment usual technique authorities either public entities law enforcement private organizations like companies seizing computer usually laptop believe used improperly first physically separate suspect user computer enough touch prevent closing lid unplugging typing command done often install device usb port spoofs minor actions mouse touchpad keyboard preventing computer going sleep mode would usually return lock screen would require password one program commonly used purpose mouse jiggler agents u.s. federal bureau investigation fbi investigating ross ulbricht founder online black market silk road learned often ran site laptop using wireless networks available branches san francisco public library enough evidence arrest planned catch act running silk road computer logged needed make sure able trigger encryption delete evidence october 2013 male female agent pretended lovers quarrel near working glen park branch according business insider ulbricht distracted got see problem whereupon female agent grabbed laptop male agent restrained ulbricht female agent able insert flash drive one laptop usb ports software copied key files according joshuah bearman wired third agent grabbed laptop ulbricht distracted apparent lovers fight handed agent tom kiernan response circumstances ulbricht arrest programmer known hephaest0s developed usbkill code python uploaded github 2014 available free software gnu general public license currently runs linux os x program installed prompts user create whitelist devices allowed connect computer via usb ports checks default sample rate rate adjusted user may also choose actions computer take detects usb device whitelist default shuts erases data ram swap file users need logged root hephaest0s cautions users must using least partial disk encryption along usbkill fully prevent attackers gaining access gizmodo suggests using virtual machine present computer reboots also used reverse whitelisted flash drive usb port attached user wrist via lanyard serving key instance flash drive forcibly removed program initiate desired routines designed one thing wrote aaron grothe short article usbkill pretty well precaution suggests users rename something innocuous loaded computers case someone might looking seized computer order disable addition designed purpose hephaest0s suggests uses possibly connected user desire frustrate police prosecutors part general security regimen could used prevent surreptitious installation malware spyware copying files protected computer also recommended general use part robust security practice even threats feared 2600 article grothe shared patch also included feature devised allowing program shut network non-whitelisted usb inserted terminal nate brune another programmer created silk guardian version usbkill takes form loadable kernel module since felt could implemented better already issue 2600 following grothe article another writer going name jack d. ripper explained ninja os operating system designed live flash drives handles issue uses bash script resident memory cycles loop boot device i.e. flash drive three times second see still mounted reboots computer | [
5000,
7188,
5397,
10392,
3629,
7983,
823,
4163,
2630,
7369,
2383,
10195,
11221,
7515,
9055,
7519,
8554,
7794,
2558
] | Test |
4,033 | 4 | Octopussy_(software):octopussy software octopussy also known 8pussy free open-source computer-software monitors systems constantly analyzing syslog data generate transmit central octopussy server thus often called siem solution therefore software like octopussy plays important role maintaining within iso/iec 27001-compliant environments octopussy ability monitor device supports syslog protocol servers routers switches firewalls load balancers important applications services main purpose software alert administrators users different kinds events like system outages attacks systems errors applications however unlike nagios icinga octopussy state-checker therefore problems resolved within application software also makes prescription whatsoever messages must be/must analyzed octopussy seen less powerful popular commercial software category event monitoring log analysis octopussy compatible lot linux system distributions like debian ubuntu opensuse centos rhel even meta-distributions gentoo arch linux although octopussy originally designed run linux could ported unix variants like freebsd minimal effort octopussy extensive report generating features also various interfaces software like e.g nsca nagios jabber/xmpp zabbix help software like snare even windows eventlogs processed octopussy licensed terms gnu general public license although octopussy free open-source software variety characteristics also found professional enterprise applications like splunk sawmill kiwi syslog time writing octopussy comes following set features meta- services supported by/known octopussy apache 2 bind bsd kernel bsd pam bsd system cisco routers asr cisco switches clamav denyall reverse proxy drbd f5 bigip fortinet fw hp-tools ironport mailserver juniper netscreen fw juniper netscreen nsm ldap linux apparmor linux auditd linux iptables linux kernel linux pam linux system monit mysql nagios neoteris/juniper fw netapp netcache postfix postgresql samba samhain snmpd squid sshd syslog-ng tacacs vmware esx windows snare agent windows system xen ... events receivable services thus processible octopussy include software requires rsyslog installed syslog-server expects systems monitored run one numerous available syslog services like e.g syslogd/klogd rsyslog syslog-ng software depends apache 2 http server installed apache :asp mod_perl mod_ssl octopussy also requires mysql dbms actual database installed/copied octopussy setup well recent perl interpreter installed operating system variety perl modules cpan e.g crypt :passwdmd5 dbd :mysql json unix :syslog xml :simple comprehensive list modules found within software packages/archives readme.txt file addition nscd rrdtool requirement rrdtool aids creation graphs displayed octopussy dashboard shown per-device/per-service level octopussy receives syslog messages via syslog protocol therefore behaves passively running type network agent remote machines monitoring/surveillance octopussy completely conforms rfc 3164 rfc 3195 ietf describing syslog logging mechanism unix-like/bsd operating systems especially includes internal representation facility severity-principle applicable software driven semi-stateful event correlation engine means engine records thus knows internal state uses extent link together logically related elements device order draw conclusion i.e generate alert octopussy semi-stateful correlation engine called sliding window shifting window logical boundary number events certain period time capable comparing known past events present ones based limited number comparative values octo-dispatcher component used octopussy software receive syslog lines rsyslog dispatch device directories every device registered activated within octopussy gets syslog messages assigned depending device name noteworthy also adjacent octo-replay component program used octopussy software replay log messages device service receives processes recognized logs puts back incoming directory octo-parser octo-uparser two octopussy important core components octo-parser program used octopussy software parse logs syslog format device registered within octopussy basically uses regex-engine commences pattern matching incoming syslog messages octo-uparser restarted every time device services changed check previously received unknown log messages associated service cases octo-pusher also called advance process non-syslog messages incoming devices regard device setting asynchronous helpful process log messages sent octopussy server using e.g ftp rsync ssh/scp octopussy interface gui default user-interface provides configuration management device service management well alert definition therefore extends octopussy core components devices displayed tabular form devices page following descriptors minimum hostname ip address log type device model/type fqdn os hence interface octo-web mainly provides access octopussy core components like octo-commander octo-message-finder octo-reporter octo-statistic-reporter octopussy front-end/gui written perl 5 employing apache :asp structure display content addition octopussy core services also accessed operating system shell represents convenient way administrators start/stop services make fundamental configuration changes octopussy rrd graph generator core component software installed default since generation graphs resource intensive administrators may opt disable octopussy syslog server less powerful cpu low amount ram generated rrd graphs displays activity active services monitored devices highly depending specific service restart octopussy software operation octo-dispatcher octo-parser always process syslog messages buffer queue first rrd graph generation delayed octo-rrd depends octo-scheduler execute octopussy :report function order generate syslog activity rrd graphs scheduled previously finally octo-sender capability send report data arbitrary recipients plug-in/module system octopussy mainly geared towards modification octopussy reports plug-in consists description file defines plug-in name functions code file perl code process actual data also extensions software related octopussy like e.g nagios plug-in checks octopussy core services i.e octo-dispatcher octo-scheduler etc well octopussy parser states log partitions creation new services service patterns presents important way extend octopussy without making changes source code however since patterns outlined simplified regular expressions administrators least basic knowledge regex general strongly recommended build already existing services also understand meaning message objects basic fields message id pattern log level taxonomy table rank usually logs wizard used search system unrecognized syslog messages per device generate new service patterns process creation patterns way enables octopussy distinguish messages based severity taxonomy | [
6273,
10242,
8582,
9488,
9233,
1943,
7325,
7967,
4640,
11429,
8998,
2222,
7983,
823,
1211,
961,
6482,
11221,
479,
865,
2281,
7022,
3827
] | Train |
4,034 | 4 | Ambient_authority:ambient authority ambient authority term used study access control systems subject computer program said using ambient authority needs specify names involved object operation performed order permitted action succeed definition authority ambient sense exists broadly visible environment often necessarily global environment subject request name example suppose c program opens file read access executing call desired file designated name filesystem include authorising information program exercising ambient authority ambient authority requested permissions granted denied based one global properties executing program identity role cases management access control handled separately explicit communication executing program process means access control lists associated objects role-based access control mechanisms executing program means reify permissions granted specific purpose first-class values program able access object acting behalf acting behalf one clients behalf one client another way express intention inevitably leads programs subject confused deputy problem term ambient authority used primarily contrast capability-based security including object-capability models executing programs receive permissions might receive data communicated first-class object references allows determine permissions came thus avoid confused deputy problem however since additional requirements system considered capability system besides avoiding ambient authority non-ambient authority system synonym capability system ambient authority dominant form access control computer systems today user model access control used unix windows systems ambient authority model programs execute authorities user started means executing programs inevitably given permissions need task unable determine source number types permission program executing ambient authority access control model little option designate permissions try exercise hoping best property requires excess permissions granted users roles order programs execute without error | [
256,
7480,
10146,
10813,
2951,
4423,
5503,
5483,
7884,
11596,
2737,
10835,
3700,
10614,
728,
2585,
6813,
3999
] | Validation |
4,035 | 9 | State_logic:state logic state logic control system programming method created plcs state logic control system uses state transition diagram model reality thus using fundamentals finite-state machine theory basis programming language state logic enables users model application trying control using hierarchy consists tasks subdivided states described statements 'tasks description sequential activity model machines applications processes modelled state logic usually contain one 'task representing several different possibly parallel activities activities contain given number 'states finite-state machine theory one 'state active time certain inputs outputs cause transition different states given plcs usually control systems easily represented state transition diagram use high-level programming language state logic greatly helps plc programmer making intuitive control programs | [
4770,
8262
] | Test |
4,036 | 4 | Custom_hardware_attack:custom hardware attack cryptography custom hardware attack uses specifically designed application-specific integrated circuits asic decipher encrypted messages mounting cryptographic brute force attack requires large number similar computations typically trying one key checking resulting decryption gives meaningful answer trying next key computers perform calculations rate millions per second thousands computers harnessed together distributed computing network number computations required average grows exponentially size key many problems standard computers fast enough hand many cryptographic algorithms lend fast implementation hardware i.e networks logic circuits also known gates integrated circuits ics constructed gates often execute cryptographic algorithms hundreds times faster general purpose computer ic contain large numbers gates hundreds millions 2005 thus decryption circuit cell replicated thousands times one ic communications requirements ics simple must initially loaded starting point key space situations comparison test value see known plaintext attack output consists signal ic found answer successful key since ics lend mass production thousands even millions ics applied single problem ics mounted printed circuit boards standard board design used different problems since communication requirements chips wafer-scale integration another possibility primary limitations method cost chip design ic fabrication floor space electric power thermal dissipation alternative approach use fpgas field-programmable gate arrays slower expensive per gate reprogrammed different problems copacobana cost-optimized parallel code breaker one machine consisting 120 fpgas type xilinx spartan3-1000 run parallel earliest custom hardware attack may bombe used recover enigma machine keys world war ii 1998 custom hardware attack mounted data encryption standard cipher electronic frontier foundation deep crack machine cost u.s. 250,000 build decrypted des challenge ii-2 test message 56 hours work confirmed des cracker copacobana machine cost-optimized parallel code breaker built 2006 unlike deep crack copacobana consist commercially available reconfigurable integrated circuits copacobana costs 10,000 build recover des key 6.4 days average cost decrease roughly factor 25 eff machine impressive example continuous improvement digital hardware adjusting inflation 8 years yields even higher improvement 30x since 2007 sciengines gmbh spin-off company two project partners copacobana enhanced developed successors copacobana 2008 copacobana rivyera reduced time break des current record less one day using 128 spartan-3 5000 generally believed large government code breaking organizations u.s. national security agency make extensive use custom hardware attacks examples declassified | [
5090,
8514,
7556,
9156,
10658,
11487,
1770,
4811,
5355,
3629,
3886,
7887,
9932,
2450,
7699,
4596,
6268,
2623
] | Test |
4,037 | 4 | Richard_Thomas_(solicitor):richard thomas solicitor richard james thomas best known tenure information commissioner united kingdom post held december 2002 june 2009 time office raised concerns increased use closed-circuit television cctv introduction id cards uk thomas currently deputy chairman co-opted council member consumers association trustee director whitehall industry group chairman administrative justice tribunals council 1 september 2009 abolition august 2013 also visiting professor law northumbria university born june 1949 son magistrate thomas attended public school studied law southampton university late 1960s later awarded honorary doctor laws university early career worked articled clerk solicitor freshfields bruckhaus deringer 1971 citizens advice bureau notting hill 1974 went work legal public affairs positions national consumer council 1979 office fair trading national consumer council also involved campaign freedom information secondary involvement publishing book essays entitled consuming secrets appointment information commissioner first director public policy clifford chance married julia clarke since 1974 three adult children wife live reigate surrey thomas appointed commander order british empire cbe 2009 birthday honours public service document submitted leveson inquiry witness alec owens indicates richard thomas refused prosecute perpetrators phone hacking despite receiving recommendation parties identified involved jointly prosecuted 'conspiracy breach data protection act 1998 | [
5690,
5133
] | Test |
4,038 | 0 | Julia_Hirschberg:julia hirschberg julia hirschberg american computer scientist noted research computational linguistics natural language processing currently percy k. vida l. w. hudson professor computer science columbia university hirschberg received first ph.d degree history 16th-century mexico university michigan 1976 served history faculty smith college 1974 1982 subsequently shifted computer science studies receiving m.s computer information science university pennsylvania 1982 ph.d computer information science university pennsylvania 1985 upon graduation university pennsylvania 1985 hirschberg joined bell labs member technical staff linguistics research department worked improving prosody assignment text-to-speech synthesis tts bell labs tts system promoted department head 1994 created new human computer interface research lab department remained bell labs 1996 moved labs research part corporate reorganization 2002 joined columbia university faculty professor department computer science served chair computer science department 2012-2018 hirschberg research included prosody discourse structure spoken dialogue systems speech search recently analysis deceptive speech hirschberg among first combine natural language processing nlp approaches discourse dialogue speech research pioneered techniques text analysis prosody assignment text-to-speech synthesis bell laboratories 1980s 1990s developing corpus-based statistical models based upon syntactic discourse information general use today tts systems janet pierrehumbert developed theoretical model intonational meaning leader development tobi conventions intonational description extended numerous languages today widely used standard intonational annotation hirschberg pioneer together gregory ward much experimental work intonational sources language meaning interact pragmatic phenomena particularly meaning accent intonational prominent items meaning intonational contours also innovated numerous areas involving prosody meaning including role grammatical function surface position pitch accent location use prosody disambiguating cue phrases discourse markers diane litman role prosody disambiguation english italian spanish cinzia avesani pilar prieto automatic identification speech recognition errors using prosodic information labs worked fernando pereira steve whittaker others speech search developing new interfaces speech navigation columbia students continued extended research spoken dialogue systems automatically detecting speech recognition errors inappropriate system queries modeling turn-taking behavior dialogue entrainment modeling generating clarification dialogues automatic classification trust charisma deception emotion speech speech summarization prosody translation hedging behavior text speech text-to-speech synthesis speech search low resource languages also holds several patents tts speech search corpora collaborators collected include boston directions corpus columbia sri colorado deception corpus columbia games corpus served numerous technical boards editorial committees computing research association cra board directors serves co-chair cra-w. also noted leadership broadening participation computing served member cra committee status women computing research cra-w since 2010 hirschberg notable awards include | [
7780,
1890,
2578,
7724
] | Test |
4,039 | 3 | Astra_Linux:astra linux astra linux russian linux-based computer operating system developed meet needs russian army armed forces intelligence agencies provides data protection level top secret russian classified information grade officially certified russian defense ministry federal service technical export control federal security service creator os scientific/manufacturing enterprise rusbitech applying solutions according russian government decree №2299-р 17/10/2010 orders federal authorities budget institutions implement free software usage os releases named hero cities russia cis one release general purpose code named oryol aimed achieving small mid-business goals releases marked special purpose — smolensk x86-64 pcs tula networking hardware novorossiysk arm mobile devices murmansk ibm system z mainframes rusbitech also manufactures soft/hardware trusted boot control module maksim-m1 м643м1 pci bus prevents unauthorized access offers raised digital security features module besides astra linux also supports oses linux kernel 2.6.x 5.x.x well several microsoft windows oses declared astra linux licenses correspond russian international laws n't contradict spirit demands gpl license system uses .deb packages astra linux considered recognized debian derivative rusbitech partnership relations linux foundation document foundation special edition version paid used many russian state-related organizations particularly used russian national center defence control talks deploy mass usage astra linux numerous state institutions republic crimea — legitimate usage popular oses questionable international sanctions ukrainian crisis also plans cooperation rusbitech huawei january 2018 announced astra linux going deployed russian army computers microsoft windows dropped february 2018 rusbitech announced ported astra linux russian-made elbrus microprocessors february 2019 astra linux announced implemented tianwan nuclear power plant china september 2019 commercial sales smartphones tablets astra linux expected start | [
4611,
3079,
8713,
3089,
4113,
4626,
8209,
8727,
10780,
543,
11297,
7204,
9253,
11305,
56,
3129,
4153,
59,
7224,
8248,
9276,
10303,
4673,
3654,
5190,
3147,
2125,
1107,
1110,
89,
5721,
9309,
4192,
3685,
10860,
5742,
2671,
11388,
2692,
8837,... | Test |
4,040 | 2 | ArkOS:arkos arkos linux distribution based arch linux designed primarily hosting web sites services cheap arm-based devices raspberry pi cubieboard 2 cubietruck beaglebone black plans expand platforms x86 jacob cook arkos primary developer originally conceived idea arkos realizing extensive amount time required set self-hosted services explained saying good deal experience linux system administration still took huge amount time research get services wanted set secured properly cook aims reduce dependence cloud services make data collection harder march 2014 arkos developing stages creator arkos also set citizenweb organization responsible development operating system citizenweb also solicited money successful crowdsourcing campaign finish platform april 2017 arkos discontinued lack resources principal reason source code remains available github | [
10254,
6675,
7187,
10776,
25,
10780,
4637,
3618,
9762,
5158,
7217,
9784,
10809,
576,
10817,
10333,
97,
4194,
8298,
7285,
9335,
2168,
1147,
3197,
1150,
2179,
7812,
10883,
8326,
6797,
2195,
9366,
6296,
7325,
1694,
9887,
3248,
6837,
8388,
99... | None |
4,041 | 4 | Cellebrite:cellebrite cellebrite mobile synchronization israeli company manufactures data extraction transfer analysis devices cellular phones mobile devices company subsidiary japan sun corporation cellebrite headquartered petah tikva israel two subsidiary companies cellebrite usa corp. cellebrite gmbh respectively based parsippany new jersey us munich germany cellebrite fully owned subsidiary sun corporation publicly traded company listed jasdaq 6736/jq based nagoya japan 2017 cellebrite mobile lifecycle division rebranded mobilogy mobilogy produces hardware software phone-to-phone data transfer backup mobile applications electronic software distribution data analysis tools mobilogy products used various mobile operators deployed wireless retail points sale mobilogy works handset manufacturers ensure compatibility devices released public cellebrite mobile forensics division established 2007 produces software hardware mobile forensics purposes used federal state local law enforcement intelligence agencies military branches corporate security investigations law firms private digital forensic examiners cellebrite established israel 1999 avi yablonka yaron baratz yuval aflalo ron serber joined cellebrite dec 2000 vp r yossi carmil aug.2004 ceo later ron yossi share ceo title co-ceo cellebrite first manufactured hardware software offered compressive phone-to-phone data transfer devices offered contact synchronization content transfer tools mobile phones intended use wireless carrier sales support staff retail stores initially cellebrite commercial products used tool migration is-95 cdma enabled mobile phones gsm standard later cellebrite wireless carriers retailers universal memory exchanger ume gained additional data extraction transfer capabilities well additional mobile phone diagnostics backup application management delivery 2007 cellebrite established independent division targeted mobile forensics industry cellebrite mobile forensics introduced mobile forensics products 2007 family brand name 'universal forensic extraction device ufed ability extract physical logical data mobile devices cellular phones hand-held mobile devices including ability recover deleted data decipher encrypted password protected information also 2007 cellebrite acquired futuredial incorporated one major shareholders sun corporation japan today fully owned subsidiary sun corporation april 2011 michigan chapter american civil liberties union questioned whether michigan state police msp troopers using cellebrite ufeds conduct unlawful searches citizens cell phones following refusal grant mclu 2008 freedom information act request unless organization paid 544,000 retrieve reports msp issued statement claiming honored fourth amendment searching mobile devices march 2016 reported cellebrite offered unlock iphone involved fbi–apple encryption dispute later fbi announced successfully accessed iphone thanks third party press report claimed cellebrite assisted unlocking device fbi source denied 2017 data dump suggests cellebrite sold data extraction products turkey united arab emirates russia mobile retail industry cellebrite provides gadgets phone-to-phone content management transfer used primarily stand-alone device point sale electronic software distribution content backup management used primarily over-the-air programming cellebrite universal memory exchanger ume standalone phone-to-phone memory transfer backup machine transfers content including pictures videos ringtones sms phone book contact data cellebrite ume touch predecessor ume-36 intermediate information range mobile phones smartphones pdas support mobile operating systems including symbian windows mobile palm blackberry ios android cellebrite ume standalone device acts universal data channel two mobile devices extracts reads parses data source mobile device transfers on-the-fly target device without storing data ume device ume automatically determine types phones connected re-structure data fly according source target phone storage formats data fields addition apploader device analytics tools may 2012 cellebrite introduced several new retail products services including pos diagnostics tool cell phone buy-back program integration ume touch self-service point 2007 cellebrite announced line products called 'universal forensic extraction device ufed aimed digital forensics investigation industry ufed system hand-held device optional desktop software data cables adapters peripherals ufed additionally integrated subscriber identity module sim reader unlike commercial counterpart ume ufed system sold approved government corporate organizations also unlike ume ufed extracts mobile device data directly onto sd card usb flash drive another major difference ume ufed ability break codes decipher encrypted information acquire hidden deleted data ufed named phone forensic hardware tool year four years running forensic 4cast awards cellebrite claims ufed ability extract data nearly 8,200 devices june 2012 include smartphones pda devices cell phones gps devices tablet computers ufed extract decrypt parse analyze phonebook contacts types multimedia content sms mms messages call logs electronic serial numbers esn international mobile equipment identity imei sim location information non-volatile memory volatile storage alike ufed supports cellular protocols including cdma gsm iden tdma also interface different operating systems file systems ios android os blackberry symbian windows mobile palm well legacy feature cell phones operating systems ufed enables retrieval subject data via logical see get file system e.g. directories files physical extractions i.e hex dump bit-for-bit copy mobile device entire storage physical extraction enables recover deleted information decipher encrypted data acquire information password-protected mobile applications facebook skype whatsapp browser-saved passwords ufed physical extraction functionality also overcome devices password locks well sim pin numbers cellebrite claims first mobile forensics industry achieved number smartphone forensic breakthroughs include physical extraction decoding blackberry flash memory going beyond mass storage ipd backups android user/pattern lock bypass physical extraction decoding physical extraction phones chinese chipsets including mediatek spreadtrum tomtom gps trip-log decryption decoding ios device unlocking research development cellebrite claims maintain integrity digital evidence 12 january 2017 reported unknown hacker acquired 900 gb worth confidential data cellebrite external servers data dump includes alleged usernames passwords logging cellebrite databases connected company my.cellebrite domain also contains appear evidence files seized mobile phones logs cellebrite devices data suggests cellebrite sold data extraction products countries turkey united arab emirates russia | [
2208,
9762,
5475,
8237,
9038,
3703,
6424,
2811
] | Test |
4,042 | 9 | Fourth-generation_programming_language:fourth-generation programming language fourth-generation programming language 4gl computer programming language belongs class languages envisioned advancement upon third-generation programming languages 3gl programming language generations aims provide higher level abstraction internal computer hardware details making language programmer-friendly powerful versatile definition 4gl changed time typified operating large collections information rather focusing bits bytes languages claimed 4gl may include support database management report generation mathematical optimization gui development web development researchers state 4gls subset domain-specific languages concept 4gl developed 1970s 1990s overlapping development 3gl 3gls like c c++ c java javascript remain popular wide variety uses 4gls originally defined found narrower uses advanced 3gls like python ruby perl combine 4gl abilities within general-purpose 3gl environment also libraries 4gl-like features developed add-ons popular 3gls blurred distinction 4gl 3gl 1980s 1990s efforts develop fifth-generation programming languages 5gl though used earlier papers discussions term 4gl first used formally james martin 1981 book applications development without programmers refer non-procedural high-level specification languages primitive way early 4gls included informatics mark-iv 1967 product sperry mapper 1969 internal use 1979 release motivations '4gl inception continued interest several term apply large set software products also apply approach looks greater semantic properties implementation power 3gl offered greater power programmer 4gl open development environment wider population early input scheme 4gl supported entry data within 72-character limit punched card 8 bytes used sequencing card tag would identify type function judicious use cards 4gl deck could offer wide variety processing reporting capability whereas equivalent functionality coded 3gl could subsume perhaps whole box cards 72-character metaphor continued hardware progressed larger memory terminal interfaces even limitations approach supported highly sophisticated applications interfaces improved allowed longer statement lengths grammar-driven input handling greater power ensued example described nomad page development 4gl influenced several factors hardware operating system constraints large weight 4gl first introduced disparate mix hardware operating systems mandated custom application development support specific system order ensure sales one example mapper system developed sperry though roots back beginning system proven successful many applications ported modern platforms latest variant embedded bis offering unisys mark-iv known vision builder offered computer associates santa fe railroad used mapper develop system project early example 4gl rapid prototyping programming users idea easier teach railroad experts use mapper teach programmers intricacies railroad operations one early portable languages 4gl properties ramis developed gerald c. cohen mathematica mathematical software company cohen left mathematica founded information builders create similar reporting-oriented 4gl called focus later 4gl types tied database system far different earlier types use techniques resources resulted general improvement computing time interesting twist 4gl scene realization graphical interfaces related reasoning done user form 'language poorly understood number different types 4gls exist 4gls integrated tools allow easy specification required information twenty-first century 4gl systems emerged low code environments platforms problem rapid application development short periods time vendors often provide sample systems crm contract management bug tracking development occur little programming extract data files database create reports wide range formats done report generator tools | [
6147,
4614,
9224,
1039,
5651,
3613,
9245,
8225,
5677,
5678,
5680,
9780,
1591,
10819,
8262,
5703,
3159,
7771,
2652,
9330,
9331,
7797,
8312,
9345,
2691,
3230,
7326,
4770,
7341,
10413,
11450,
9915,
1215,
191,
5830,
9926,
1224,
5838,
5845,
84... | Test |
4,043 | 3 | Chase_H.Q.:chase h.q game well received gaming industry resulting three arcade-based sequels released special criminal investigation 1989 1992 chase h.q 2 2007 two spin-offs also released crime city 1989 quiz h.q 1990 game ported many home computers ocean software 1989 including versions zx spectrum amstrad cpc commodore 64 msx amiga atari st. taito produced versions family computer 1989 game boy 1990 master system 1990 turbografx-16 1990 game gear 1991 saturn 1996 released playstation 2 japan 2007 part taito memories ii volume 2 start level player informed pursuing great distance away must apprehend criminal time limit expires criminal car constantly moving away player repeatedly crashes drives slowly criminal escape points game road splits correct turn must taken otherwise take longer catch criminal vehicle reached time limit extended vehicle must rammed number times criminal forced stop arrested game includes five levels initial time limit reach criminal time extension ram criminal 60 65 70 seconds nancy chase hq start every level calls radio frequency always 144.x various mhz actually 2-meter band amateur ham radio frequencies although superficially similar technology sega run chase hq features significant technical advancements title presentation perspective hills track splits villains arcade versions last villain car always listed unidentified ocean released versions game zx spectrum amstrad cpc commodore 64 commodore amiga atari st december 1989 msx version released february 1990 spain roughly one month later launch rest ocean versions market taito produced ports known taito chase h.q family computer 1989 game boy 1990/1991 master system 1990 turbografx-16 1990 game gear 1991 released genesis chase h.q ii known super h.q japan minor changes including alternative player vehicles december 1990 game included wheels fire compilation also featured hard drivin power drift turbo outrun june 1991 game released power compilation also featured altered beast turrican rainbow islands x-out 1993 taito released super chase h.q known japan super h.q criminal chaser super nes unlike home versions played first person perspective based upon super chase criminal termination rather original chase h.q gameplay modeled original aspects s.c.i incorporated also super chase h.q game boy released exclusively north america 1994 game similar game boy taito chase h.q 1991 1996 taito released emulation arcade original sega saturn japan bundled together special criminal investigation one disc 2000 chase h.q secret police released game boy color july 2008 turbografx-16 version game re-released wii virtual console spin-off released 1989 titled crime city game play deviates traditional third-person driving instead side scrolling type shooter game well received critics upon release arcades computer video games gave positive review stating last racing game something whizzing around track beat course time concluded fast challenging great graphics good clear sound effects definitely winner ace said run theme keeps expanded presented different ways like power drift chase hq best far concluded game driving violence winning coin-up combination crash said great game ultimate arcade version cops-and-robbers movies according arcade history arguably first sprite-scaled racer since run truly capture gaming public imagination home computer conversions also mostly well received critics 16-bit amiga atari st versions received positive reviews 8-bit zx spectrum amstrad cpc conversions received high review scores generally recognised accurate playable ocean software home computer releases three zx spectrum magazines awarded 94 praising speed game originality crash gave game 95 sinclair user awarded 96 hand 8-bit commodore 64 conversion received generally negative reception japan 1989 arcade version nominated hit game year voted 10th place according ocean software advert 1989 arcade version voted arcade game year 1989/1990 golden joystick awards 8-bit home computer versions awarded best 8-bit coin-op conversion best 8-bit soundtrack spectrum version also topped computer video games best games '89 list along super mario bros. 2 zx spectrum version game went number 2 uk sales charts behind rainbow islands spectrum version voted number 1 sinclair poll readers top 100 games time 1993 brian kuh weirs beach new hampshire holds official arcade world record score 3,596,680 points achieved 1 june 2006 funspot family fun center weirs beach new hampshire robert gray dumfriesshire scotland holds official mame world record score 11,490,280 points achieved 13 june 2010 chase h.q successful enough earn two arcade-based sequels widely released special criminal investigation released 1989 extremely rare super chase criminal termination released 1992 also earned two spin-offs run gun crime city quiz game quiz h.q. special criminal investigation expands original addition guns passenger rise t-top nissan 300zx z32 shoot oncoming targets take advantage enemies placed throughout level attempt shoot ram player attempt pursue main criminal deviating relatively realistic tracks offer original sequel features pursuits waterfalls unfinished sections elevated highway. third arcade release chase h.q series released 1992 1997 playstation game ray tracers developed released taito described less follow game differences different speed-boost system greater variety targets february 2006 chase h.q nancy yori kinkyuu renraku presented arcade operator union trade show tokyo game released chase h.q 2 later year saint etienne recorded demo dance track called chase hq inspired chase h.q includes samples oh man punch pedal exclamations game action track released bonus track 2009 deluxe reissue band 1991 album foxbase alpha chase hq gameplay involved ramming enemy car avoiding oncoming traffic cited precursor gameplay later titles driver burnout | [
801,
8709,
8300,
8492,
9006,
10316,
4690,
629,
6390,
9501,
5275,
1693,
4894
] | None |
4,044 | 7 | Google_Cloud_Dataflow:google cloud dataflow google cloud dataflow fully managed service executing apache beam pipelines within google cloud platform ecosystem google cloud dataflow announced june 2014 released general public open beta april 2015 january 2016 google donated underlying sdk implementation local runner set ios data connectors access google cloud platform data services apache software foundation donated code formed original basis beam project | [
4995,
5892,
7816,
5262,
8719,
5524,
7700,
10645,
8858,
1435,
10525,
10912,
2978,
4901,
1959,
3499,
10284,
1203,
5431,
7359,
196,
3269,
3782,
11590,
4683,
11343,
3664,
3795,
1240,
8413,
6367,
2658,
6632,
5483,
236,
9712,
9970,
8821,
3836
] | Test |
4,045 | 9 | JSON_Patch:json patch json patch web standard format describing changes json document meant used together http patch allows modification existing http resources json patch media type codice_1 json patch document structured json array objects object contains one six json patch operations add remove replace move copy test structure influenced specification xml patch syntax looks like every object two mandatory members op path one operation per object though many objects/operations every array operations performed order first operation array goes first second operation acts upon result previous operation json patch documents atomic one operation document fails operation carried operations following add adds value object array remove removes value object array replace replaces value logically identical using remove add copy copies value one path another adding value specified location another location move moves value one place another removing one location adding another test tests equality certain path certain value | [
803,
6920,
3921,
4797,
479
] | None |
4,046 | 3 | Philips_68070:philips 68070 scc68070 philips semiconductors-branded motorola 68000-based 16/32-bit processor produced license marketed externally high-performance microcontroller almost exclusively used combined philips scc66470 vsc video- systems controller philips cd-i interactive entertainment product line additions motorola 68000 core include differences motorola 68000 core include scc68070 mostly binary compatible motorola 68000 equivalent chip motorola 680x0 series particular scc68070 follow-on motorola 68060 even though scc68070 32-bit processor internally 24-bit address bus giving theoretical 16mb maximum ram however possible on-board peripherals mapped internally | [
5348,
7269,
1158,
7302,
11447,
2383,
8917,
1463,
2073
] | Train |
4,047 | 3 | 3DO_Blaster:3do blaster 3do blaster add-on produced creative labs designed allow compatible windows-based pcs play games 3do interactive multiplayer full-sized isa compatibility card unlike add-ons emulate 3do system rather whole system logic board included input controllers output video audio redirected pc product marketed single board cd-rom drive owners drives panasonic interface bundled necessary cd-rom drive software drivers allowed dos windows 3.1 based gameplay although windows based gaming featured real-time stretching game window screenshot capturing graphics boards time 1994 par system needs pass-through using vga feature connector link used thus reserving area screen used 3do blaster card output windows environment – running dos full-screen option thus impact cpu first 3do system panasonic real fz-1 fmv daughter-card enabling video cd playback planned since 3do blaster failed achieve momentum never released saved games stored nvram card supposedly using resources pc prevent hacking card sold cables needed 3do controller logitech two 3do games cd shock wave electronic arts gridders tetragon despite showing 'long boxes two games back packing box included jewel cases third cd containing demos popular 3do games also included included software aldus aldus photostyler se aldus gallery effects vol 1 pictures titles seen back 3do blaster packing box | [
9641,
6797,
8561,
5368,
2941
] | None |
4,048 | 8 | Blink_(browser_engine):blink browser engine blink browser engine used google chrome browser many projects developed part chromium project contributions google facebook microsoft opera software asa adobe systems intel ibm samsung others first announced april 2013 blink fork webcore component webkit originally fork khtml kjs libraries kde used chrome starting version 28 opera 15+ vivaldi amazon silk chromium-based browsers frameworks much webcore code used features google chrome implemented differently sandboxing multi-process model parts altered blink fork although made slightly bulkier allowed greater flexibility adding new features future fork also deprecates vendor prefixes existing prefixes phased new experimental functionality instead enabled opt-in basis aside planned changes blink initially remains relatively similar webcore commit count google largest contributor webkit code base since late 2009 blink naming influenced non-standard presentational blink html element introduced netscape navigator supported presto- gecko-based browsers august 2013 blink contrary name never functionally supported element several projects exist turn chromium blink reusable software framework developers chromium blink implemented six platforms windows mac linux chrome os android android webview ios versions chromium continue use parent renderer webkit webcore | [
513,
6657,
9736,
8719,
2579,
7700,
6171,
9757,
10270,
7713,
10791,
9770,
10284,
559,
4661,
3639,
10808,
3643,
9275,
64,
4683,
5707,
11343,
3664,
10834,
6231,
8281,
6747,
2658,
9320,
1642,
9834,
9841,
115,
9843,
8821,
4728,
637,
1664,
2182... | None |
4,049 | 4 | Rebecca_Bace:rebecca bace rebecca becky gurley bace 1955–2017 american computer security expert pioneer intrusion detection spent 12 years us national security agency created computer misuse anomaly detection cmad research program known den mother computer security also influential early stages intelligence community venture capital major player silicon valley investments cyber security technology bace grew rural alabama one seven children diagnosed epilepsy adolescence mother war bride japan following world war ii father self-educated teamster alabama due prevailing attitudes illness women neurologist suggested stay home collect disability following high school credited local librarian family friend bertha nel allen encouragement apply college scholarships scholarships charitable foundations set betty crocker jimmy hoffa senior year high school 1973 accepted university alabama birmingham woman engineering financial hardship frequent employment interruptions took eight years classes various schools earn degree bace first became interested computing freshman year working punch cards programming fortran cobol ibm mainframe got first engineering job teaching engineering lab approached couple xerox technicians needed fill affirmative action requirements accepted job specialist repairing copier machines experience stated faced significant gender racial bias sometimes customers would raise ruckus deal believed given second best showed even though better educated men graduation 1984 bace started working nsa searching flexible job allow care autistic son later diagnosed leukemia took assignment 1989 national computer security center ncsc chartered part nsa expressly deal computer security issues department defense intelligence community bace served program manager intrusion detection research specifically transferring research relatively new commercial security products market played pivotal role apprehension kevin mitnick proving trace back capture possible beyond theoretical context also provided seed funding computer security labs uc davis purdue university following death son bace went serve deputy security officer los alamos national laboratory computing information communications division left los alamos 1998 started infidel inc. security consulting company 2002 signed venture capital consultant trident capital silicon valley bace also briefly served technical vp cyber security practice in-q-tel investment arm us intelligence community death served chief strategist center forensics information technology security cfits university south alabama venture capitalist provided expert advice generation security startups including qualys sygate irobot arxan technologies hytrust neohapsis | [
2437,
7563,
5010,
4500,
8469,
3099,
7968,
6177,
5284,
11182,
10290,
4789,
7160,
8635,
830,
2494,
7107,
7369,
6475,
10189,
7887,
4834,
5475,
7525,
9319,
1907,
4087,
3960,
11642,
5245
] | None |
4,050 | 1 | Roller_Coaster_DataBase:roller coaster database roller coaster database rcdb roller coaster amusement park database begun 1996 duane marden grown feature statistics photos 5000 roller coasters around world publications mentioned rcdb include new york times los angeles times toledo blade orlando sentinel time forbes mail guardian chicago sun-times rcdb started 1996 duane marden computer programmer brookfield wisconsin website run web servers marden basement location st. louis 2019 marden still operates site roller coaster entry includes following information ride current amusement park location type status existing standing operating sbno defunct opening date make/model cost capacity length height drop number inversions speed duration maximum vertical angle trains special notes entries may also feature reader-contributed photos and/or press releases site also categorizes rides special orders including list tallest coasters list fastest coaster list inversions coaster list parks inversions etc. sortable steel wooden roller coaster entry links back page lists park roller coasters past present includes brief history links fan web pages saluting park site available ten languages english german french spanish dutch portuguese italian swedish japanese simplified chinese | [
225,
2901,
735
] | Test |
4,051 | 2 | List_of_Microsoft_operating_systems:list microsoft operating systems following list microsoft written published operating systems codenames microsoft gave operating systems see microsoft codenames another list versions microsoft windows see list microsoft windows versions releases windows windows 2000 part windows nt family | [
636,
641,
8576,
259,
2179,
4356,
6150,
6787,
11524,
6797,
782,
1935,
1148,
8976,
10900,
3477,
3605,
11030,
3224,
11549,
5406,
7838,
7456,
929,
5666,
3875,
7970,
8098,
10273,
11559,
1832,
6441,
7215,
7983,
3250,
3890,
11060,
8757,
1083,
73... | None |
4,052 | 7 | DIET:diet diet software grid-computing middleware diet sits operating system handles details hardware application software deals specific computational task hand diet created 2000 designed high-performance computing currently developed inria école normale supérieure de lyon cnrs claude bernard university lyon 1 sysfera open-source software released cecill license like netsolve/gridsolve ninf diet compliant gridrpc standard open grid forum aim diet project develop set tools build computational servers distributed resources managed transparent way middleware work workstations clusters grids clouds diet used manage décrypthon grid installed ibm six french universities bordeaux 1 lille 1 paris 6 ens lyon crihan rouen orsay usually gridrpc environments five different components clients submit problems servers servers solve problems sent clients database contains information software hardware resources scheduler chooses appropriate server depending problem sent information contained database monitors get information status computational resources diet architecture follows different design composed two approaches developed workflow management diet uses additional entity called dag entity work two modes one defines complete scheduling workflow ordering mapping one defines ordering workflow execution mapping done next step client using master agent find server workflow services run diet provides degree control scheduling subsystem via plug-in schedulers service request application arrives sed sed creates performance-estimation vector collection performance-estimation values pertinent scheduling process application values stored structure either values provided cori collectors resource information custom values generated sed design estimation vector subsystem modular cori generates basic set performance-estimation values stored estimation vector identified system-defined tags information number cores total memory number bogomips hard drive speed etc. static well dynamic information like predicted time solve problem given resource average cpu load thus transferred server daemon scheduler agent order provide pertinent information better scheduling mentioned used correlation application-driven scheduler possibility diet server daemon better understanding application needs request specific scheduling relaying information stored vector three different data managers integrated diet parallel resources generally accessible lrms local resource management system also called batch system diet provides interface several existing lrms execute jobs loadleveler ibm resources openpbs fork well-known pbs system oar batch scheduler used grid'5000 research grid developed imag grenoble submitted jobs parallel jobs coded using mpi standard instantiation mpich lam cloud extension diet created 2009 diet thus able access cloud resources two existing cloud providers | [
8640,
4194,
5956,
3562,
5612,
7983,
9040,
9301,
3449,
8122,
3323,
7935
] | None |
4,053 | 4 | FreeRADIUS:freeradius freeradius modular high performance free radius suite developed distributed gnu general public license version 2 free download use freeradius suite includes radius server bsd-licensed radius client library pam library apache module numerous additional radius related utilities development libraries cases word freeradius refers free open-source radius server suite freeradius popular open source radius server widely deployed radius server world supports common authentication protocols server comes php-based web user administration tool called dialupadmin basis many commercial radius products services embedded systems radius appliances support network access control wimax supplies aaa needs many fortune-500 companies telcos tier 1 isps also widely used academic community including eduroam server fast feature-rich modular scalable freeradius started august 1999 alan dekok miquel van smoorenburg miquel previously written cistron radius server gained widespread usage livingston server longer maintained freeradius started create new radius server using modular design would encourage active community involvement november 2014 freeradius project three core team members alan dekok project leader arran cudbard-bell principal architect matthew newton latest major release freeradius 3 freeradius 3 includes support radius tls including radsec completely rewritten rlm_ldap module hundreds minor consistency usability enhancements latest mature version maintained stability rather features previous major release v2.2.x entered final phase lifecycle receive security fixes survey 2006 showed user base totals 100 million people modules included server core support ldap mysql postgresql oracle many databases supports popular eap authentication types including peap eap-ttls 100 vendor dictionaries included ensuring compatibility wide range nas devices version 2.0.0 added support virtual hosting ipv6 vmps new policy language simplifies many complex configurations | [
8582,
4999,
5397,
9640,
7983,
8644,
10058,
8539,
10332,
8670,
5470,
2143,
10340,
5093,
9320,
7022,
5490,
6651,
2045
] | None |
4,054 | 4 | BlackNurse:blacknurse blacknurse attack form denial service attack based icmp flooding attack special modest bandwidth 20mbit/s effective disrupting victim network attack consists sending destination unreachable packets destination works packets caused destination consume resources relatively high rate relative traffic attack first discovered researchers lenny hansson kenneth bjerregard jørgensen security operations center danish telecom operator tdc researchers goal protect customers telecom network ddos attacks cyber threats team noted release attack blacknurse attack attracted attention anti-ddos solution experienced even though traffic speed packets per second low attack could keep customers operations even applied customers large internet uplinks large enterprise firewalls place expected professional firewall equipment would able handle attack denial service typically accomplished flooding targeted machine resource superfluous requests attempt overload systems prevent legitimate requests fulfilled commonly attack done distributed manner many clients send requests given server sum client traffic often enough overwhelm destination cause service go offline become unavailable case blacknurse attack instead flooding remote system internet traffic superfluous traffic attack takes advantage imbalance resources required send traffic resources required process namely blacknurse attacks uses icmp type 3 code 3 packets packet meant sent destination port unreachable unlike previous attacks using icmp protocol -- smurf attack ping flood ping death -- blacknurse flood destination traffic instead researchers realized destination port unreachable packet causes high cpu usage firewall processes using relatively small bandwidth 15-18mbit/s attacker cause cpu usage spike target firewall causing firewall become unable process requests test device vulnerable send icmp packet network using following commands recommended run commands wan side firewall running test attempt use network normally watching cpu usage firewall history icmp attacks like smurf attack ping flood ping death many icmp packets commonly blocked firewalls however icmp packets necessary allow network work properly destination port unreachable one packets required typically however attack effective incoming traffic greater bandwidth victim machine case blacknurse however attack takes advantage processing logic many firewalls handling traffic attack important leverages necessary component internet traffic n't require use botnet execute attacks due low cost attack low bandwidth connections common attack used effectively original researchers soc tdc noted attack currently used clients network attack named blacknurse joke two principal researchers former blacksmith former nurse media picked name could changed | [
8320,
3843,
5636,
5764,
10502,
2187,
4240,
11152,
4883,
10003,
4117,
8726,
535,
1688,
10132,
5402,
2717,
9375,
1440,
5024,
9761,
4644,
4133,
5028,
8998,
11175,
297,
2857,
5547,
8489,
11052,
9518,
9904,
7601,
1970,
9395,
8886,
1337,
441,
1... | None |
4,055 | 1 | Semi-structured_model:semi-structured model semi-structured model database model separation data schema amount structure used depends purpose advantages model following primary trade-off made using semi-structured database model queries made efficiently constrained structure relational model typically records semi-structured database stored unique ids referenced pointers location disk makes navigational path-based queries quite efficient searches many records typical sql efficient seek around disk following pointers object exchange model oem one standard express semi-structured data another way xml | [
9828,
10471,
10413,
242,
9397,
3509,
4376,
479
] | None |
4,056 | 9 | Wakanda_(software):wakanda software wakanda javascript platform develop run web mobile apps based open standards technologies including angularjs ionic node.js typescript supported linux deployment microsoft windows macos studio development wakanda consists stack tools technologies starting 2008 server wakanda first presented ajax experience 2009 year jsconf.eu private developer preview made accessible 2010 first version wakanda studio including model designer gui designer wakanda came public attention june 2011 new developer preview second public developer preview announced wakanday js.everywhere boston october 2011 conference first beta december 15th wakanda available live release version since march 15 2012 june 28 2012 first version wakanda officially launched october 26 2012 demonstrated js.everywhere conference us france first involved commonjs working group since 2009 team created client server javascript apis w3c community group april 2012 joining w3c october 2012 company wakanda sas created december 2014 december 7 2015 wakanda digital app factory officially launched 2016 wakanda named cool vendor gartner wakanda server supports commonjs modules web workers web storage xmlhttprequest html5 file api blobs timers implements firebug crossfire debugger protocol well webkit remote debugging protocol wakandadb nosql engine accessed via http inspired odata rest api integrates connectors interact tiers databases mysql microsoft sql server odbc wakanda supports node.js modules including eventemitter socket tls wakanda includes open source projects part default packages wakanda server built javascriptcore icu openssl zlib | [
8201,
6154,
2062,
2576,
9245,
6176,
8739,
5165,
4171,
595,
84,
603,
8289,
5219,
102,
3705,
1146,
6791,
6797,
148,
8854,
1698,
4777,
3761,
1203,
692,
8883,
190,
1215,
5311,
7871,
4822,
8923,
7396,
10991,
7412,
259,
9481,
1802,
10507,
181... | Test |
4,057 | 9 | Comparison_of_programming_languages_(string_functions):comparison programming languages string functions string functions used computer programming languages manipulate string query information string programming languages string datatype string functions although may low-level ways within language handle strings directly object-oriented languages string functions often implemented properties methods string objects functional list-based languages string represented list character codes therefore list-manipulation procedures could considered string functions however languages may implement subset explicit string-specific functions well function manipulate strings modern object-oriented languages like c java immutable strings return copy newly allocated dynamic memory others like c manipulate original string unless programmer copies data new string see example concatenation basic example string function codice_1 function function returns length string literal languages may string functions similar exactly syntax parameters outcomes example many languages length function usually represented len string list common functions aims help limit confusion string functions common many languages listed including different names used list common functions aims help programmers find equivalent function language note string concatenation regular expressions handled separate pages statements guillemets « … » optional var begin // example c ya hello world 2 // l' substr hello world 1 1 e' hello world .substr 1 1 e' hello world 2 l' hello world -3 r' example visual basic mid hello world ,2,1 example visual basic .net hello world .chars 2 l c example smalltalk 'hello world 2 e //example rust hello world .chars .nth 2 // l' hello cmp world returns -1 hello cmp world returns less world cmp hello returns hello cmp hello returns cmp hello world returns -1 /** example rexx */ compare hello world /* returns index mismatch 1 */ use-modules srfi srfi-13 string-compare hello world values values values example erlang hello world returns false art gt painting returns false art lt painting returns true hello -gt world returns false string art painting returns nil string art painting returns non nil 'abc 'def // returns abcdef // example c abc def // returns abcdef example visual basic abc def returns abcdef abc def returns abcdef abc null returns abc abc null returns null // example abc def // returns abcdef concatenate 'string abc def ghi returns abc def ghi abc def returns abcdef perl 5 returns perl 5 abc def returns abcdef perl 6 returns perl 6 ¢ example algol 68 ¢ // example c hello mate .contains e // returns true word .contains z // returns false good morning .contains z returns false ¡buenos días .contains í returns true e hello mate returns true z word returns false example smalltalk 'hello mate includessubstring e returns true 'word includessubstring z returns false tests two strings equal see also compare compare note equality checks via generic compare integer result confusing programmer often significantly expensive operation especially true using c-strings // example c hello == world // returns false example visual basic hello world returns false 'hello eq 'world returns 0 'hello eq 'hello returns 1 'hello eq 'world returns false 'hello eq 'hello returns true hello -eq world returns false ⍝ example apl 'hello ≡ 'world ⍝ returns 0 search e hello mate returns 1 search z word returns nil // examples c hello mate .indexof e // returns 1 hello mate .indexof e 4 // returns 9 word .indexof z // returns -1 hello .index e returns 1 hello .index z returns nil use-modules srfi srfi-13 string-contains hello mate e returns 1 string-contains word z returns f examples visual basic instr hello mate e returns 2 instr 5 hello mate e returns 10 instr word z returns 0 examples smalltalk 'hello mate indexofsubcollection 'ate returns 8 'hello mate indexofsubcollection 'late returns 0 i'hello mate 'hello mate // examples c hello mate .indexof e // returns 1 word .indexof z // returns -1 position \e hello mate returns 1 position \z word returns nil // example c string.format 0 costs 1 c2 pen 19.99 // returns pen costs 19.99 // example object pascal delphi format 'my costs 2f 'pen 19.99 // returns pen costs 19.99 // example java string.format costs 2f pen 19.99 // returns pen costs 19.99 sprintf costs .2f pen 19.99 returns pen costs 19.99 1.fmt 04d returns 0001 costs .2f pen 19.99 returns pen costs 19.99 0 costs 1 .2f .format pen 19.99 returns pen costs 19.99 format ~a costs ~1,2f pen 19.99 returns pen costs 19.99 tests two strings equal see also equality // example c hello world // returns true example visual basic hello world returns true not= hello world ⇒ true 'hello ne 'world returns 1 'hello ne 'world returns true hello -ne world returns true see find see find see find see rfind languages languages without built-in trim function usually simple create custom function accomplishes task awk one use regular expressions trim standard trim function c c++ available string libraries c contain code implements trimming functions significantly ease efficient implementation function also often called eatwhitespace non-standard c libraries c programmers often combine ltrim rtrim implement trim void rtrim char *str void ltrim char *str void trim char *str open source c++ library boost several trim variants including standard one trimmed boost :algorithm :trim_copy string note boost function named simply codice_3 input sequence modified in-place return result another open source c++ library qt several trim variants including standard one trimmed s.trimmed linux kernel also includes strip function codice_4 since 2.6.18-rc1 trims string place since 2.6.33-rc1 kernel uses codice_5 instead codice_4 avoid false warnings trim algorithm haskell may interpreted follows f drops preceding whitespace reverses string f applied output note type signature second line optional trim algorithm j functional description filter codice_7 non-space characters codice_8 leading codice_9 codice_10 trailing codice_11 spaces built-in trim function javascript 1.8.1 firefox 3.5 later ecmascript 5 standard earlier versions added string object prototype follows string.prototype.trim function perl 5 built-in trim function however functionality commonly achieved using regular expressions example string =~ s/^\s+// remove leading whitespace string =~ s/\s+ // remove trailing whitespace string =~ s/^\s+|\s+ //g remove leading trailing whitespace examples modify value original variable codice_12 also available perl stripltspace codice_13 cpan however two functions commonly used strip whitespace end strings codice_14 codice_15 perl 6 upcoming major revision language strings codice_3 method example string string.trim remove leading trailing whitespace string .= trim thing tcl codice_19 command three relevant subcommands codice_3 codice_21 codice_22 commands additional argument may specified string represents set characters remove—the default whitespace space tab newline carriage return example trimming vowels set string onomatopoeia set trimmed string trim string aeiou result nomatop set r_trimmed string trimright string aeiou result onomatop set l_trimmed string trimleft string aeiou result nomatopoeia xslt includes function codice_23 strips leading trailing whitespace addition replacing whitespace sequence including line breaks single space example xsl variable name='trimmed /xsl variable xslt 2.0 includes regular expressions providing another mechanism perform string trimming another xslt technique trimming utilize xpath 2.0 codice_24 function | [
10752,
515,
3462,
8582,
9735,
1931,
2062,
6414,
6160,
5521,
10510,
3736,
1435,
155,
9245,
11555,
3876,
5796,
5031,
4777,
428,
5165,
5677,
5806,
9008,
10413,
692,
3765,
7732,
7479,
5048,
7609,
8502,
10043,
10684,
6718,
7486,
6780,
963,
864... | Test |
4,058 | 1 | Simple_Features:simple features simple features officially simple feature access open geospatial consortium ogc international organization standardization iso standard iso 19125 specifies common storage access model mostly two-dimensional geometries point line polygon multi-point multi-line etc used geographic information systems iso 19125 standard comes two parts part one iso 19125-1 sfa-ca common architecture defines model two-dimensional simple features linear interpolation vertices data model defined sfa-ca hierarchy classes part also defines representation using well-known text binary part 2 standard iso 19125-2 sfa-sql defines implementation using sql opengis standard cover implementations corba ole/com well although lagged behind sql one standardized iso iso/iec 13249-3 sql/mm spatial extends simple features data model mainly circular interpolations e.g circular arcs adds features like coordinate transformations methods validating geometries well geography markup language support geometries also associated spatial reference systems standard also specifies attributes methods assertions geometries general 2d geometry simple contains self-intersection specification defines de-9im spatial predicates several spatial operators used generate new geometries existing geometries part 2 simple feature access implemented varying degrees gdal library implements simple features data model ogr component java-based deegree framework implements sfa part 1 various ogc standards geosparql ogc standard intended allow geospatially-linked data representation querying based rdf sparql defining ontology geospatial reasoning supporting small simple features well de-9im rcc8 rdfs/owl vocabulary gml wkt literals 2012 various nosql databases limited support anything complex bounding box proximity search | [
11651,
10511,
8854,
11030,
11036,
5149,
2206,
9245,
5413,
9893,
5546,
5677,
10029,
10413,
11056,
53,
3126,
1079,
5816,
10238,
2556,
6977,
6850,
3907,
580,
8904,
5833,
1610,
8524,
2904,
8539,
4064,
6629,
8421,
8426,
5614,
7022,
1010,
3447,
... | Test |
4,059 | 8 | HTTP_File_Server:http file server http file server otherwise known hfs free web server specifically designed publishing sharing files complete feature set differs web servers lacks common features like cgi even ability run windows service includes example counting file downloads even advised using ordinary web server hfs small http file server aimed mostly sharing files download official documentation describes hfs hfs http file server file sharing software allows send receive files limit sharing friends open whole world hfs different classic file sharing network hfs web server uses web technology compatible today internet since actually web server friends download files downloading website using web browser internet explorer firefox users n't install new software hfs lets share files web servers used publish website hfs designed however free use way wish risk latest beta version 2.3 hfs includes proprietary scripting language known macros used expand functionality program scripts used variety methods including event handlers directly web pages macros even written bypass program account system custom one hfs used typical web-server however easy support requires variety unconventional programming methods version 2.3 due lack support php cgi development started august 2002 reached version 1.0 september year hfs multiple security issues past states website 2013 current known security bugs latest version hfs open source anyone able easily check security flaws many expert users although designed extremely robust hfs stable used months without restart used stunnel provide https ssl/tls | [
1632,
225,
9580,
7983,
2485,
4284
] | None |
4,060 | 3 | PlayStation_3_models:playstation 3 models playstation 3 video game console produced various models life cycle launch playstation 3 available either 20 40 60 80 gb hard disk drive us japan priced us 499 us 599 either 40 60 80 gb hard disk drive europe priced £299 £425 since sony released two redesigned models slim super slim models total number consoles sold estimated 77 million several original playstation 3 hardware models commonly referred size included hard disk drive 20 40 60 80 160 gb although referred hdd size capabilities consoles vary region release date difference appearance first five models color trim number usb ports presence absence door covers flash card readers equipped models minor changes air vents retail packages include one two sixaxis controllers dualshock 3 controller beginning june 12 2008 one type-a mini-b usb cable connecting controller playstation portable system one composite video/stereo audio output cable one ethernet cable 20 60 cechexx 80 gb one power cable models support software emulation original playstation support playstation 2 backward compatibility diminished later compatible models last model integrated backward compatibility ntsc 80 gb ceche metal gear solid 4 bundle compatibility issues games systems detailed public database hosted manufacturer models excluding 20 gb model include 802.11 b/g wi-fi addition features 20 gb model 60 gb model internal ieee 802.11 b/g wi-fi multiple flash card readers sd/multimedia card compactflash type i/type ii microdrive memory stick/pro/duo chrome colored trim terms hardware 80 gb model ceche released south korea identical 60 gb model cechc released pal regions except difference hard drive size european 60gb model cechc south korean north american ceche 80gb model excludes playstation 2 emotion engine cpu chip replaced emulated version via cell broadband engine however retains graphics synthesizer gpu resulting hybrid hardware software emulation due elimination emotion engine replacement software-emulated version level playstation 2 compatibility slightly reduced 40 gb 80 gb cechl cechm cechk 160 gb models two usb ports instead four usb ports models include multiple flash card readers sacd support backward compatibility playstation 2 games due removal graphics synthesizer gpu stripped units playstation 2 based hardware official wi-fi flash memory card readers ever released sony 20 gb system although sony plans september 2009 sony placed emphasis proposed add-ons nevertheless model features four usb 2.0 ports wireless networking flash memory card support already obtained use widely available external usb adapters third-party ps3-specific media hubs rumored cell processors third-generation ps3s 40 gb 2008 80 gb cechl cechm cechk 160 gb would move 90 nm process newer 65 nm process scei ceo kaz hirai later confirmed later 45 nm change lowers power consumption console makes less expensive produce redesigned version playstation 3 commonly referred ps3 slim officially branded ps3 features upgradeable 120 gb 160 gb 250 gb 320 gb hard drive 33 smaller 36 lighter consumes 34 cech-20xx 45 cech-21xx less power previous model one third original ps3 model cell microprocessor moved 45 nm manufacturing process lets run cooler quieter previous models cooling system redesigned rsx moved 40 nm process latest revision ps3 slim also includes support cec commonly referred manufacturer brandings braviasync viera link easylink etc allows control console hdmi using tv remote control ps3 slim longer main power switch like previous ps3 models similar redesigned slimline playstation 2 support emulation play ps2 titles present slim version however shortly release ps3 slim sony announced new series ps2 remasters called classics hd ps2 psp titles remastered hd ps3 trophies sometimes playstation move compatibility added october 2011 ps2 classics available purchase playstation store ps3 slim officially released september 1 2009 north america europe september 3 2009 japan australia new zealand however retailers amazon.com best buy gamestop started sell ps3 slim august 25 2009 ps3 slim sold excess million units first 3 weeks sale 250 gb final fantasy xiii -themed ps3 slim white color pink designs officially announced september 24 2009 tokyo game show part bundle japan final fantasy xiii initially revealed u.s. federal communications commission fcc filings ps3 cech-2000b sony computer entertainment australia also announced later day would bringing 250 gb ps3 slim australia would bundled games feature final fantasy xiii theme although north american bundles announced 250 gb ps3 slim sold stand-alone console north america july 2010 sony announced two new sizes slim ps3 160 gb 320 gb 120 gb model discontinued japan launched july 29 2010 japan 160 gb version available classic white well standard charcoal black black 160 gb version also made available bundle japan-only dvr accessory torne later announced new sizes launched regions 160 gb model available august 2010 north america october 2010 europe 320 gb model available north america part bundle playstation move playstation eye copy sports champions europe playstation move playstation eye demo disc bundles released september 19 2010 september 15 2010 respectively coincide launch playstation move september 2012 sony announced new slimmer ps3 redesign cech-4000 due released late 2012 would available either 250 gb 500 gb hard drive pal regions 250 gb model available model 12 gb flash memory cech-4000a available place standalone 250 gb hard drive cech-zhd1 available upgrade model uk 500 gb model released september 28 2012 12 gb model made available october 12 2012 cech-4000b consoles hard drives weigh approximately cech-4000a weighs approximately roughly 25 smaller 20 lighter original ps3 slim version sliding disc cover rather slot-loading drive found previous playstation 3 consoles similar sony bravia kdl22px300 includes built playstation 2 cech-4200 model nearly identical hardware cech-4000 model introduced 2013 follow aacs rule inhibiting analog component composite output blu-ray disc content effective since 2014 previous 3000 4000 models output limit already set 480i meet jan 1st 2011 deadline agreement also aforementioned aacs vertical stand cech-zst1j also available models launched day consoles respective regions | [
9472,
4098,
643,
9091,
3077,
11398,
10761,
6799,
9508,
6311,
9512,
684,
306,
1587,
823,
6072,
1985,
1091,
9543,
10056,
6909,
6732,
10316,
3025,
6738,
6873,
859,
1501,
607,
9445,
359,
8937,
4587,
3824,
5746,
6004,
7028,
1784,
7801,
8316,
... | Validation |
4,061 | 5 | EchoLink:echolink echolink computer-based amateur radio system distributed free charge allows radio amateurs communicate amateur radio operators using voice ip voip technology internet least part path designed jonathan taylor radio amateur call sign k1rfd system allows reliable worldwide connections made radio amateurs greatly enhancing amateur radio communications capabilities essence voip applications skype unique addition ability link amateur radio station transceiver thus low-power handheld amateur radio transceiver contact local echolink node node active echolink station transceiver attached use internet connection station send transmission via voip active echolink node worldwide special hardware software required relay transmission via echolink node using system necessary prospective user callsign validated echolink system requires new user provide positive proof license identity callsign added list validated users cost service ensures system used licensed amateur radio operators software written run 32-bit 64-bit versions microsoft windows another edition software runs apple mobile devices iphone ipod touch ipad available apple app store android version available google play several android app repositories radio amateurs using echolink software operate one two modes radio amateurs without echolink software computer connected internet take advantage echolink network within radio range sysop mode echolink station also possible link sysop mode echolink station local repeater enhancing communication possibilities editions echolink also available two major smartphone platforms february 2010 edition echolink released apple iphone ipad ipod touch app store august 2010 edition echolink released android platform available google play store ios android editions created jonathan taylor k1rfd author original windows edition open source software packages largely compatible echolink available macintosh echomac echoham linux echolinux svxlink/qtel sysop mode required svxlink server linux good alternative features go beyond original software openness makes quite easy extend new functionality echoirlp software add irlp enables irlp node operate sysop mode echolink station echolink software designed run microsoft windows also known work several linux builds well loaded wine | [
1632,
1346,
3140,
9732,
6539,
6797,
6993,
823,
1083
] | Train |
4,062 | 4 | Common_Vulnerability_Scoring_System:common vulnerability scoring system common vulnerability scoring system cvss free open industry standard assessing severity computer system security vulnerabilities cvss attempts assign severity scores vulnerabilities allowing responders prioritize responses resources according threat scores calculated based formula depends several metrics approximate ease exploit impact exploit scores range 0 10 10 severe many utilize cvss base score determining severity temporal environmental scores also exist factor availability mitigations widespread vulnerable systems within organization respectively current version cvss cvssv3.0 released june 2015 research national infrastructure advisory council niac 2003/2004 led launch cvss version 1 cvssv1 february 2005 goal designed provide open universally standard severity ratings software vulnerabilities initial draft subject peer review review organizations april 2005 niac selected forum incident response security teams first become custodian cvss future development feedback vendors utilizing cvssv1 production suggested significant issues initial draft cvss work cvss version 2 cvssv2 began april 2005 final specification launched june 2007 feedback resulted work beginning cvss version 3 2012 ending cvssv3.0 released june 2015 cvss assessment measures three areas concern numerical score generated metric groups vector string simply vector cvssv2 represents values metrics block text complete documentation cvssv2 available first summary provided access vector av shows vulnerability may exploited attack complexity ac metric describes easy difficult exploit discovered vulnerability authentication au metric describes number times attacker must authenticate target exploit include example authentication network order gain access locally exploitable vulnerabilities value set single multiple authentication required initial access confidentiality c metric describes impact confidentiality data processed system integrity metric describes impact integrity exploited system availability metric describes impact availability target system attacks consume network bandwidth processor cycles memory resources affect availability system six metrics used calculate exploitability impact sub-scores vulnerability sub-scores used calculate overall base score formula_1 formula_2 formula_3 formula_4 metrics concatenated produce cvss vector vulnerability buffer overflow vulnerability affects web server software allows remote user gain partial control system including ability cause shut would give exploitability sub-score 10 impact sub-score 8.5 giving overall base score 9.0 vector base score case would av n/ac l/au n/c p/i p/a c. score vector normally presented together allow recipient fully understand nature vulnerability calculate environmental score necessary value temporal metrics change lifetime vulnerability exploits developed disclosed automated mitigations fixes made available exploitability e metric describes current state exploitation techniques automated exploitation code remediation level rl vulnerability allows temporal score vulnerability decrease mitigations official fixes made available report confidence rc vulnerability measures level confidence existence vulnerability also credibility technical details vulnerability three metrics used conjunction base score already calculated produce temporal score vulnerability associated vector formula used calculate temporal score temporalscore round_to_1_decimal basescore*exploitability*remediationlevel*reportconfidence continue example vendor first informed vulnerability posting proof-of-concept code mailing list initial temporal score would calculated using values shown would give temporal score 7.3 temporal vector e p/rl u/rc uc full vector av n/ac l/au n/c p/i p/a c/e p/rl u/rc uc vendor confirms vulnerability score rises 8.1 temporal vector e p/rl u/rc c temporary fix vendor would reduce score back 7.3 e p/rl t/rc c official fix would reduce 7.0 e p/rl o/rc c possible confident every affected system fixed patched temporal score reduce certain level based vendor actions may increase automated exploit vulnerability developed environmental metrics use base current temporal score assess severity vulnerability context way vulnerable product software deployed measure calculated subjectively typically affected parties collateral damage potential cdp metric measures potential loss impact either physical assets equipment lives financial impact upon affected organisation vulnerability exploited target distribution td metric measures proportion vulnerable systems environment three metrics assess specific security requirements confidentiality cr integrity ir availability ar allowing environmental score fine-tuned according users environment five environmental metrics used conjunction previously assessed base temporal metrics calculate environmental score produce associated environmental vector adjustedimpact min 10,10.41* 1- 1-confimpact*confreq 1-integimpact*integreq 1-availimpact*availreq adjustedtemporal temporalscore recomputed basescores impact sub-equation replaced adjustedimpact equation environmentalscore round_to_1_decimal adjustedtemporal+ 10-adjustedtemporal *collateraldamagepotential *targetdistribution aforementioned vulnerable web server used bank provide online banking services temporary fix available vendor environmental score could assessed would give environmental score 8.2 environmental vector cdp mh/td h/cr h/ir h/ar l. score within range 7.0-10.0 therefore constitutes critical vulnerability context affected bank business several vendors organizations expressed dissatisfaction cvssv2 risk based security manages open sourced vulnerability database open security foundation jointly published public letter first regarding shortcomings failures cvssv2 authors cited lack granularity several metrics results cvss vectors scores properly distinguish vulnerabilities different type risk profiles cvss scoring system also noted requiring much knowledge exact impact vulnerability oracle introduced new metric value partial+ confidentiality integrity availability fill perceived gaps description partial complete official cvss specifications address criticisms development cvss version 3 started 2012 final specification named cvss v3.0 released june 2015 addition specification document user guide examples document also released several metrics changed added removed numerical formulas updated incorporate new metrics retaining existing scoring range 0-10 textual severity ratings none 0 low 0.1-3.9 medium 4.0-6.9 high 7.0-8.9 critical 9.0-10.0 defined similar categories nvd defined cvss v2 part standard base vector new metrics user interaction ui privileges required pr added help distinguish vulnerabilities required user interaction user administrator privileges exploited previously concepts part access vector metric cvssv2 base vector also saw introduction new scope metric designed make clear vulnerabilities may exploited used attack parts system network new metrics allow base vector clearly express type vulnerability evaluated confidentiality integrity availability c metrics updated scores consisting none low high rather none partial complete cvssv2 allows flexibility determining impact vulnerability cia metrics access complexity renamed attack complexity ac make clear access privileges moved separate metric metric describes repeatable exploit vulnerability may ac high attacker requires perfect timing circumstances user interaction also separate metric may easily duplicated future attempts attack vector av saw inclusion new metric value physical p describe vulnerabilities require physical access device system perform temporal metrics essentially unchanged cvssv2 environmental metrics cvssv2 completely removed replaced essentially second base score known modified vector modified base intended reflect differences within organization company compared world whole new metrics capture importance confidentiality integrity availability specific environment added blog post september 2015 cert coordination center discussed limitations cvssv2 cvssv3.0 use scoring vulnerabilities emerging technology systems internet things minor update cvss released june 17 2019 goal cvss version 3.1 clarify improve upon existing cvss version 3.0 standard without introducing new metrics metric values allowing frictionless adoption new standard scoring providers scoring consumers alike usability prime consideration making improvements cvss standard several changes made cvss v3.1 improve clarity concepts introduced cvss v3.0 thereby improve overall ease use standard first used input industry subject-matter experts continue enhance refine cvss applicable vulnerabilities products platforms developed past 15 years beyond primary goal cvss provide deterministic repeatable way score severity vulnerability across many different constituencies allowing consumers cvss use score input larger decision matrix risk remediation mitigation specific particular environment risk tolerance updates cvss version 3.1 specification include clarification definitions explanation existing base metrics attack vector privileges required scope security requirements new standard method extending cvss called cvss extensions framework also defined allowing scoring provider include additional metrics metric groups retaining official base temporal environmental metrics additional metrics allow industry sectors privacy safety automotive healthcare etc. score factors outside core cvss standard finally cvss glossary terms expanded refined cover terms used throughout cvss version 3.1 documentation cvssv2 base score adopted primary method quantifying severity vulnerabilities wide range organisations companies including nvd plans begin scoring vulnerabilities using cvssv3.0 addition cvssv2 sometime fall 2015 | [
5636,
1319,
7337,
11213,
2446,
11567,
8050,
2709,
6423,
1369,
2300,
2558,
575
] | Test |
4,063 | 4 | Moxie_Marlinspike:moxie marlinspike matthew rosenfeld known moxie marlinspike american entrepreneur cryptographer computer security researcher marlinspike creator signal co-founder signal foundation currently serves ceo signal messenger also co-author signal protocol encryption used signal whatsapp facebook messenger skype allo responsible largest deployment consumer end-to-end encryption marlinspike former head security team twitter author proposed ssl authentication system replacement called convergence previously maintained cloud-based wpa cracking service targeted anonymity service called googlesharing originally state georgia marlinspike moved san francisco late 1990s worked several technology companies including enterprise infrastructure software maker bea systems inc 2004 marlinspike bought derelict sailboat along three friends refurbished sailed around bahamas making documentary journey called hold fast 2010 marlinspike chief technology officer co-founder whisper systems enterprise mobile security startup company may 2010 whisper systems launched textsecure redphone applications provided end-to-end encrypted sms messaging voice calling respectively company acquired social-media firm twitter undisclosed amount late 2011 acquisition done primarily mr. marlinspike could help then-startup improve security time head cybersecurity twitter firm made whisper systems apps open source marlinspike left twitter early 2013 founded open whisper systems collaborative open source project continued development textsecure redphone time marlinspike trevor perrin started developing signal protocol early version first introduced textsecure app february 2014 november 2015 open whisper systems unified textsecure redphone applications signal 2014 2016 marlinspike worked whatsapp facebook google integrate signal protocol messaging services february 21 2018 marlinspike whatsapp co-founder brian acton announced formation signal foundation 2009 paper marlinspike introduced concept ssl stripping man-in-the-middle attack network attacker could prevent web browser upgrading ssl connection subtle way would likely go unnoticed user also announced release tool codice_1 would automatically perform types man-in-the-middle attacks http strict transport security hsts specification subsequently developed combat attacks marlinspike discovered number different vulnerabilities popular ssl implementations notably marlinspike published 2002 paper exploiting ssl/tls implementations correctly verify x.509 v3 basicconstraints extension public key certificate chains allowed anyone valid ca-signed certificate domain name create appeared valid ca-signed certificates domain vulnerable ssl/tls implementations included microsoft cryptoapi making internet explorer windows software relied ssl/tls connections vulnerable man-in-the-middle attack 2011 vulnerability discovered remained present ssl/tls implementation apple inc. ios also notably marlinspike presented 2009 paper introduced concept null-prefix attack ssl certificates revealed major ssl implementations failed properly verify common name value certificate could tricked accepting forged certificates embedding null characters cn field 2011 marlinspike presented talk titled ssl future authenticity black hat security conference las vegas outlined many current problems certificate authorities announced release software project called convergence replace certificate authorities 2012 marlinspike trevor perrin submitted internet draft tack designed provide ssl certificate pinning help solve ca problem ietf 2012 marlinspike david hulton presented research makes possible reduce security ms-chapv2 handshakes single des encryption hulton built hardware capable cracking remaining des encryption less 24 hours two made hardware available anyone use internet service marlinspike says flying within united states unable print boarding pass required airline ticketing agents make phone call order issue one subjected secondary screening tsa security checkpoints entering united states via flight dominican republic 2010 marlinspike detained federal agents nearly five hours electronic devices confiscated first agents claimed would get back provided passwords could decrypt data marlinspike refused devices eventually returned though noted could longer trust saying could modified hardware installed new keyboard firmware | [
5636,
4746,
3852,
9744,
7722,
2360,
3704,
11345,
9690,
10332,
3805,
5087,
2147,
2275,
1254,
9196,
8045,
2678,
6520,
3708,
2558,
4863
] | Test |
4,064 | 9 | Document_Style_Semantics_and_Specification_Language:document style semantics specification language document style semantics specification language dsssl international standard developed provide stylesheets sgml documents dsssl consists two parts tree transformation process used manipulate tree structure documents prior presentation formatting process associates elements source document specific nodes target representation—the flow object tree dsssl specifications device-independent pieces information interchanged different platforms dsssl standardize back-end formatters generate language output formatters may render output on-screen display write computer file specific format postscript rich text format based subset scheme programming language specified standard iso/iec 10179:1996 developed iso/iec jtc1/sc34 iso/iec joint technical committee 1 subcommittee 34 document description processing languages sgml contains information machine-readable human-readable format stylesheet used present information stored sgml pleasing accessible way dsssl convert wide range formats including rtf html latex dsssl compatible sgml-based document type used often docbook 1997 software engineer geir ove grønmo published syntax highlighting language definition kedit appearance xml alternative sgml xml associated stylesheet language xsl also widely rapidly adopted around 1999 although dsssl continued use within shrinking sgml field xsl soon use extensively coders dsssl ever achieved emphasised previous sgml strongholds docbook converted sgml xml also converted favoured stylesheet language dsssl xsl sometime 1994 opera software began drafting dsssl lite specification consideration world wide web consortium since dsssl thought complex world wide web | [
2432,
9345,
10752,
8854,
11036,
5149,
2206,
7455,
9245,
5413,
10413,
6062,
11056,
8627,
8628,
3126,
1079,
5816,
62,
6977,
2374,
8904,
1610,
9290,
8524,
2519,
119,
2904,
4058,
8923,
479,
10083,
7805,
8421,
8426,
2030,
5614,
1010,
4979,
344... | Test |
4,065 | 1 | Relational_algebra:relational algebra relational algebra first created edgar f. codd ibm family algebras well-founded semantics used modelling data stored relational databases defining queries main application relational algebra providing theoretical foundation relational databases particularly query languages databases chief among sql relational algebra received little attention outside pure mathematics publication e.f. codd relational model data 1970 codd proposed algebra basis database query languages see section implementations five primitive operators codd algebra selection projection cartesian product also called cross product cross join set union set difference relational algebra uses set union set difference cartesian product set theory adds additional constraints operators set union set difference two relations involved must union-compatible —that two relations must set attributes set intersection defined terms set union set difference two relations involved set intersection must also union-compatible cartesian product defined two relations involved must disjoint headers—that must common attribute name addition cartesian product defined differently one set theory sense tuples considered shallow purposes operation cartesian product set n -tuples set -tuples yields set flattened -tuples whereas basic set theory would prescribed set 2-tuples containing n -tuple -tuple formally r × defined follows formula_1 cardinality cartesian product product cardinalities factors r × r × projection unary operation written formula_2 formula_3 set attribute names result projection defined set obtained tuples r restricted set formula_4 note implemented sql standard default projection returns multiset instead set projection obtained addition codice_1 keyword eliminate duplicate data generalized selection unary operation written formula_5 propositional formula consists atoms allowed normal selection logical operators negation selection selects tuples r holds obtain listing friends business associates address book selection might written formula_6 result would relation containing every attribute every unique record true true rename unary operation written formula_7 result identical r except b attribute tuples renamed attribute simply used rename attribute relation relation rename 'isfriend attribute 'isbusinesscontact relation formula_8 might used natural join ⋈ binary operator written r ⋈ r relations result natural join set combinations tuples r equal common attribute names example consider tables employee dept natural join also used define composition relations example composition employee dept join shown projected common attribute deptname category theory join precisely fiber product natural join arguably one important operators since relational counterpart logical note carefully variable appears two predicates connected variable stands thing appearances must always substituted value particular natural join allows combination relations associated foreign key example example foreign key probably holds employee deptname dept deptname natural join employee dept combines employees departments works foreign key holds attributes name case foreign key dept manager employee name rename columns take natural join join sometimes also referred equijoin see θ -join formally semantics natural join defined follows fun predicate true relation mathematical sense iff function usually required r must least one common attribute constraint omitted r common attributes natural join becomes exactly cartesian product natural join simulated codd primitives follows assume c ... c attribute names common r r ... r attribute names unique r ... attribute names unique furthermore assume attribute names x ... x neither r first step rename common attribute names take cartesian product select tuples joined finally take projection get rid renamed attributes consider tables car boat list models cars boats respective prices suppose customer wants buy car boat want spend money boat car θ -join ⋈ predicate carprice ≥ boatprice produces flattened pairs rows satisfy predicate using condition attributes equal example price condition may specified price price alternatively price want combine tuples two relations combination condition simply equality shared attributes convenient general form join operator θ -join theta-join θ -join binary operator written formula_9 formula_10 b attribute names θ binary relational operator set ≤ ≠ ≥ v value constant r relations result operation consists combinations tuples r satisfy θ result θ -join defined headers r disjoint contain common attribute simulation operation fundamental operations therefore follows case operator θ equality operator join also called equijoin note however computer language supports natural join selection operators need θ -join well achieved selection result natural join degenerates cartesian product shared attributes sql implementations joining predicate usually called inner join keyword allows one specify predicate used filter rows important note forming flattened cartesian product filtering rows conceptually correct implementation would use sophisticated data structures speed join query left semijoin joining similar natural join written r ⋉ r relations result set tuples r tuple equal common attribute names difference natural join columns appear example consider tables employee dept semijoin formally semantics semijoin defined follows fun r definition natural join semijoin simulated using natural join follows ... attribute names r since simulate natural join basic operators follows also holds semijoin codd 1970 paper semijoin called restriction antijoin written r ▷ r relations similar semijoin result antijoin tuples r tuple equal common attribute names example consider tables employee dept antijoin antijoin formally defined follows fun ∪ definition natural join antijoin also defined complement semijoin follows given antijoin sometimes called anti-semijoin antijoin operator sometimes written semijoin symbol bar instead ▷ division binary operation written r ÷ division implemented directly sql result consists restrictions tuples r attribute names unique r i.e. header r header holds combinations tuples present r example see tables completed dbproject division dbproject contains tasks database project result division contains exactly students completed tasks database project formally semantics division defined follows ... set attribute names unique r ... restriction set usually required attribute names header subset r otherwise result operation always empty simulation division basic operations follows assume ... attribute names unique r b ... b attribute names first step project r unique attribute names construct combinations tuples prior example would represent table every student student unique key attribute completed table combined every given task eugene instance would two rows eugene → database1 eugene → database2 t. relation u possible combinations could r n't restrictions tuples r combinations tuples present r remains done take projection r unique attribute names subtract v practice classical relational algebra described extended various operations outer joins aggregate functions even transitive closure whereas result join inner join consists tuples formed combining matching tuples two operands outer join contains tuples additionally tuples formed extending unmatched tuple one operands fill values attributes operand outer joins considered part classical relational algebra discussed far operators defined section assume existence null value ω define used fill values practice corresponds null sql order make subsequent selection operations resulting table meaningful semantic meaning needs assigned nulls codd approach propositional logic used selection extended three-valued logic although elide details article three outer join operators defined left outer join right outer join full outer join word outer sometimes omitted left outer join written r ⟕ r relations result left outer join set combinations tuples r equal common attribute names addition loosely speaking tuples r matching tuples example consider tables employee dept left outer join resulting relation tuples common values common attribute names tuples r take null value ω since tuples dept deptname finance executive ω occur resulting relation tuples employee deptname finance executive let r r ... r attributes relation r let ω ... ω singleton relation attributes unique relation attributes r left outer join described terms natural join hence using basic operators follows right outer join behaves almost identically left outer join roles tables switched right outer join relations r written r ⟖ result right outer join set combinations tuples r equal common attribute names addition tuples matching tuples r example consider tables employee dept right outer join resulting relation tuples r common values common attribute names tuples take null value ω since tuples employee deptname production ω occur name empid attributes resulting relation tuples dept deptname production let ... attributes relation let ω ... ω singleton relation attributes unique relation r attributes left outer join right outer join simulated using natural join follows ⟗the outer join full outer join effect combines results left right outer joins full outer join written r ⟗ r relations result full outer join set combinations tuples r equal common attribute names addition tuples matching tuples r tuples r matching tuples common attribute names example consider tables employee dept full outer join resulting relation tuples r common values common attribute names tuples take null value ω tuples common values common attribute names tuples r also take null value ω full outer join simulated using left right outer joins hence natural join set union follows nothing relational algebra introduced far would allow computations data domains evaluation propositional expressions involving equality example possible using algebra introduced far write expression would multiply numbers two columns e.g unit price quantity obtain total price practical query languages facilities e.g sql select allows arithmetic operations define new columns result similar facility provided explicitly tutorial codice_2 keyword database theory called extended projection furthermore computing various functions column like summing elements also possible using relational algebra introduced far five aggregate functions included relational database systems operations sum count average maximum minimum relational algebra aggregation operation schema ... written follows 1 ≤ j ≤ k one original attributes 1 ≤ ≤ n attributes preceding g grouping attributes function like group clause sql arbitrary number aggregation functions applied individual attributes operation applied arbitrary relation r grouping attributes optional supplied aggregation functions applied across entire relation operation applied let assume table named three columns namely wish find maximum balance branch accomplished g find highest balance accounts regardless branch could simply write g although relational algebra seems powerful enough practical purposes simple natural operators relations expressed relational algebra one transitive closure binary relation given domain let binary relation r subset × transitive closure r r smallest subset × contains r satisfies following condition relational algebra expression e r taking r variable argument produces r proved using fact given relational expression e claimed e r r r variable always find instance r r corresponding domain e r ≠ r. sql however officially supports fixpoint queries since 1999 vendor-specific extensions direction well queries represented tree primary goal transform expression trees equivalent expression trees average size relations yielded subexpressions tree smaller optimization secondary goal try form common subexpressions within single query one query evaluated time queries rationale behind second goal enough compute common subexpressions results used queries contain subexpression present set rules used transformations rules selection operators play important role query optimization selection operator effectively decreases number rows operand manage move selections expression tree towards leaves internal relations yielded subexpressions likely shrink selection idempotent multiple applications selection additional effect beyond first one commutative order selections applied effect eventual result selection whose condition conjunction simpler conditions equivalent sequence selections individual conditions selection whose condition disjunction equivalent union selections identities used merge selections fewer selections need evaluated split component selections may moved optimized separately cross product costliest operator evaluate input relations n rows result contain formula_19 rows therefore important best decrease size operands applying cross product operator effectively done cross product followed selection operator e.g formula_20 considering definition join likely case cross product followed selection operator try push selection higher levels expression tree using selection rules case break condition conditions b c using split rules complex selection conditions formula_21 b contains attributes r c contains attributes p contains part contains attributes r p note b c possibly empty following holds selection distributive set difference intersection union operators following three rules used push selection set operations expression tree set difference intersection operators possible apply selection operator one operands following transformation beneficial one operands small overhead evaluating selection operator outweighs benefits using smaller relation operand selection commutes projection fields referenced selection condition subset fields projection performing selection projection may useful operand cross product join cases selection condition relatively expensive compute moving selection outside projection may reduce number tuples must tested since projection may produce fewer tuples due elimination duplicates resulting omitted fields projection idempotent series valid projections equivalent outermost projection projection distributive set union projection distribute intersection set difference counterexamples given b assumed distinct successive renames variable collapsed single rename rename operations variables common arbitrarily reordered respect one another exploited make successive renames adjacent collapsed rename distributive set difference union intersection cartesian product distributive union first query language based codd algebra alpha developed dr. codd subsequently isbl created pioneering work acclaimed many authorities shown way make codd idea useful language business system 12 short-lived industry-strength relational dbms followed isbl example 1998 chris date hugh darwen proposed language called tutorial intended use teaching relational database theory query language also draws isbl ideas rel implementation tutorial d. even query language sql loosely based relational algebra though operands sql tables exactly relations several useful theorems relational algebra hold sql counterpart arguably detriment optimisers and/or users sql table model bag multiset rather set example expression formula_39 theorem relational algebra sets relational algebra bags treatment relational algebra bags see chapter 5 complete textbook garcia-molina ullman widom practically academic textbook databases detailed treatment classic relational algebra | [
10632,
8201,
8979,
2068,
10389,
7446,
11030,
2456,
1049,
5658,
5403,
2972,
9112,
7582,
4255,
9248,
9631,
9634,
11327,
1447,
2344,
4263,
7080,
10793,
10413,
10286,
9397,
4281,
10137,
3004,
1341,
7868,
11324,
10048,
2369,
5953,
6850,
9411,
60... | None |
4,066 | 1 | Tuple_relational_calculus:tuple relational calculus tuple calculus calculus created introduced edgar f. codd part relational model order provide declarative database-query language data manipulation data model formed inspiration database-query languages quel sql latter although far less faithful original relational model calculus de facto standard database-query language dialect used nearly every relational-database-management system michel lacroix alain pirotte proposed domain calculus closer first-order logic together codd showed calculi well relational algebra equivalent expressive power subsequently query languages relational model called relationally complete could express least queries since calculus query language relational databases first define relational database basic relational building block domain somewhat similar equal data type tuple finite sequence attributes ordered pairs domains values relation set ordered pairs domains names relation serves header relation relation set compatible tuples although relational concepts mathematically defined definitions map loosely traditional database concepts table accepted visual representation relation tuple similar concept row first assume existence set c column names examples name author address etcetera define headers finite subsets c relational database schema defined tuple r h domain atomic values see relational model notions domain atomic value r finite set relation names function associates header relation name r note simplification full relational model one domain header set column names also maps column names domain given domain define tuple partial function maps column names atomic value example would name harry age 25 set tuples denoted subset c tuple defined called domain confused domain schema denoted dom finally define relational database given schema r h function maps relation names r finite subsets every relation name r r tuple db r holds latter requirement simply says tuples relation contain column names namely defined schema construction formulas assume infinite set v tuple variables formulas defined given database schema r h partial function type v ⇸ 2 called type assignment assigns headers tuple variables define set atomic formulas type following rules examples atoms formal semantics atoms defined given database db tuple variable binding val v → maps tuple variables tuples domain atoms combined formulas usual first-order logic logical operators ∧ ∨ ¬ use existential quantifier ∃ universal quantifier ∀ bind variables define set formulas f type inductively following rules examples formulas note last formula states books written c. j date subject relational model usual omit brackets causes ambiguity semantics formula assume quantifiers quantify universe tuples domain schema leads following formal semantics formulas given database db tuple variable binding val v finally define query expression looks like given schema r h v tuple variable h header f v formula f type type v h v free variable result query given database db set tuples dom h f true db val v examples query expressions semantics quantifiers quantify tuples domain schema query may return different result certain database another schema presumed example consider two schemas r h r h domains 1 1 2 relation names r r headers h r schemas common instance consider following query expression result db either 1 1 2 also clear take domain infinite set result query also infinite solve problems restrict attention queries domain independent i.e. queries return result database schemas interesting property queries assume tuple variables range tuples so-called active domain database subset domain occurs least one tuple database query expression semantics query expressions change fact many definitions tuple calculus semantics quantifiers defined makes queries definition domain independent order limit query expressions express domain-independent queries syntactical notion safe query usually introduced determine whether query expression safe derive two types information query first whether variable-column pair bound column relation constant second whether two variable-column pairs directly indirectly equated denoted v == w deriving boundedness introduce following reasoning rules deriving equatedness introduce following reasoning rules next usual reasoning rules equivalence relations reflexivity symmetry transitivity say query expression v h f v safe restriction safe query expressions limit expressiveness since domain-independent queries could expressed also expressed safe query expression proven showing schema r h given set k constants query expression tuple variable v header h construct safe formula every pair v h states value active domain example assume k 1,2 r r h r b corresponding safe formula v .b formula used rewrite unsafe query expression equivalent safe query expression adding formula every variable v column name type used expression effectively means let variables range active domain already explained change semantics expressed query domain independent | [
4065,
10145,
9286,
4263,
10413,
10737,
9075,
2901,
9397,
2972,
7582,
11327
] | Test |
4,067 | 4 | Trusted_Computer_System_Evaluation_Criteria:trusted computer system evaluation criteria trusted computer system evaluation criteria tcsec united states government department defense dod standard sets basic requirements assessing effectiveness computer security controls built computer system tcsec used evaluate classify select computer systems considered processing storage retrieval sensitive classified information tcsec frequently referred orange book centerpiece dod rainbow series publications initially issued 1983 national computer security center ncsc arm national security agency updated 1985 tcsec eventually replaced common criteria international standard originally published 2005 24 october 2002 orange book aka dodd 5200.28-std canceled dodd 8500.1 later reissued dodi 8500.02 14 march 2014 security policy must explicit well-defined enforced computer system three basic security policies specified individual accountability regardless policy must enforced secure means must exist ensure access authorized competent agent evaluate accountability information within reasonable amount time without undue difficulty accountability objective includes three requirements computer system must contain hardware/software mechanisms independently evaluated provide sufficient assurance system enforces requirements extension assurance must include guarantee trusted portion system works intended accomplish objectives two types assurance needed respective elements within class additional set documentation addresses development deployment management system rather capabilities documentation includes tcsec defines four divisions c b division highest security division represents significant difference trust individual organization place evaluated system additionally divisions c b broken series hierarchical subdivisions called classes c1 c2 b1 b2 b3 a1 division class expands modifies indicated requirements immediately prior division class publication entitled army regulation 380-19 example guide determining system class used given situation | [
6787,
4988,
10378,
5136,
11281,
6675,
1304,
3616,
3241,
2477,
9646,
7983,
1585,
1458,
2737,
2995,
4914,
10933,
7354,
10170,
8637,
1350,
8904,
1225,
4303,
7887,
10835,
3924,
10580,
9817,
3930,
10467,
11496,
3178,
8302,
3827,
6772,
9846,
636,... | Test |
4,068 | 2 | FaceTime:facetime facetime proprietary videotelephony product developed apple inc. facetime available supported ios mobile devices macintosh computers run later facetime supports ios device forward-facing camera macintosh computer equipped facetime camera facetime audio audio-only version available ios device supports ios 7 newer macintosh forward-facing camera running later facetime included free ios macos 10.7 onwards apple bought facetime name facetime communications changed name actiance inc. june 7 2010 apple announced facetime conjunction iphone 4 apple bought facetime name facetime communications changed name actiance january 2011 june 7 2010 apple announced facetime conjunction iphone 4 support fourth generation ipod touch first model ipod touch equipped cameras announced conjunction device release september 8 2010 facetime announced october 20 2010 march 2 2011 facetime support announced newly introduced ipad 2 forward- rear-facing cameras february 24 2011 facetime left beta listed mac app store us 0.99 apple claims intended provide application free charge however provision sarbanes–oxley act 2002 bars companies providing unadvertised new feature already-sold product without enduring onerous accounting measures us 0.99 beta still available download apple facetime included free macos 10.7 onwards ios allowed customers use facetime long tiered blocked application working customers unlimited data plans brought federal communications commission fcc net neutrality violations may 2011 found facetime would work seamlessly 3g iphone ipad ipod touch models supported even though facetime worked 3g time supports 4g lte calls networks world availability limited operators gsm plans june 2018 apple announced facetime would support group video audio calls 32 people ios 12 macos mojave facetime works establishing connection two supported devices apple devices iphones ipads macs introduced 2011 support facetime facetime currently incompatible non-apple devices video calling services mac models introduced 2011 high-definition video facetime devices use automatically ends facetime hd camera unlike mac os x ichat facetime currently support group conferencing support announced ios 12 application one-on-one video chat—only two people talk second user calls user answers video chat previous user ends new video session begins second caller iphone phone call pending user attempts answer video call ends phone call begins next user incoming notifications ios devices shown facetime call opened video temporarily paused user back facetime app iphone user activate facetime phone call pressing facetime button initiated facetime call history contacts application ios 7 newer also provide separate facetime app always apple non-telephony devices ipad ipod touch mac release ios 6 facetime required wifi connection work ios 6 onwards facetime iphone ipad supported facetime calls cellular networks 3g lte provided carrier enabled mid-2013 virtually carriers worldwide allowed facetime audio uses three megabytes data every five minutes conversation facetime video using significantly cellular talk time/minutes used switching voice call facetime call facetime calls placed supported devices phone number email address registered facetime service single email address registered multiple devices call placed address rings devices simultaneously facetime protocol based numerous open industry standards although interoperable videotelephony systems upon launch iphone 4 jobs stated apple would immediately start working standards bodies make facetime protocol open industry standard protocols open standards apple facetime service requires client-side certificate facetime calls protected end-to-end encryption sender receiver access apple decrypt data compared sip implementations facetime adds techniques enhance performance cost breaking interoperability port multiplexing sdp minimization sdp compression new audio-only version facetime named facetime audio announced annual apple worldwide developers conference wwdc keynote speech june 10 2013 released ios 7 september 18 2013 audio-only version facetime effectively makes protocol voice internet protocol voip competes mainstream providers field including skype microsoft based aac-ld audio protocol service provides high-quality audio ios 7 betas limited facetime audio calls placed wi-fi network original limitation video version facetime final release removed restriction allow work 3g lte data connections case carriers plans regard facetime video like video version facetime audio currently available apple devices feature available run ipod touch 4th generation device support ios 7 later facetime streaming cellular data unavailable iphone 4 ipad 2. facetime enabled devices bought united arab emirates possibly due regulations country restrict ip-based communications addition devices bought china facetime audio disabled facetime video available devices bought outside countries support video audio versions facetime although egypt jordan qatar kuwait originally disabled facetime iphone 4 later re-enabled feature carrier update existing phone owners made pre-enabled newly purchased iphone march 2018 facetime available iphones saudi arabia upon updating ios 11.3 august 2019 facetime available iphones pakistan upon updating ios 12.4 april 16 2014 facetime ceased working earlier versions ios previously supported ios 4 5 6 client-side certificate used authenticate genuine apple device facetime servers amongst uses expired date apple chose release update certificate devices newer major ios version new valid certificate available apple release minor update certificate os x versions could run facetime also earlier versions ios small number devices could run facetime could run newer major version ios 4th generation ipod touch result policy almost ios users update ios version devices wished continue using facetime limitation applied even users jailbroken devices since even legally jailbroken device would difficult also illegal extract install apple new certificate without apple permission order work around issue due proprietary nature facetime currently unavailable platforms including android windows january 28 2019 bug discovered facetime app allowed users eavesdrop users without knowledge exploit later discovered video feed could enabled without users acceptance apple said statement would release fix exploit shortly disabling group facetime time bug named facepalm security researchers affects ios devices running facetime ios 12.1 later macintosh computers running macos 10.14.1 mojave later although bug gained international attention january 28 2019 bug found 14-year old high school student arizona mother tried week warn apple problem facebook twitter discovering bug january 20th however pair found impossible reach anyone company short smoke signals trying every method someone could use get hold someone apple said ms. thompson january 25 2019 posted video youtube demonstrating bug news bug finally gained media coverage ms thompson wrote letters emails tweets msgs sent apple 10+ days reporting group facetime bug lets someone listen teenager discovered never heard back ” | [
10242,
10755,
9732,
4615,
2057,
1036,
1549,
5647,
7697,
1042,
11289,
3610,
10271,
3105,
6186,
4139,
6700,
7723,
7214,
4657,
1074,
8754,
8758,
9784,
1083,
8253,
576,
6208,
9802,
8783,
5713,
4180,
3670,
1623,
3672,
4184,
10838,
2141,
4702,
... | Test |
4,069 | 9 | Comparison_of_programming_languages_by_type_system:comparison programming languages type system onlyinclude comparison programming languages type system compares features type systems type checking multiple programming languages brief definitions /onlyinclude | [
10752,
2062,
6160,
9245,
5165,
5677,
6718,
8262,
1610,
1611,
9804,
7274,
2670,
623,
6775,
3705,
7292,
3736,
155,
7326,
5796,
4777,
7341,
5806,
692,
3765,
8397,
7889,
2774,
7894,
5336,
8421,
10470,
9454,
4341,
6910,
6414,
10510,
11555,
387... | Validation |
4,070 | 0 | Dependency_grammar:dependency grammar dependency grammar dg class modern grammatical theories based dependency relation opposed relation phrase structure traced back primarily work lucien tesnière dependency notion linguistic units e.g words connected directed links finite verb taken structural center clause structure syntactic units words either directly indirectly connected verb terms directed links called dependencies dgs distinct phrase structure grammars since dgs lack phrasal nodes although acknowledge phrases structure determined relation word head dependents dependency structures flatter phrase structures part lack finite verb phrase constituent thus well suited analysis languages free word order czech slovak warlpiri notion dependencies grammatical units existed since earliest recorded grammars e.g pāṇini dependency concept therefore arguably predates phrase structure many centuries ibn maḍāʾ 12th-century linguist córdoba andalusia may first grammarian use term dependency grammatical sense use today early modern times dependency concept seems coexisted side side phrase structure latter entered latin french english grammars widespread study term logic antiquity dependency also concretely present works sámuel brassai 1800–1897 hungarian linguist 1830-1894 german philologist heimann hariton tiktin 1850–1936 romanian linguist modern dependency grammars however begin primarily work lucien tesnière tesnière frenchman polyglot professor linguistics universities strasbourg montpellier major work éléments de syntaxe structurale published posthumously 1959 – died 1954 basic approach syntax developed seems seized upon independently others 1960s number dependency-based grammars gained prominence since early works dg generated lot interest germany theoretical syntax language pedagogy recent years great development surrounding dependency-based theories come computational linguistics due part influential work david hays machine translation rand corporation 1950s 1960s dependency-based systems increasingly used parse natural language generate tree banks interest dependency grammar growing present international conferences dependency linguistics relatively recent development depling 2011 depling 2013 depling 2015 depling 2017 depling 2019 dependency one-to-one correspondence every element e.g word morph sentence exactly one node structure sentence corresponds element result one-to-one correspondence dependency grammars word morph grammars exist elements dependencies connect elements structure situation compared phrase structure phrase structure one-to-one-or-more correspondence means every element sentence one nodes structure correspond element result difference dependency structures minimal compared phrase structure counterparts since tend contain many fewer nodes trees illustrate two possible ways render dependency phrase structure relations see dependency tree ordered tree i.e reflects actual word order many dependency trees abstract away linear order focus hierarchical order means show actual word order constituency phrase structure tree follows conventions bare phrase structure bps whereby words employed node labels distinction dependency phrase structure grammars derives large part initial division clause phrase structure relation derives initial binary division whereby clause split subject noun phrase np predicate verb phrase vp division certainly present basic analysis clause find works instance leonard bloomfield noam chomsky tesnière however argued vehemently binary division preferring instead position verb root clause structure tesnière stance subject-predicate division stems term logic place linguistics importance distinction one acknowledges initial subject-predicate division syntax real one likely go path phrase structure grammar one rejects division one must consider verb root structure go path dependency grammar following frameworks dependency-based link grammar similar dependency grammar link grammar include directionality linked words thus describe head-dependent relationships hybrid dependency/phrase structure grammar uses dependencies words also includes dependencies phrasal nodes – see example quranic arabic dependency treebank derivation trees tree-adjoining grammar dependency structures although full trees tag rendered terms phrase structure regard clear whether tag viewed dependency phrase structure grammar major differences grammars listed regard dependency relation compatible major tenets theories grammar thus like phrase structure grammars dependency grammars mono- multistratal representational derivational construction- rule-based various conventions dgs employ represent dependencies following schemata addition tree trees illustrate conventions representations a–d trees whereby specific conventions employed tree vary solid lines dependency edges lightly dotted lines projection lines difference tree tree b tree employs category class label nodes whereas tree b employs words node labels tree c reduced tree insofar string words projection lines deemed unnecessary hence omitted tree abstracts away linear order reflects hierarchical order arrow arcs e alternative convention used show dependencies favored word grammar brackets f seldom used nevertheless quite capable reflecting dependency hierarchy dependents appear enclosed brackets heads finally indentations like g another convention sometimes employed indicate hierarchy words dependents placed underneath heads indented like tree indentations g abstract away linear order point conventions namely conventions influence basic commitment dependency relation grouping syntactic units dependency representations show syntactic dependencies indeed work dependency grammar focuses syntactic dependencies syntactic dependencies however one three four types dependencies meaning–text theory instance emphasizes role semantic morphological dependencies addition syntactic dependencies fourth type prosodic dependencies also acknowledged distinguishing types dependencies important part one fails likelihood semantic morphological and/or prosodic dependencies mistaken syntactic dependencies great following four subsections briefly sketch dependency types discussion existence syntactic dependencies taken granted used orientation point establishing nature three dependency types semantic dependencies understood terms predicates arguments arguments predicate semantically dependent predicate often semantic dependencies overlap point direction syntactic dependencies times however semantic dependencies point opposite direction syntactic dependencies entirely independent syntactic dependencies hierarchy words following examples show standard syntactic dependencies whereas arrows indicate semantic dependencies two arguments sam sally tree dependent predicate likes whereby arguments also syntactically dependent likes means semantic syntactic dependencies overlap point direction tree attributive adjectives however predicates take head noun argument hence big predicate tree b takes bones one argument semantic dependency points tree therefore runs counter syntactic dependency similar situation obtains c preposition predicate takes two arguments picture wall one semantic dependencies points syntactic hierarchy whereas points finally predicate help takes one argument jim directly connected jim syntactic hierarchy means semantic dependency entirely independent syntactic dependencies morphological dependencies obtain words parts words given word part word influences form another word latter morphologically dependent former agreement concord therefore manifestations morphological dependencies like semantic dependencies morphological dependencies overlap point direction syntactic dependencies overlap point opposite direction syntactic dependencies entirely independent syntactic dependencies arrows used indicate morphological dependencies plural houses demands plural demonstrative determiner hence appears means morphological dependency points hierarchy houses situation reversed b singular subject sam demands appearance agreement suffix -s finite verb works means morphological dependency pointing hierarchy sam works type determiner german examples c influences inflectional suffix appears adjective alt indefinite article ein used strong masculine ending -er appears adjective definite article der used contrast weak ending -e appears adjective thus since choice determiner impacts morphological form adjective morphological dependency pointing determiner adjective whereby morphological dependency entirely independent syntactic dependencies consider following french sentences masculine subject le chien demands masculine form predicative adjective blanc whereas feminine subject la maison demands feminine form adjective morphological dependency entirely independent syntactic dependencies therefore points across syntactic hierarchy morphological dependencies play important role typological studies languages classified mostly head-marking sam work-s mostly dependent-marking houses whereby languages contain least minor measure head dependent marking prosodic dependencies acknowledged order accommodate behavior clitics clitic syntactically autonomous element prosodically dependent host clitic therefore integrated prosody host meaning forms single word host prosodic dependencies exist entirely linear dimension horizontal dimension whereas standard syntactic dependencies exist hierarchical dimension vertical dimension classic examples clitics english reduced auxiliaries e.g -ll -s -ve possessive marker -s prosodic dependencies following examples indicated hyphen lack vertical projection line hyphens lack projection lines indicate prosodic dependencies hyphen appears left clitic indicates clitic prosodically dependent word immediately left 'll whereas hyphen appears right side clitic shown indicates clitic prosodically dependent word appears immediately right given clitic often prosodically dependent syntactic dependent 'll head would 've times depend prosodically word neither head immediate dependent florida syntactic dependencies focus work dg stated presence direction syntactic dependencies determined course often open debate regard must acknowledged validity syntactic dependencies trees throughout article taken granted however hierarchies many dgs largely support although certainly points disagreement basic question syntactic dependencies discerned proven difficult answer definitively one acknowledge area however basic task identifying discerning presence direction syntactic dependencies dgs easier harder determining constituent groupings phrase structure grammars variety heuristics employed end basic tests constituents useful tools syntactic dependencies assumed trees article grouping words together manner closely matches results standard permutation substitution ellipsis tests constituents etymological considerations also provide helpful clues direction dependencies promising principle upon base existence syntactic dependencies distribution one striving identify root given phrase word responsible determining distribution phrase whole root traditionally dgs different approach linear order word order phrase structure grammars dependency structures minimal compared phrase structure counterparts minimal structures allow one focus intently two ordering dimensions separating vertical dimension hierarchical order horizontal dimension linear order easily accomplished aspect dependency structures allowed dgs starting tesnière 1959 focus hierarchical order manner hardly possible phrase structure grammars tesnière linear order secondary hierarchical order insofar hierarchical order preceded linear order mind speaker stemmas trees tesnière produced reflected view abstracted away linear order focus almost entirely hierarchical order many dgs followed tesnière adopted practice produced tree structures reflect hierarchical order alone e.g traditional focus hierarchical order generated impression dgs little say linear order contributed view dgs particularly well-suited examine languages free word order negative result focus hierarchical order however dearth dg explorations particular word order phenomena standard discontinuities comprehensive dependency grammar accounts topicalization wh -fronting scrambling extraposition mostly absent many established dg frameworks situation contrasted phrase structure grammars devoted tremendous effort exploring phenomena nature dependency relation however prevent one focusing linear order dependency structures capable exploring word order phenomena phrase structures following trees illustrate point represent one way exploring discontinuities using dependency structures trees suggest manner common discontinuities addressed example german used illustrate scrambling discontinuity a-trees left show projectivity violations crossing lines b-trees right demonstrate one means addressing violations displaced constituent takes word head governor words red mark catena =chain words extends root displaced constituent governor constituent discontinuities explored terms catenae limitations topicalization wh -fronting scrambling extraposition explored identified examining nature catenae involved traditionally dgs treated syntactic functions grammatical functions grammatical relations primitive posit inventory functions e.g subject object oblique determiner attribute predicative etc. functions appear labels dependencies tree structures e.g syntactic functions tree shown green attr attribute comp-p complement preposition comp-to complement det determiner p-attr prepositional attribute pred predicative subj subject to-comp complement functions chosen abbreviations used tree merely representative general stance dgs toward syntactic functions actual inventory functions designations employed vary dg dg primitive theory status functions much different phrase structure grammars traditionally phrase structure grammars derive syntactic functions constellation instance object identified np appearing inside finite vp subject np appearing outside finite vp since dgs reject existence finite vp constituent never presented option view syntactic functions manner issue question comes first traditionally dgs take syntactic functions primitive derive constellation functions whereas phrase structure grammars traditionally take constellation primitive derive syntactic functions constellation question comes first functions constellation inflexible matter stances grammar types dependency phrase structure narrowly limited traditional views dependency phrase structure fully compatible approaches syntactic functions indeed monostratal systems based dependency phrase structure likely reject notion functions derived constellation constellation derived functions take primitive means neither derived | [
1890,
3078,
5478,
5161,
8297,
10890,
2316,
10577,
10610,
1044,
5399
] | Test |
4,071 | 2 | OpenBSD_security_features:openbsd security features openbsd operating system focuses security development security features according author michael w. lucas openbsd widely regarded secure operating system available anywhere licensing terms bugs security flaws often caused programmer error common source error misuse codice_1 codice_2 string functions c programming language two common alternatives codice_3 codice_4 difficult understand easy misuse openbsd developers todd c. miller theo de raadt designed codice_5 codice_6 functions functions intended make harder programmers accidentally leave buffers unterminated allow overflowed adopted netbsd freebsd projects gnu c library openbsd linker changed issue warning unsafe string manipulation functions codice_1 codice_2 codice_9 found occurrences functions openbsd source tree replaced addition static bounds checker included openbsd attempt find common programming mistakes compile time security-related apis developed openbsd project include codice_10 codice_11 june 2017 email theo de raadt stated problem stable systems could running months time although considerable randomization within kernel key addresses remains project progress modifies linker every boot kernel relinked well randomizations differs kernel aslr email states result every new kernel unique relative offsets functions data unique ... current change scaffolding ensure boot newly-linked kernel upon every reboot ... new random kernel linked together ... fast machine takes less second ... reboot runs new kernel yet another kernel built next boot internal deltas functions inside kernel attacker expects 'll need better info leaks openbsd integrates several technologies help protect operating system attacks buffer overflows integer overflows developed hiroaki etoh propolice gcc extension designed protect applications stack-smashing attacks number operations local stack variables reordered place buffers pointers protecting corruption case buffer overflow pointers function arguments also placed local buffers canary value placed local buffers function exits sometimes used detect buffer overflows propolice chooses whether protect buffer based automatic heuristics judge vulnerable reducing performance overhead protection integrated openbsd version gcc december 2002 first made available openbsd 3.3 applied kernel release 3.4 extension works cpu architectures supported openbsd enabled default c code compiled protected without user intervention may 2004 openbsd sparc platform received stack protection form stackghost makes use features sparc architecture help prevent exploitation buffer overflows support sparc64 added march 2005 openbsd 3.4 introduced w^x memory management scheme ensure memory either writable executable never provides another layer protection buffer overflows relatively easy implement platform like x86-64 hardware support nx bit openbsd one oses support generic i386 platform lacks built per-page execute controls development cycle 3.8 release changes made codice_12 memory management functions traditional unix operating systems codice_12 allocates memory extending unix data segment practice made difficult implement strong protection security problems codice_12 implementation openbsd makes use codice_15 system call modified returns random memory addresses ensures different areas mapped next addition allocation small blocks shared areas randomized codice_16 function changed return memory kernel immediately rather leaving mapped process number additional optional checks also added aid development features make program bugs easier detect harder exploit instead memory corrupted invalid access ignored often result segmentation fault abortion process brought light several issues software running openbsd 3.8 particularly programs reading beyond start end buffer type bug would previously detected directly cause error abilities took three years implement without considerable performance loss one goals openbsd project integration facilities software strong cryptography core operating system end number low-level features provided including source strong pseudo random numbers built-in cryptographic hash functions transforms support cryptographic hardware openbsd cryptographic framework abilities used throughout openbsd including bcrypt password-hashing algorithm derived bruce schneier blowfish block cipher takes advantage cpu-intensive blowfish key schedule making brute-force attacks less practical protect sensitive information passwords leaking disk persist many years openbsd supports encryption swap partition swap space split many small regions assigned encryption key soon data region longer required openbsd securely deletes discarding encryption key feature enabled default openbsd 3.9 later network stack also makes heavy use randomization increase security reduce predictability various values may use attacker including tcp initial sequence numbers timestamps ephemeral source ports number features increase network resilience availability including countermeasures problems icmp software redundancy carp pfsync also included project first disable plain-text telnet daemon favor encrypted ssh daemon 1999 features integrated cryptographic software ipsec telnet daemon completely removed openbsd 2005 release openbsd version 3.8 parts x11 openbsd running user except x server split privilege-stripped x process run root x process run _x11 user x11 openbsd neither x server x clients normally escalated direct memory hardware privileges driving x intel 4 radeon 4 drivers normally interact underlying hardware via direct rendering management 4 kernel interface lowlevel memory/hardware access handled solely kernel drivers wsfb follow similar pattern reason x11 openbsd open lowlevel memory hardware access user/root programs done systems done past needed user escalate machdep.allowaperture setting default zero setting unsecure setting openbsd version x window system named xenocara security modifications server default applications patched make use privilege separation openbsd provides aperture driver limit x access memory however work x security flaws loïc duflot theo de raadt commented aperture driver merely best x violates security models hear university class went castigate x developers taking time solving 10-year-old problem november 29 2006 vesa kernel driver developed permitted x run albeit slowly without use aperture driver february 15 2014 x modified allow run without root privileges discovery security vulnerability x openbsd n't support running x root user supports running x via display manager dedicated codice_17 user privilege separation privilege revocation chrooting randomized loading libraries also play role increasing security system many applied openbsd versions common programs tcpdump apache bsd authentication system openbsd history providing users full disclosure relation various bugs security breaches detected openbsd team exemplified project slogan two remote holes default install heck long time openbsd 5.3 support full disk encryption introduced openbsd 5.8 introduced codice_18 system call restricting process capabilities minimal subset required correct operation process compromised attempts perform unintended behavior terminated kernel since introduction applications ports changed support codice_18 including chromium web browser | [
9223,
6664,
2825,
3465,
10631,
1932,
274,
3603,
4117,
7702,
8725,
8344,
10105,
5402,
3742,
1315,
10924,
174,
6702,
7983,
8368,
9520,
7734,
1474,
2245,
1993,
8778,
3404,
11086,
4562,
5970,
7252,
5084,
8671,
6754,
7139,
1637,
6888,
11112,
5... | Validation |
4,072 | 8 | Web_mining:web mining web mining application data mining techniques discover patterns world wide web name proposes information gathered mining web makes utilization automated apparatuses reveal extricate data servers web2 reports permits organizations get organized unstructured information browser activities server logs website link structure page content different sources goal web structure mining generate structural summary web site web page technically web content mining mainly focuses structure inner-document web structure mining tries discover link structure hyperlinks inter-document level based topology hyperlinks web structure mining categorize web pages generate information similarity relationship different web sites web structure mining also another direction -- discovering structure web document type structure mining used reveal structure schema web pages would good navigation purpose make possible compare/integrate web page schemes type structure mining facilitate introducing database techniques accessing information web pages providing reference schema web mining divided three different types – web usage mining web content mining web structure mining web usage mining application data mining techniques discover interesting usage patterns web data order understand better serve needs web-based applications usage data captures identity origin web users along browsing behavior web site web usage mining classified depending kind usage data considered studies related work concerned two areas constraint-based data mining algorithms applied web usage mining developed software tools systems costa seco demonstrated web log mining used extract semantic information hyponymy relationships particular user given community web usage mining essentially many advantages makes technology attractive corporations including government agencies technology enabled e-commerce personalized marketing eventually results higher trade volumes government agencies using technology classify threats fight terrorism predicting capability mining applications benefit society identifying criminal activities companies establish better customer relationship understanding needs customer better reacting customer needs faster companies find attract retain customers save production costs utilizing acquired insight customer requirements increase profitability target pricing based profiles created even find customers might default competitor company try retain customer providing promotional offers specific customer thus reducing risk losing customer customers benefits web usage mining particularly area personalization outlined specific frameworks probabilistic latent semantic analysis model offer additional features user behavior access pattern process provides user relevant content collaborative recommendation models also demonstrate capability web usage mining technology address problems associated traditional techniques biases questions regarding validity since data patterns obtained subjective degrade time also elements unique web usage mining show technology benefits include way semantic knowledge applied interpreting analyzing reasoning usage patterns mining phase web usage mining create issues technology used data personal nature might cause concerns criticized ethical issue involving web usage mining invasion privacy privacy considered lost information concerning individual obtained used disseminated especially occurs without knowledge consent obtained data analyzed clustered form profiles data made anonymous clustering personal profiles thus applications de-individualize users judging mouse clicks de-individualization defined tendency judging treating people basis group characteristics instead individual characteristics merits another important concern companies collecting data specific purpose might use data totally different purposes essentially violates user ’ interests growing trend selling personal data commodity encourages website owners trade personal data obtained site trend increased amount data captured traded increasing likeliness one ’ privacy invaded companies buy data obliged make anonymous companies considered authors specific release mining patterns legally responsible contents release inaccuracies release result serious lawsuits law preventing trading data mining algorithms might use controversial attributes like sex race religion sexual orientation categorize individuals practices might anti-discrimination legislation applications make hard identify use controversial attributes strong rule usage algorithms attributes process could result denial service privilege individual based race religion sexual orientation right situation avoided high ethical standards maintained data mining company collected data made anonymous obtained data obtained patterns traced back individual might look poses threat one ’ privacy however additional information inferred application combining two separate unscrupulous data user web structure mining uses graph theory analyze node connection structure web site according type web structural data web structure mining divided two kinds web structure mining terminology techniques web structure mining web content mining mining extraction integration useful data information knowledge web page content heterogeneity lack structure permits much ever-expanding information sources world wide web hypertext documents makes automated discovery organization search indexing tools internet world wide web lycos alta vista webcrawler aliweb metacrawler others provide comfort users generally provide structural information categorize filter interpret documents factors prompted researchers develop intelligent tools information retrieval intelligent web agents well extend database data mining techniques provide higher level organization semi-structured data available web agent-based approach web mining involves development sophisticated ai systems act autonomously semi-autonomously behalf particular user discover organize web-based information web content mining differentiated two different points view information retrieval view database view summarized research works done unstructured data semi-structured data information retrieval view shows researches use bag words based statistics single words isolation represent unstructured text take single word found training corpus features semi-structured data works utilize html structures inside documents utilized hyperlink structure documents document representation database view order better information management querying web mining always tries infer structure web site transform web site become database several ways represent documents vector space model typically used documents constitute whole vector space representation realize importance words document resolve tf-idf term frequency times inverse document frequency introduced multi-scanning document implement feature selection condition category result rarely affected extraction feature subset needed general algorithm construct evaluating function evaluate features feature set information gain cross entropy mutual information odds ratio usually used classifier pattern analysis methods text data mining similar traditional data mining techniques usual evaluative merits classification accuracy precision recall information score web mining important component content pipeline web portals used data confirmation validity verification data integrity building taxonomies content management content generation opinion mining language code chinese words complicated compared english gb big5 hz code common chinese word codes web documents text mining one needs identify code standard html documents transform inner code use data mining techniques find useful knowledge useful patterns | [
225,
8705,
7780,
2440,
3433,
6576,
10577,
3858,
1044,
119,
8440,
479
] | Test |
4,073 | 2 | Kylin_(operating_system):kylin operating system kylin operating system developed academics national university defense technology people republic china since 2001 named mythical beast qilin first versions based freebsd intended use chinese military government organizations version 3.0 kylin became linux-based version called neokylin announced 2010 separate project using ubuntu linux operating system announced 2013 first version ubuntu kylin released april 2013 development kylin began 2001 national university defense technology assigned mission developing operating system 863 program intended make china independent foreign technology aim support several kinds server platforms achieve high performance high availability high security well conforming international standards unix linux operating systems created using hierarchy model including basic kernel layer similar mach system service layer similar bsd desktop environment similar windows designed comply unix standards compatible linux applications february 2006 china military online website sponsored pla daily chinese people liberation army reported successful development kylin server operating system said first 64-bit operating system high security level b2 class also first operating system without linux kernel obtained linux global standard authentification international free standards group april 2006 said kylin operating system largely copied freebsd 5.3 anonymous chinese student australia used pseudonym dancefire carried kernel similarity analysis showed similarities two operating systems reached 99.45 percent one kylin developers confirmed kylin based freebsd speech international conference eurobsdcon 2006 2009 report presented us-china economic security review commission stated purpose kylin make chinese computers impenetrable competing countries cyberwarfare arena washington post reported china developed secure operating software tens millions computers already installing government military systems hoping make beijing ’ networks impenetrable u.s. military intelligence agencies deployment kylin said hardened key chinese servers advent version 3.0 kylin used linux kernel december 2010 announced china standard software national university defense technology signed strategic partnership launch version called neokylin china standard software maker neoshine linux desktop series neokylin intended use government offices national defense energy sectors chinese economy 2014 bloomberg news reported northeastern city siping migrated computers microsoft windows neokylin part government effort shift computer technology chinese suppliers september 2015 us computer maker dell reported 42 personal computers sold china running neokylin operating system tianhe-1 supercomputer 64-bit kylin linux oriented high-performance parallel computing optimization supports power management high-performance virtual computing newer tianhe-2 also uses kylin linux 2013 canonical reached agreement ministry industry information technology people republic china release ubuntu-based linux os features targeted chinese market ubuntu kylin described loose continuation china kylin os intended desktop laptop computers first official release ubuntu kylin 13.04 25 april 2013 | [
7425,
2180,
1400,
1927,
1801,
7561,
10761,
6797,
274,
5397,
9625,
1946,
4636,
10780,
2212,
6438,
10535,
684,
4908,
1071,
3248,
7983,
9009,
11698,
11573,
1718,
823,
9784,
1465,
5177,
5819,
7483,
3006,
9151,
11459,
9927,
8266,
8395,
8909,
5... | None |
4,074 | 3 | Windows_Server_2003:windows server 2003 windows server 2003 server operating system produced microsoft released april 24 2003 successor windows 2000 server predecessor windows server 2008 updated version windows server 2003 r2 released manufacturing december 6 2005 windows server 2003 kernel later adopted development windows vista windows server 2003 follow-up windows 2000 server incorporating compatibility features windows xp unlike windows 2000 server windows server 2003 default installation none server components enabled reduce attack surface new machines windows server 2003 includes compatibility modes allow older applications run greater stability made compatible windows nt 4.0 domain-based networking windows server 2003 brought enhanced active directory compatibility better deployment support ease transition windows nt 4.0 windows server 2003 windows xp professional product went several name changes course development first announced 2000 known codename whistler server named windows 2002 server brief time mid-2001 followed windows .net server windows .net server 2003 microsoft chose focus .net branding .net framework os finally released windows server 2003 windows server 2003 first microsoft windows version thoroughly subjected semi-automated testing bugs software system called prefast developed computer scientist amitabh srivastava microsoft research automated bug checking system first tested windows 2000 thoroughly amitabh srivastava prefast found 12 windows server 2003 bugs remaining 88 found human computer programmers microsoft employs 4,700 programmers work windows 60 software testers whose job find bugs windows source code microsoft co-founder bill gates stated windows server 2003 microsoft rigorously tested software date microsoft later used windows server 2003 kernel development windows vista following features new windows server 2003 ability create rescue disk removed favor automated system recovery asr windows server 2003 comes number editions targeted towards particular size type business general variants windows server 2003 ability share files printers act application server host message queues provide email services authenticate users act x.509 certificate server provide ldap directory services serve streaming media perform server-oriented functions windows server 2003 web meant building hosting web applications web pages xml web services designed used primarily iis web server provides platform developing deploying xml web services applications use asp.net technology domain controller terminal services functionality included web edition however remote desktop administration available 10 concurrent file-sharing connections allowed moment possible install microsoft sql server microsoft exchange software edition without installing service pack 1 despite supporting xml web services asp.net uddi deployed windows server 2003 web .net framework version 2.0 included windows server 2003 web installed separate update windows update windows server 2003 web supports maximum 2 physical processors maximum 2 gb ram edition windows server 2003 require client access license cal used internet facing server front-end internet information services windows server update services using storage back-end another remote server front-end cals may still required microsoft windows server 2003 standard aimed towards small medium-sized businesses standard edition supports file printer sharing offers secure internet connectivity allows centralized desktop application deployment specialized version x64 architecture released april 2005 ia-32 version supports four physical processors 4 gb ram x64 version capable addressing 32 gb ram also supports non-uniform memory access windows server 2003 enterprise aimed towards medium large businesses full-function server operating system supports 8 physical processors provides enterprise-class features eight-node clustering using microsoft cluster server mscs software support 64 gb ram pae enterprise edition also comes specialized versions x64 itanium architectures service pack 2 installed x64 itanium versions capable addressing 1 tb 2 tb ram respectively edition also supports non-uniform memory access numa also provides ability hot-add supported hardware windows server 2003 enterprise also required edition issue custom certificate templates windows server 2003 datacenter designed infrastructures demanding high security reliability windows server 2003 available ia-32 itanium x64 processors supports maximum 32 physical processors ia-32 platform 64 physical processors x64 ia-64 hardware ia-32 versions edition support 64 gb ram service pack 2 installed x64 versions support 1 tb ia-64 versions support 2 tb ram windows server 2003 datacenter also allows limiting processor memory usage per-application basis edition better support storage area networks sans features service uses windows sockets emulate tcp/ip communication native san service providers thereby allowing san accessed tcp/ip channel application communicate tcp/ip use san without modification application datacenter edition like enterprise edition supports 8-node clustering clustering increases availability fault tolerance server installations distributing replicating service among many servers edition supports clustering cluster dedicated storage cluster nodes connected common san windows compute cluster server 2003 ccs released june 2006 designed high-end applications require high performance computing clusters designed deployed numerous computers clustered together achieve supercomputing speeds compute cluster server network comprises least one controlling head node subordinate processing nodes carry work compute cluster server uses microsoft messaging passing interface v2 ms-mpi communicate processing nodes cluster network ties nodes together powerful inter-process communication mechanism complex communications hundreds even thousands processors working parallel application programming interface consists 160 functions job launcher enables users execute jobs executed computing cluster ms mpi designed compatible reference open source mpi2 specification widely used high-performance computing hpc exceptions security considerations ms mpi covers complete set mpi2 functionality implemented mpich2 except planned future features dynamic process spawn publishing windows storage server 2003 part windows server 2003 series specialized server operating system network-attached storage nas launched 2003 storage decisions chicago optimized use file print sharing also storage area network san scenarios available original equipment manufacturers oems unlike windows server 2003 editions provide file printer sharing functionality windows storage server 2003 require cal windows storage server 2003 nas equipment headless means without monitors keyboards mice administered remotely devices plugged existing ip network storage capacity available users windows storage server 2003 use raid arrays provide data redundancy fault-tolerance high performance multiple nas servers clustered appear single device allows responsibility serving clients shared way one server fails servers take often termed failover also improves fault-tolerance windows storage server 2003 also used create storage area network data transferred terms chunks rather files thus providing granularity data transferred provides higher performance database transaction processing applications windows storage server 2003 also allows nas devices connected san windows storage server 2003 r2 follow-up windows storage server 2003 adds file-server performance optimization single instance storage sis index-based search single instance storage sis scans storage volumes duplicate files moves duplicate files common sis store file volume replaced link file substitution reduces amount storage space required much 70 windows storage server 2003 r2 provides index-based full-text search based indexing engine already built windows server updated search engine speeds indexed searches network shares edition also provides filters searching many standard file formats .zip autocad xml mp3 .pdf microsoft office file formats windows storage server 2003 r2 includes built support windows sharepoint services microsoft sharepoint portal server adds storage management snap-in microsoft management console used manage storage volumes centrally including dfs shares servers running windows storage server r2 windows storage server 2003 r2 used iscsi target standard enterprise editions windows storage server 2003 r2 incorporating wintarget iscsi technology microsoft acquired 2006 stringbean software add-on feature available purchase oem partners iscsi feature pack included versions wss configured oems windows storage server 2003 promoted function domain controller however edition licensed run directory services joined existing domain member server windows storage server 2003 r2 available following editions windows unified data storage server version windows storage server 2003 r2 iscsi target support standard available standard enterprise editions windows small business server sbs software suite includes windows server additional technologies aimed providing small business complete technology solution standard edition sbs includes microsoft remote web workplace windows sharepoint services microsoft exchange server fax server active directory basic firewall dhcp server network address translation capabilities premium edition sbs adds microsoft sql server 2000 microsoft isa server 2004 sbs type cal different costs slightly cals editions windows server 2003 however sbs cal encompasses user cals windows server exchange server sql server isa server hence less expensive buying cals individually sbs following design limitations mainly affecting active directory remove limitations instance sbs upgrade regular windows server exchange server sql isa server windows small business server 2003 r2 transition pack windows home server operating system microsoft based windows small business server 2003 sp2 seen directory listings installation dvd windows home server announced january 7 2007 consumer electronics show bill gates intended solution homes multiple connected pcs offer file sharing automated backups remote access windows home server began shipment oems september 15 2007 windows server 2003 embedded systems replaced windows 2000 server embedded systems intended use building firewall vpn caching servers similar appliances versions available server appliance software microsoft internet security acceleration server availability original version ended may 28 2003 availability r2 ended march 5 2006 end support scheduled july 14 2015 r2 original end licence scheduled may 28 2018 r2 original end support date indicates supported service pack dated july 14 2005 end licence date last date oem may distribute systems using version versions continue receive critical security updates end support microsoft announced extended support dates windows server 2003 embedded systems release 2 embedded systems available 32 64 bit versions standard 1-4 cpu enterprise 1-8 cpu march 30 2005 microsoft released service pack 1 windows server 2003 among improvements many updates provided windows xp users service pack 2 features added service pack 1 include full list updates available microsoft knowledge base service pack 2 windows server 2003 released march 13 2007 release date originally scheduled first half 2006 june 13 2006 microsoft made initial test version service pack 2 available microsoft connect users build number 2721 followed build 2805 known beta 2 refresh final build 3790 microsoft described service pack 2 standard service pack release containing previously released security updates hotfixes reliability performance improvements addition service pack 2 contains microsoft management console 3.0 windows deployment services replaces remote installation services support wpa2 improvements ipsec msconfig service pack 2 also adds windows server 2003 scalable networking pack snp allows hardware acceleration processing network packets thereby enabling faster throughput snp previously available out-of-band update windows server 2003 service pack 1 windows server 2003 r2 title complementary offering microsoft consists copy windows server 2003 sp1 one cd host optionally installed new features reminiscent microsoft plus another released manufacturing december 6 2005 ia-32 x64 platforms ia-64 succeeded windows server 2008 new features windows server 2003 r2 include july 13 2010 windows server 2003 mainstream support expired extended support phase began extended support phase microsoft continued provide security updates however free technical support warranty claims design changes longer offered extended support lasted july 14 2015 although windows server 2003 unsupported microsoft released emergency security patch may 2017 os well unsupported versions windows including windows xp windows 8 rtm address vulnerability leveraged wannacry ransomware attack | [
2051,
10243,
6150,
10257,
6675,
5652,
11283,
9757,
7713,
8227,
6692,
1573,
3109,
7207,
9764,
5673,
6697,
11301,
1581,
9780,
5176,
582,
1098,
4174,
597,
9813,
10839,
8281,
9819,
10332,
8798,
608,
2656,
10338,
8296,
5225,
10344,
8299,
6768,
... | Test |
4,075 | 2 | Process_isolation:process isolation process isolation set different hardware software technologies designed protect process processes operating system preventing process writing process b process isolation implemented virtual address space process address space different process b address space – preventing writing onto b security easier enforce disallowing inter-process memory access contrast less secure architectures dos process write memory process system process isolation limited controlled interaction processes may still allowed inter-process communication ipc channels shared memory local sockets internet sockets scheme process memory isolated processes except process allowing input collaborating processes system policies may disallow ipc circumstances example mandatory access control systems subjects different sensitivity levels may allowed communicate notable operating systems support process isolation internet explorer 4 used process isolation order allow separate windowed instances browser processes however height browser wars dropped subsequent versions compete netscape navigator sought concentrate upon one process entire internet suite idea process-per-instance would revisited decade afterwards tabbed browsing became commonplace google chrome multi-process architecture internet explorer 8 loosely coupled ie lcie tabs containing webpages contained within semi-separate os-level processes isolated core process browser prevent crash one tab/page crashing entire browser method known popularly multiprocess process-per-tab meant manage memory processing allowing offending tabs crash separately browser tabs manage security | [
7713,
6087,
4972,
6797,
7983,
9887,
7762,
11539,
5492,
5078,
823,
639
] | Test |
4,076 | 2 | DEMOS:demos demos dialogovaya edinaya mobilnaya operatsionnaya sistema unix-like operating system developed soviet union derived bsd development initiated kurchatov institute atomic energy moscow 1982 development continued cooperation institutes commercialized demos co-operative employed key contributors demos earlier alternative mnos clone unix version 6 mnos demos version 1.x gradually merged 1986 1990 leaving joint os demos version 2.x support different cyrillic charsets koi-8 u-code used demos 1 mnos respectively initially developed sm-4 pdp-11/40 clone sm-1600 later ported elektronika-1082 besm es evm clones vax-11 sm-1700 number platforms including pc/xt elektronika-85 clone dec professional number motorola 68020-based microcomputers development demos effectively ceased 1991 second project demos team relcom took priority originally suggested name унас unas volapukish word play unix у них u nih russian means also у нас u nas means also serious management dismissed idea favor traditional alphabet soup | [
6787,
8713,
11145,
6412,
7823,
5267,
5397,
1304,
3487,
3488,
3241,
10156,
7983,
3248,
2995,
9141,
823,
7224,
3129,
9784,
1853,
9151,
10436,
4039,
6369,
9452,
5492,
7286,
2424,
633
] | Validation |
4,077 | 3 | Masters_of_the_Universe:_The_Movie:masters universe movie masters universe movie action-adventure game developed gremlin graphics published 1987 based american film masters universe 1987 directed gary goddard film game part masters universe media franchise promotional photo dolph lundgren he-man frank langella skeletor illustrates video game packaging msx version game titled masters universe two masters universe video games published year | [
10931,
9006
] | None |
4,078 | 3 | Slot_(computer_architecture):slot computer architecture slot comprises operation issue data paths machinery surrounding collection one functional units fus share resources term slot common purpose vliw world relationship operation instruction pipeline execute explicit dynamically scheduled machines concept commonly called execute pipeline modern conventional cpus several compute pipelines say two alu one fpu one sse/mmx one branch issue one instruction per basic cycle several flight correspond slots pipelines may several fus adder multiplier say one fu pipeline issued particular cycle fu population pipeline/slot design option cpu | [
6818,
1958,
8523,
10796,
6639,
1776,
4465,
1461,
8125,
8126
] | Test |
4,079 | 3 | ASCI_Blue_Mountain:asci blue mountain asci blue mountain supercomputer installed los alamos national laboratory los alamos new mexico designed run simulations united states national nuclear security administration advanced simulation computing program computer collaboration silicon graphics corporation los alamos national laboratory installed 1998 cluster ccnuma sgi origin 2000 systems contains 6,144 mips r10000 microprocessors theoretical top performance 3.072 teraflops built stage accelerated strategic computing initiative asci started u.s. department energy national nuclear security administration build simulator replace live nuclear weapons testing following moratorium testing started president george h. w. bush 1992 extended bill clinton 1993 unveiled commissioned 1998 june 1999 world second fastest computer remained among world ten fastest computers november 2001 according los alamos national laboratory website supercomputer set world record may 2000 equivalent 17.8 years normal computer processing within 72 hours including 15,000 engineering simulations requiring 10 hours first commissioned november 1998 blue mountain decommissioned monday november 8 2004 8 replaced asci q lightning qsc supercomputers | [
1480,
7234,
10051,
6247
] | Validation |
4,080 | 4 | Wirelurker:wirelurker wirelurker family malware targeting macos ios systems malware designed target users china use apple mobile desktop devices malware suspected infecting thousands chinese mobile devices security firm palo alto networks credited uncovering malware wirelurker monitors ios device connected via usb infected macos computer installs downloaded third-party applications automatically generated malicious applications onto device wirelurker infect device regardless whether jailbroken wirelurker complex form malware utilizes techniques file hiding code obfuscation encryption wirelurker capable stealing variety information mobile devices infects regularly requests updates attackers command control server three individuals china arrested suspicion creating distributing wirelurker malware suspects identified surnames wang lee chen taken custody thursday november 13 2014 chinese authorities believe suspects created malware financial gains several steps taken order protect wirelurker malware | [
11577,
7515
] | Test |
4,081 | 4 | United_States_Computer_Emergency_Readiness_Team:united states computer emergency readiness team united states computer emergency readiness team us-cert organization within department homeland security ’ dhs national protection programs directorate nppd specifically us-cert branch office cybersecurity communications cs c national cybersecurity communications integration center nccic us-cert responsible analyzing reducing cyber threats vulnerabilities disseminating cyber threat warning information coordinating incident response activities division brings advanced network digital media analysis expertise bear malicious activity targeting networks within united states abroad dhs cyber security division created us-cert september 2003 protect internet infrastructure united states coordinating defense responding cyber-attacks 24-hour operational arm nccic accepts triages collaboratively responds incidents provides technical assistance information system operators disseminates timely notifications regarding current potential security threats exploits vulnerabilities public via national cyber awareness system ncas us-cert operates side-by-side industrial control systems computer emergency response team ics-cert deals security related industrial control systems entities operate together within nccic provide single source support critical infrastructure stakeholders five operational aspects enable us-cert meet objectives improving nation ’ cybersecurity posture coordinate cyber information sharing proactively manage cyber risks protecting constitutional rights americans feature involved reviewing researching vetting documenting computer network defense cnd attributes available us-cert classified unclassified helps promote improved mitigation resources federal departments agencies across einstein network requesting deployment countermeasures response credible cyber threats feature conducts technical analysis data provided partners constituents monitoring systems understand nature attacks threats vulnerabilities well develop tips indicators warnings actionable information us-cert ’ cnd mission feature conducts digital forensic examinations malware artifact analysis reverse engineering determine attack vectors mitigation techniques identifies possible threats based analysis malicious code digital media provides indicators mitigate prevent future intrusions feature informs cnd community potential threats allows hardening cyber defenses well develops near real-time/rapid response community products e.g. reports white papers critical event occurs detected operations create tailored product describing event recommended course action mitigation techniques applicable ensure constituents made aware protect organization appropriately feature supports nccic information sharing development web presence responsible establishing maintaining assured communications developing disseminating information products supporting development maintenance collaboration tools feature partners foreign governments entities enhance global cybersecurity defense posture supports bilateral engagements cert-to-cert information sharing/trust building activities improvements related global collaboration agreements data sharing standards january 2015 report senator tom coburn ranking member committee homeland security governmental affairs expressed concern us-cert always provide information nearly quickly alternative private sector threat analysis companies | [
3843,
5636,
7556,
8,
4489,
5002,
11152,
3473,
6550,
6423,
5665,
1319,
7337,
7467,
9771,
3503,
10928,
2865,
7474,
11188,
4023,
3643,
1608,
6091,
10190,
10448,
4435,
5589,
8281,
7515,
8667,
9569,
10338,
612,
6884,
3944,
2409,
106,
5226,
472... | Validation |
4,082 | 3 | 1942_(video_game):1942 video game 1942 vertically scrolling shooter made capcom released arcade 1984 first game 19xx series followed 1942 set pacific theater world war ii despite game created japanese developers goal reach tokyo destroy entire japanese air fleet player pilots lockheed p-38 lightning dubbed super ace player shoot enemy planes avoid enemy fire player perform roll vertical loop game player may collect series power-ups one allowing plane escorted two smaller fighters tip tow formation enemies kawasaki ki-61s mitsubishi a6m zeros kawasaki ki-48s boss plane nakajima g8n game ported famicom 1985 japan north america 1986 developed micronics msx nec pc-8801 game boy color ported european games publisher elite systems amstrad cpc zx spectrum commodore 64 music commodore 64 version based main verse ron goodwin 633 squadron movie score arrangement mark cooksey 1942 capcom breakaway hit eclipsing popularity company preceding three titles vulgus sonson pirate ship higemaru 1987 number-one euromax uk arcade chart followed wonder boy number-two 1942 first capcom title spawn successful series sequels five titles 19xx line released 1987 2000 many capcom vertical shooters featured similar gameplay re-released playstation saturn consoles featured capcom classics collection playstation 2 xbox well playstation portable arcade version added wii virtual console japan december 21 2010 pal north american regions january 2011 also re-released windows mobile professional. released xbox live arcade playstation network 2008 1942 first strike released ios 2010 game series sold total 1.4 million units worldwide december 31 2018 stands capcom 18th best-selling franchise | [
11238,
3788,
10316,
9006,
1776,
8496,
4690,
6835,
10931
] | Test |
4,083 | 4 | European_Cybercrime_Centre:european cybercrime centre european cybercrime centre ec3 ec³ body police office europol european union eu headquartered hague coordinates cross-border law enforcement activities computer crime acts centre technical expertise matter officially launched 11 january 2013 european cybercrime centre expected fully operational 2015 began staff 30 plans expand 40 end 2013 began operations budget 3.6 million euros head ec3 reports directly head europol first person head department former head danish domestic intelligence left interpol january 2015 become barclays chief intelligence security officer.. ec3 tasked assisting member states efforts dismantle disrupt cybercrime networks developing tools providing training ec3 works european union intelligence situation centre intcen united nations office drugs crime undcp world customs organization wco european border coast guard agency ebcg also known frontex european anti-fraud office olaf press releases 2015 also revealed ec3 works american security services federal bureau investigation fbi overlap responsibilities european union agency network information security enisa press conference 10 february 2014 asked massive identity theft uncovered german federal office information security head ec3 troels oerting said unit responsible combatting politically motivated hacking and/or espionage eu institutions february 2014 troels oerting reported successes unit 2013 included catching internet extortioners 13 arrests also involved fighting malware attacks banks using botnets – cooperation microsoft experts german federal criminal police office – taking zeroaccess botnet 2014 details revealed operation onymous took number darknet sites including pandora cloud 9 hydra blue sky topix flugsvamp cannabis road black market silk road 2.0 2015 american media reported coordinated fbi operation assistance ec3 take dark0de largest english -language communication trading platform cybercriminals well eu member states cooperation number states including australia canada republic macedonia norway switzerland monaco bosnia herzegovina colombia moldova russia turkey republic serbia montenegro ukraine united states | [
7522,
10600,
10875,
4883,
7515,
5085
] | Test |
4,084 | 5 | Traversal_Using_Relays_around_NAT:traversal using relays around nat traversal using relays around nat turn protocol assists traversal network address translators nat firewalls multimedia applications may used transmission control protocol tcp user datagram protocol udp useful clients networks masqueraded symmetric nat devices turn aid running servers well known ports private network nat supports connection user behind nat single peer telephony example turn specified rfc 5766 update turn ipv6 specified rfc 6156 turn uri scheme documented rfc 7065 nats providing many benefits also come many drawbacks troublesome drawbacks fact break many existing ip applications make difficult deploy new ones guidelines developed describe build nat friendly protocols many protocols simply constructed according guidelines examples protocols include multimedia applications file sharing session traversal utilities nat stun provides one way application traverse nat stun allows client obtain transport address ip address port may useful receiving packets peer however addresses obtained stun may usable peers addresses work depending topological conditions network therefore stun provide complete solution nat traversal complete solution requires means client obtain transport address receive media peer send packets public internet accomplished relaying data server resides public internet traversal using relay nat turn protocol allows client obtain ip addresses ports relay although turn almost always provides connectivity client resource intensive provider turn server therefore desirable use turn last resort preferring mechanisms stun direct connectivity possible accomplish interactive connectivity establishment ice methodology used discover optimal means connectivity process begins client computer wants contact peer computer data transaction due client peer behind respective nats stun option one nats symmetric nat type nat known non-stun compatible turn must used first client contacts turn server allocate request allocate request asks turn server allocate resources client may contact peer allocation possible server allocates address client use relay sends client allocation successful response contains allocated relayed transport address located turn server second client sends createpermissions request turn server create permissions check system peer-server communications words peer finally contacted sends information back turn server relayed client turn server uses permissions verify peer-to-turn server communication valid permissions created client two choices sending actual data 1 use send mechanism 2 reserve channel using channelbind request send mechanism straightforward contains larger header 36 bytes substantially increase bandwidth turn relayed conversation contrast channelbind method lighter header 4 bytes requires channel reserved needs periodically refreshed among considerations using either method send channel binding turn server receives data client relays peer using udp datagrams contain source address allocated relayed transport address peer receives data responds using udp datagram transport protocol sending udp datagram relay address turn server turn server receives peer udp datagram checks permissions valid forwards client process gets around even symmetric nats client peer least talk turn server allocated relay ip address communication turn robust stun assist traversal types nats turn communication relays entire communication server requiring far server bandwidth stun protocol typically resolves public facing ip address relays information client peer use direct communication reason ice protocol mandates stun usage first resort turn usage dealing symmetric nats situations stun used | [
4068,
2985,
10924,
2093,
7214,
3792,
6993,
5972,
11413,
5470
] | None |
4,085 | 4 | Ettercap_(software):ettercap software ettercap free open source network security tool man-in-the-middle attacks lan used computer network protocol analysis security auditing runs various unix-like operating systems including linux mac os x bsd solaris microsoft windows capable intercepting traffic network segment capturing passwords conducting active eavesdropping number common protocols original developers later founded hacking team ettercap works putting network interface promiscuous mode arp poisoning target machines thereby act 'man middle unleash various attacks victims ettercap plugin support features extended adding new plugins ettercap supports active passive dissection many protocols including ciphered ones provides many features network host analysis ettercap offers four modes operation addition software also offers following features ettercap also ability actively passively find poisoners lan | [
5251,
3460,
4490,
6797,
3218,
5397,
11413,
6295,
5405,
5024,
10788,
2085,
1064,
3752,
9640,
939,
10924,
6013,
7983,
6834,
823,
8504,
9146,
4797,
3133,
5437,
8637,
7364,
2887,
4307,
9440,
10341,
5990,
5612,
7022,
7411,
4725,
6651,
2045,
25... | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.