node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
4,086
4
TURBINE_(US_government_project):turbine us government project turbine codename automated system essence enables automated management control large network implants form remotely transmitted malware selected individual computer devices bulk tens thousands devices nsa built infrastructure enables covertly hack computers mass scale using automated systems reduce level human oversight process quoted intercept turbine designed allow current implant network scale large size millions implants creating system automated control implants groups instead individually nsa shared many files use implants counterparts so-called five eyes surveillance alliance – united kingdom canada new zealand australia among things due turbine control implants nsa capable turbine implants linked relies upon large network clandestine surveillance sensors nsa installed locations across world including agency headquarters maryland fort george g. meade eavesdropping bases used agency misawa japan misawa air base menwith hill england raf menwith hill codenamed turmoil sensors operate sort high-tech surveillance dragnet monitoring packets data sent across internet turbine implants exfiltrate data infected computer systems turmoil sensors automatically identify data return nsa analysis targets communicating turmoil system used send alerts tips turbine enabling initiation malware attack identify surveillance targets nsa uses series data selectors flow across internet cables selectors include email addresses ip addresses unique cookies containing username identifying information sent user computer websites google facebook hotmail yahoo twitter unique google advertising cookies track browsing habits unique encryption key fingerprints traced specific user computer ids sent across internet windows computer crashes updates
[ 11078, 3495, 6344, 6797, 7893, 7965 ]
Test
4,087
4
Arxan_Technologies:arxan technologies arxan technologies american technology company specializing application attack prevention self-protection solution iot mobile applications company reports applications secured running 500 million devices arxan solutions used protect applications across range industries including mobile payments banking automotive iot healthcare iot gaming high-tech arxan security products used protect confidentiality applications breached reverse-engineering code analysis means integrity applications compromised code modification malware insertion types attacks arxan privately held private equity-backed fall 2013 ta associates private equity firm completed majority investment arxan technologies previously company received series b funding 2003 followed 13 million series c funding 2007 series funding 4 million 2009 early investors included trident capital edf ventures legend ventures paladin capital dunrath capital tdf fund solstice capital arxan founded 2001 eric davis purdue university researchers mikhail atallah tim korb john rice hoi chang first funding came richard early dunrath capital rich early subsequently became arxan first ceo company early intellectual property licensed purdue university company initial focus defense anti-tamper applications following sale defense technology unit arxan defense systems microsemi 2010 arxan focused commercial applications arxan offers number anti-tamper software products application cryptographic key protection include may 2012 company announced comprehensive support android application protection hardening tampering piracy june 2014 arxan announced mobile application protection offerings sold ibm part ibm portfolio security products arxan products based patented security techniques code hardening tamper-proofing key security node locking core technology consists multi-layered interconnected network guards perform specific security function embedded application binaries make programs tamper-aware tamper-resistant self-healing company claims three-layer protection paradigm defend detect react differentiating approach detecting attack attempted responding detected attacks alerts repairs protection helps secure software hacking attacks threats
[ 10918, 8171, 3629, 4049, 7515, 5404, 10173 ]
Test
4,088
7
ActiveVOS:activevos activevos business process management suite business processes designed using graphical bpmn 2.0 notation process engine implements ws-bpel 2.0 standard well bpel4people processes require people perform tasks task list
[ 2501, 5612, 6862, 7983, 1041 ]
None
4,089
6
XZ_Utils:xz utils xz utils previously lzma utils set free command-line lossless data compressors including lzma xz unix-like operating systems version 5.0 onwards microsoft windows xz utils consists two major components various command shortcuts exist lzma xz -- format=lzma unxz xz -- decompress analogous gunzip xzcat unxz -- stdout analogous zcat xz utils compress decompress xz lzma file formats since lzma format legacy xz utils compresses default xz behavior software well properties file format designed work similarly popular unix compressing tools gzip bzip2 consists unix port igor pavlov lzma-sdk adapted fit seamlessly unix environments usual structure behavior like gzip bzip xz lzma compress single files data streams input bundle multiple files single archive – archiving program used first tar compressing archive decompressing archive version 1.22 greater gnu implementation tar transparent support tarballs compressed lzma xz using switches codice_1 codice_2 xz compression codice_3 lzma compression creating archive compressing decompressing archive extracting contents development xz utils took place within tukaani project led mike kezner small group developers maintained linux distribution based slackware source code xz utils released public domain rest subject different free software licenses specifically core parts public domain software parts bulk system gnu lgpl v2.1 parts build system gnu gpl v2 gnu gpl v3 resulting software binary therefore gpl binaries available freebsd linux systems microsoft windows freedos number linux distributions including fedora slackware ubuntu debian arch linux use xz compressing software packages gnu ftp archive also uses xz
[ 6022, 10121, 1420, 6797, 1940, 5397, 3222, 9880, 292, 10149, 3114, 10027, 7983, 950, 823, 6713, 2755, 11076, 1352, 4296, 10317, 10575, 4561, 722, 11614, 1631, 3296, 9953, 5858, 6759, 7529, 4459, 5612, 237, 1646, 10732, 7667, 2804, 6389, 2...
Test
4,090
4
Fly-by-wire:fly-by-wire fly-by-wire fbw system replaces conventional manual flight controls aircraft electronic interface movements flight controls converted electronic signals transmitted wires hence fly-by-wire term flight control computers determine move actuators control surface provide ordered response use mechanical flight control backup systems boeing 777 use fully fly-by-wire controls improved fully fly-by-wire systems interpret pilot control inputs desired outcome calculate control surface positions required achieve outcome results various combinations rudder elevator aileron flaps engine controls different situations using closed feedback loop pilot may fully aware control outputs acting effect outcome aircraft reacting expected fly-by-wire computers act stabilise aircraft adjust flying characteristics without pilot involvement prevent pilot operating outside aircraft safe performance envelope mechanical hydro-mechanical flight control systems relatively heavy require careful routing flight control cables aircraft systems pulleys cranks tension cables hydraulic pipes systems often require redundant backup deal failures increases weight limited ability compensate changing aerodynamic conditions dangerous characteristics stalling spinning pilot-induced oscillation pio depend mainly stability structure aircraft concerned rather control system depending pilot action term fly-by-wire implies purely electrically signaled control system used general sense computer-configured controls computer system interposed operator final control actuators surfaces modifies manual inputs pilot accordance control parameters side-sticks centre sticks conventional flight control yokes used fly fbw aircraft fbw aircraft lighter similar design conventional controls partly due lower overall weight system components partly natural stability aircraft relaxed slightly transport aircraft maneuverable fighter means stability surfaces part aircraft structure therefore made smaller include vertical horizontal stabilizers fin tailplane normally rear fuselage structures reduced size airframe weight reduced advantages fbw controls first exploited military commercial airline market airbus series airliners used full-authority fbw controls beginning a320 series see a320 flight control though limited fbw functions existed a310 boeing followed 777 later designs pilot commands flight control computer make aircraft perform certain action pitch aircraft roll one side moving control column sidestick flight control computer calculates control surface movements cause plane perform action issues commands electronic controllers surface controllers surface receive commands move actuators attached control surface moved flight control computer commanded controllers measure position flight control surface sensors lvdts fly-by-wire control systems allow aircraft computers perform tasks without pilot input automatic stability systems operate way gyroscopes fitted sensors mounted aircraft sense rotation pitch roll yaw axes movement straight level flight example results signals computer automatically move control actuators stabilize aircraft traditional mechanical hydraulic control systems usually fail gradually loss flight control computers immediately renders aircraft uncontrollable reason fly-by-wire systems incorporate either redundant computers triplex quadruplex etc kind mechanical hydraulic backup combination mixed control system mechanical backup feedbacks rudder elevation directly pilot therefore makes closed loop feedback systems senseless aircraft systems may quadruplexed four independent channels prevent loss signals case failure one even two channels high performance aircraft fly-by-wire controls also called ccvs control-configured vehicles may deliberately designed low even negative stability flight regimes rapid-reacting ccv controls electronically stabilize lack natural stability pre-flight safety checks fly-by-wire system often performed using built-in test equipment bite number control movement steps automatically performed reducing workload pilot groundcrew speeding flight-checks aircraft panavia tornado example retain basic hydro-mechanical backup system limited flight control capability losing electrical power case tornado allows rudimentary control stabilators pitch roll axis movements servo-electrically operated control surfaces first tested 1930s soviet tupolev ant-20 long runs mechanical hydraulic connections replaced wires electric servos first pure electronic fly-by-wire aircraft mechanical hydraulic backup apollo lunar landing training vehicle lltv first flown 1968 first non-experimental aircraft designed flown 1958 fly-by-wire flight control system avro canada cf-105 arrow feat repeated production aircraft concorde 1969 system also included solid-state components system redundancy designed integrated computerised navigation automatic search track radar flyable ground control data uplink downlink provided artificial feel feedback pilot uk two seater avro 707b flown fairey system mechanical backup early mid-60s program curtailed air-frame ran flight time 1972 first digital fly-by-wire fixed-wing aircraft without mechanical backup take air f-8 crusader modified electronically nasa united states test aircraft f-8 used apollo 11 guidance navigation control hardware preceded 1964 llrv pioneered fly-by-wire flight mechanical backup control digital computer three analog redundant channels ussr sukhoi t-4 also flew time united kingdom trainer variant british hawker hunter fighter modified british royal aircraft establishment fly-by-wire flight controls right-seat pilot fly-by-wire flight control systems eliminate complexity fragility weight mechanical circuit hydromechanical electromechanical flight control systems—each replaced electronic circuits control mechanisms cockpit operate signal transducers turn generate appropriate electronic commands next processed electronic controller—either analog one modernly digital one aircraft spacecraft autopilots part electronic controller hydraulic circuits similar except mechanical servo valves replaced electrically controlled servo valves operated electronic controller simplest earliest configuration analog fly-by-wire flight control system configuration flight control systems must simulate feel electronic controller controls electrical feel devices provide appropriate feel forces manual controls used concorde first production fly-by-wire airliner sophisticated versions analog computers replaced electronic controller canceled 1950s canadian supersonic interceptor avro canada cf-105 arrow employed type system analog computers also allowed customization flight control characteristics including relaxed stability exploited early versions f-16 giving impressive maneuverability digital fly-by-wire flight control system extended analog counterpart digital signal processing receive interpret input multiple sensors simultaneously altimeters pitot tubes adjust controls real time computers sense position force inputs pilot controls aircraft sensors solve differential equations related aircraft equations motion determine appropriate command signals flight controls execute intentions pilot programming digital computers enable flight envelope protection protections tailored aircraft handling characteristics stay within aerodynamic structural limitations aircraft example computer flight envelope protection mode try prevent aircraft handled dangerously preventing pilots exceeding preset limits aircraft flight-control envelope prevent stalls spins limit airspeeds g forces airplane software also included stabilize flight-control inputs avoid pilot-induced oscillations since flight-control computers continuously feedback environment pilot workloads reduced also military naval applications possible fly military aircraft relaxed stability primary benefit aircraft maneuverability combat training flights so-called carefree handling stalling spinning undesirable performances prevented automatically computers digital flight control systems enable inherently unstable combat aircraft lockheed f-117 nighthawk northrop grumman b-2 spirit flying wing fly usable safe manners federal aviation administration faa united states adopted rtca/do-178c titled software considerations airborne systems equipment certification certification standard aviation software safety-critical component digital fly-by-wire system including applications laws aeronautics computer operating systems need certified do-178c level b depending class aircraft applicable preventing potential catastrophic failures nevertheless top concern computerized digital fly-by-wire systems reliability even analog electronic control systems digital computers running software often control path pilot aircraft flight control surfaces computer software crashes reason pilot may unable control aircraft hence virtually fly-by-wire flight control systems either triply quadruply redundant computers electronics three four flight-control computers operating parallel three four separate data buses connecting control surface multiple redundant flight control computers continuously monitor output one computer begins give aberrant results reason potentially including software hardware failures flawed input data combined system designed exclude results computer deciding appropriate actions flight controls depending specific system details may potential reboot aberrant flight control computer reincorporate inputs return agreement complex logic exists deal multiple failures may prompt system revert simpler back-up modes addition early digital fly-by-wire aircraft also analog electrical mechanical hydraulic back-up flight control system space shuttle addition redundant set four digital computers running primary flight-control software fifth back-up computer running separately developed reduced-function software flight-control system – one commanded take event fault ever affects computers four back-up system serves reduce risk total flight-control-system failure ever happening general-purpose flight software fault escaped notice four computers airliners flight-control redundancy improves safety fly-by-wire control systems physically lighter lower maintenance demands conventional controls also improve economy terms cost ownership in-flight economy certain designs limited relaxed stability pitch axis example boeing 777 flight control system may allow aircraft fly aerodynamically efficient angle attack conventionally stable design modern airliners also commonly feature computerized full-authority digital engine control systems fadecs control jet engines air inlets fuel storage distribution system similar fashion way fbw controls flight control surfaces allows engine output continually varied efficient usage possible second generation embraer e-jet family gained 1.5 efficiency improvement first generation fly-by-wire system enabled reduction 280 ft.² 250 ft.² horizontal stabilizer e190/195 variants airbus boeing differ approaches implementing fly-by-wire systems commercial aircraft since airbus a320 airbus flight-envelope control systems always retain ultimate flight control flying normal law permit pilots violate aircraft performance limits unless choose fly alternate law strategy continued subsequent airbus airliners however event multiple failures redundant computers a320 mechanical back-up system pitch trim rudder airbus a340 purely electrical electronic back-up rudder control system beginning a380 flight-control systems back-up systems purely electrical use three-axis backup control module bcm boeing airliners boeing 777 allow pilots completely override computerised flight-control system permitting aircraft flown outside usual flight-control envelope decide necessary advent fadec full authority digital engine control engines permits operation flight control systems autothrottles engines fully integrated modern military aircraft systems autostabilization navigation radar weapons system integrated flight control systems fadec allows maximum performance extracted aircraft without fear engine misoperation aircraft damage high pilot workloads civil field integration increases flight safety economy airbus a320 fly-by-wire brethren protected dangerous situations low-speed stall overstressing flight envelope protection result conditions flight control systems commands engines increase thrust without pilot intervention economy cruise modes flight control systems adjust throttles fuel tank selections precisely skillful pilots fadec reduces rudder drag needed compensate sideways flight unbalanced engine thrust a330/a340 family fuel transferred main wing center fuselage tanks fuel tank horizontal stabilizer optimize aircraft center gravity cruise flight fuel management controls keep aircraft center gravity accurately trimmed fuel weight rather drag-inducing aerodynamic trims elevators fly-by-optics sometimes used instead fly-by-wire offers higher data transfer rate immunity electromagnetic interference lighter weight cases cables changed electrical optical fiber cables sometimes referred fly-by-light due use fiber optics data generated software interpreted controller remain fly-by-light effect decreasing electro-magnetic disturbances sensors comparison common fly-by-wire control systems kawasaki p-1 first production aircraft world equipped flight control system eliminated mechanical transmission circuits fly-by-wire flight control systems next step eliminate bulky heavy hydraulic circuits hydraulic circuit replaced electrical power circuit power circuits power electrical self-contained electrohydraulic actuators controlled digital flight control computers benefits digital fly-by-wire retained biggest benefits weight savings possibility redundant power circuits tighter integration aircraft flight control systems avionics systems absence hydraulics greatly reduces maintenance costs system used lockheed martin f-35 lightning ii airbus a380 backup flight controls boeing 787 airbus a350 also incorporate electrically powered backup flight controls remain operational even event total loss hydraulic power wiring adds considerable amount weight aircraft therefore researchers exploring implementing fly-by-wireless solutions fly-by-wireless systems similar fly-by-wire systems however instead using wired protocol physical layer wireless protocol employed addition reducing weight implementing wireless solution potential reduce costs throughout aircraft life cycle example many key failure points associated wire connectors eliminated thus hours spent troubleshooting wires connectors reduced furthermore engineering costs could potentially decrease less time would spent designing wiring installations late changes aircraft design would easier manage etc newer flight control system called intelligent flight control system ifcs extension modern digital fly-by-wire flight control systems aim intelligently compensate aircraft damage failure flight automatically using engine thrust avionics compensate severe failures loss hydraulics loss rudder loss ailerons loss engine etc several demonstrations made flight simulator cessna-trained small-aircraft pilot successfully landed heavily damaged full-size concept jet without prior experience large-body jet aircraft development spearheaded nasa dryden flight research center reported enhancements mostly software upgrades existing fully computerized digital fly-by-wire flight control systems dassault falcon 7x embraer legacy 500 business jets flight computers partially compensate engine-out scenarios adjusting thrust levels control inputs still require pilots respond appropriately
[ 477, 7983 ]
Validation
4,091
7
Virtual_organization_(grid_computing):virtual organization grid computing grid computing virtual organization vo refers dynamic set individuals institutions defined around set resource-sharing rules conditions virtual organizations share commonality among including common concerns requirements may vary size scope duration sociology structure collaborations involved grid computing early 2000s lead emergence multiple organizations function one unit use shared competencies resources purpose one identified goals virtual organization characteristics formal organization one comprises complex network smaller organizations contribute part production process boundaries organizations fuzzy control generally market forces reinforced certainty long- term contracts xtreemos project promised support virtual organizations
[ 4194, 5956, 2901, 247, 7935 ]
Validation
4,092
0
Language_Technologies_Institute:language technologies institute language technologies institute lti research institute carnegie mellon university pittsburgh pennsylvania united states focuses area language technologies main scholarly research institute machine translation speech recognition speech synthesis information retrieval parsing information extraction 1996 institute existed center machine translation established 1986 subsequently 1996 onwards started awarding degrees name changed language technologies institute current director institute professor jaime carbonell
[ 3335, 7337, 7561, 3533, 5399, 10680, 4441, 7164, 10557, 5855 ]
Test
4,093
3
Predator_(video_game):predator video game predator 1987 side-scrolling action game based film title player starts weapons must collect game progresses predator received mixed largely positive reviews across platforms including accolades cu screen star commodore user commodore 64 version c+vg hit computer video games zx spectrum version rachael smith sinclair gave latter version game score 7/10 opining great graphics tough get grips sudden death sneaks every opportunity germany predator put index bundesprüfstelle für jugendgefährdende medien bpjm made illegal sell make game available minors germany well making illegal advertise game form
[ 10931, 9006 ]
None
4,094
3
The_Last_Mission_(video_game):last mission video game last mission computer game released 1987 spanish company opera soft sinclair spectrum amstrad cpc msx also ported ibm pc platform 2d flip-screen side-view game following robot rebellion humans fled earth planet nova sent robot or-cabe-3 back earth obtain secret defense plans enemy robot base player takes control or-cabe-3 attempts escape enemy base plans board spacecraft nova player role robot or-cabe-3 attempts escape enemy base leave earth starting deepest level base robot stolen defense plans must evade hostile robots travel surface escape ship awaits robot or-cabe-3 resembles tank rotating gun mounted caterpillar-track base gun section capable flight may detached base kill enemies solve problems though loses energy state runs energy game ends life lost gun section destroyed base section destroyed respawned starting location lives lost
[ 9166, 9006 ]
None
4,095
5
QUIC:quic quic pronounced 'quick general-purpose transport layer network protocol initially designed jim roskind google implemented deployed 2012 announced publicly 2013 experimentation broadened described ietf still internet draft quic used half connections chrome web browser google servers web browsers support protocol although name initially proposed acronym quick udp internet connections ietf use word quic acronym simply name protocol among applications quic improves performance connection-oriented web applications currently using tcp establishing number multiplexed connections two endpoints user datagram protocol udp works hand-in-hand http/2 multiplexed connections allowing multiple streams data reach endpoints independently hence independent packet losses involving streams contrast http/2 hosted transmission control protocol tcp suffer head-of-line-blocking delays multiplexed streams tcp packets delayed lost quic secondary goals include reduced connection transport latency bandwidth estimation direction avoid congestion also moves congestion control algorithms user space endpoints rather kernel space claimed allow algorithms improve rapidly additionally protocol extended forward error correction fec improve performance errors expected seen next step protocol evolution june 2015 internet draft specification quic submitted ietf standardization quic working group established 2016 october 2018 ietf http quic working groups jointly decided call http mapping quic http/3 advance making worldwide standard transmission control protocol tcp aims provide interface sending streams data two endpoints data handed tcp system ensures data makes end exactly form connection indicate error condition exists tcp breaks data network packets adds small amounts data packet additional data includes sequence number used detect packets lost transmitted order checksum allows errors within packet data detected either problem occurs tcp uses automatic repeat request arq tell sender re-send lost damaged packet implementations tcp see error connection blocking operation stopping transfers error resolved connection considered failed single connection used send multiple streams data case http/2 protocol streams blocked although one might problem instance single error occurs downloading gif image used favicon entire rest page wait problem resolved tcp system designed look like data pipe stream deliberately contains little understanding data transmits data additional requirements like encryption using tls must set systems running top tcp using tcp communicate similar software end connection sorts setup tasks requires handshake process often requires several round-trips requests responses connection established due inherent latency long-distance communications add significant overhead overall transmission quic aims nearly equivalent tcp connection much-reduced latency primarily two changes rely understanding behaviour http traffic first change greatly reduce overhead connection setup http connections demand tls quic makes exchange setup keys supported protocols part initial handshake process client opens connection response packet includes data needed future packets use encryption eliminates need set tcp connection negotiate security protocol via additional packets protocols serviced way combining together multiple steps single request-response data used following requests initial setup well future requests would otherwise negotiated separate connections quic uses udp basis include loss recovery instead quic stream separately flow controlled lost data retransmitted level quic udp means error occurs one stream like favicon example protocol stack continue servicing streams independently useful improving performance error-prone links cases considerable additional data may received tcp notices packet missing broken data blocked even flushed error corrected quic data free processed single multiplexed stream repaired quic includes number mundane changes also improve overall latency throughput instance packets encrypted individually result encrypted data waiting partial packets generally possible tcp encryption records bytestream protocol stack unaware higher-layer boundaries within stream negotiated layers running top quic aims single handshake process another goal quic system improve performance network-switch events like happens user mobile device moves local wifi hotspot mobile network occurs tcp lengthy process starts every existing connection times one-by-one re-established demand solve problem quic includes connection identifier uniquely identifies connection server regardless source allows connection re-established simply sending packet always contains id original connection id still valid even user ip address changes quic implemented application-space opposed operating system kernel generally invokes additional overhead due context switches data moved applications however case quic protocol stack intended used single application application using quic connections hosted udp ultimately difference could small much overall http/2 stack already applications libraries commonly placing remaining parts libraries essentially error correction little effect http/2 stack size overall complexity organization allows future changes made easily require changes kernel updates one quic longer-term goals add new systems forward error correction fec improved congestion control one concern move tcp udp tcp widely adopted many middle-boxes internet infrastructure tuned tcp rate-limit even block udp google carried number exploratory experiments characterize found small number connections blocked manner led use rapid fallback-to-tcp system chromium network stack opens quic traditional tcp connection time allows fallback zero latency protocol created google taken ietf name quic already 2012 around quic version 20 quite different quic continued evolve refined within ietf original google quic designed general purpose protocol though initially deployed protocol support http chromium current evolution ietf protocol quic general purpose transport protocol chromium developers continued track evolution ietf quic standardization efforts adopt fully comply recent internet standards quic chromium quic code experimentally developed google chrome starting 2012 announced part chromium version 29 released august 20 2013 chrome currently enabled default chromium chrome browser experimental quic support enabled chrome //flags also browser extension indicate pages served quic similarly introduced opera 16 turned opera //flags/ enable-quic opera //flags/ enable-quic-https active sessions seen opera //net-internals/ quic firefox yet support quic 2019-07 cronet library quic protocols available android applications module loadable via google play services 2017 three actively maintained implementations google servers support quic google published prototype server go implementation called quic-go also available powers experimental quic support caddy server july 11 2017 litespeed technologies officially began supporting quic load balancer webadc litespeed web server products july 2019 55.9 quic websites used litespeed 43.7 used nginx although first google servers supported http-over-quic connections facebook also launched technology 2018 cloudflare offering quic support beta basis since 2018 july 2019 3.2 websites use quic addition several stale community projects libquic created extracting chromium implementation quic modifying minimize dependency requirements goquic provides go bindings libquic finally quic-reverse-proxy docker image acts reverse proxy server translating quic requests plain http understood origin server following implementations quic gquic available source form
[ 10242, 1541, 10271, 9251, 2085, 3629, 562, 3133, 5181, 64, 8265, 4687, 5724, 609, 10341, 10344, 649, 9868, 3218, 9365, 11413, 7324, 3742, 9380, 3237, 9381, 3751, 3752, 9387, 10924, 6318, 9909, 4797, 2752, 7364, 8905, 5843, 9941, 3813, 843...
Validation
4,096
8
Urchin_(software):urchin software urchin web statistics analysis program developed urchin software corporation urchin analyzed web server log file content displayed traffic information website based upon log data sales urchin products ended march 28 2012 urchin software could run two different data collection modes log file analyzer hybrid log file analyzer urchin processed web server log files variety log file formats custom file formats could also defined hybrid urchin combined page tags log file data eradicate limitations data collection method isolation result accurate web visitor data urchin became one popular solutions website traffic analysis particularly isps web hosting providers largely due scalability performance pricing model urchin software corp. acquired google april 2005 forming google analytics april 2008 google released urchin 6 february 2009 google released urchin 6.5 integrating adwords urchin 7 released september 2010 included 64-bit support new ui event tracking among features
[ 4995, 5892, 7816, 1033, 5262, 8719, 5524, 7700, 10645, 1943, 8858, 1435, 10525, 2978, 4901, 1959, 3499, 10284, 6576, 1203, 5431, 7359, 196, 3269, 3782, 11590, 1096, 4683, 11343, 3664, 3795, 1240, 8413, 6367, 225, 2658, 6632, 5483, 236, 97...
Test
4,097
9
Bernard_Greenberg:bernard greenberg bernard s. greenberg programmer computer scientist known work multics lisp machine 1978 greenberg implemented multics emacs using multics maclisp success effort influenced choice lisp basis later versions emacs greenberg involved design new error system symbolics turn influenced condition system adopted ansi common lisp working symbolics greenberg implemented lisp machine file system lmfs 1987 greenberg sonya keene authored rfc 1037 nfile file access protocol 1994 nycsubway.org released greenberg nxsys – design environment simulator control signals used new york city transit authority ’ signaling control networks current version nxsys microsoft windows application makes use opengl api provide interactive 3d view perspective new york city subway motorman according online documentation nxsys “ relay language ” subset lisp describes subway track systems control signal pathways subway simulation actually run lisp program compiled nxsys relay language source together thomas milo greenberg author basis technology arabic editor handles among others improved version dmg deutsche morgenländische gesellschaft transcription method supports reversible transcription semi-reversible transliteration arabic text
[ 6502, 11495, 205, 2062, 6797, 5361, 9299, 6772, 2166, 10104 ]
None
4,098
3
Emotion_Engine:emotion engine emotion engine central processing unit developed manufactured sony computer entertainment toshiba use playstation 2 video game console also used early playstation 3 models sold japan north america model numbers cechaxx cechbxx provide playstation 2 game support mass production emotion engine began 1999 ended late 2012 discontinuation playstation 2 emotion engine consists eight separate units performing specific task integrated onto die units cpu core two vector processing units vpu 10-channel dma unit memory controller image processing unit ipu three interfaces input output interface i/o processor graphics interface gif graphics synthesizer memory interface system memory cpu core tightly coupled first vpu vpu together responsible executing game code high-level modeling computations second vpu vpu dedicated geometry-transformations lighting operates independently parallel cpu core controlled microcode vpu utilized also used geometry-transformations display lists generated cpu/vpu0 vpu1 sent gif prioritizes dispatching graphics synthesizer rendering cpu core two-way superscalar in-order risc processor based mips r5900 implements mips-iii instruction set architecture isa much mips-iv addition custom instruction set developed sony operated 128-bit wide groups either 32-bit 16-bit 8-bit integers single instruction multiple data simd fashion i.e four 32-bit integers could added four others using single instruction instructions defined include add subtract multiply divide min/max shift logical leading-zero count 128-bit load/store 256-bit 128-bit funnel shift addition described sony competitive reasons contrary misconceptions simd capabilities amount processor 128-bit neither memory addresses integers 128-bit shared simd/integer registers comparison 128-bit wide registers simd instructions present 32-bit x86 architecture since 1999 introduction sse however internal data paths 128bit wide processors capable operating 4x32bit quantities parallel single registers processor mips-based modified instruction set main vu0 core superscalar in-order 2-issue design 6 stage long integer pipelines 15 stage long floating point pipeline assortment registers consists 32 128 bit vliw simd registers naming/renaming one 64 bit accumulator two 64 bit general data registers 8 16 bit fix function registers 16 8 bit controller registers processor also two 64 bit integer alus 128bit load-store unit lsu branch execution unit bxu 32 bit vu1 fpu coprocessor acted sync controller vpu0/vpu1 containing mips base processor core 32 64-bit fp registers 15 32-bit integer registers alus 64-bit 32-bit fpu n't ieee 754 compliant custom instruction set 107 mmi multimedia extensions implemented grouping two 64-bit integer alus integer floating-point pipelines six stages long feed execution units instructions data 16 kb two-way set associative instruction cache 8 kb two-way set associative non blocking data cache 16 kb scratchpad ram instruction data caches virtually indexed physically tagged scratchpad ram exists separate memory space combined 48 double entry instruction data translation lookaside buffer provided translating virtual addresses branch prediction achieved 64-entry branch target address cache branch history table integrated instruction cache branch mispredict penalty three cycles due short six stage pipeline majority emotion engine floating point performance provided two vector processing units vpu designated vpu0 vpu1 essentially dsps tailored 3d math forerunner hardware vertex shader pipelines vpu features 32 128-bit vector simd registers holding 4d vector data 16 16-bit fixed-point registers four fmac floating point multiply-accumulate units fdiv floating point divide unit local data memory data memory vpu0 4 kb size vpu1 features 16 kb data memory achieve high bandwidth vpu data memory connected directly gif data memories read directly dma unit single vector instruction consists four 32-bit single-precision floating-point values distributed four single-precision 32-bit fmac units processing scheme similar ssex extensions intel fmac units take four cycles execute one instruction units six-stage pipeline throughput one instruction per cycle fdiv unit nine-stage pipeline execute one instruction every seven cycles ipu allowed mpeg-2 compressed image decoding allowing playback dvds game fmv also allowed vector quantization 2d graphics data memory management unit rdram controller dma controller handle memory access within system communications mips core two vpus gif memory controller units handled 128-bit wide internal data bus running half clock frequency emotion engine offer greater bandwidth also 128-bit dedicated path cpu vpu0 128-bit dedicated path vpu1 gif 150 mhz internal data bus provides maximum theoretical bandwidth 2.4 gb/s communication emotion engine ram occurs two channels drdram direct rambus dynamic random access memory memory controller interfaces internal data bus channel 16 bits wide operates 400 mhz ddr double data rate combined two channels drdram maximum theoretical bandwidth 25.6 gbit/s 3.2 gb/s 33 bandwidth internal data bus memory controller buffers data sent drdram channels extra bandwidth utilised cpu emotion engine interfaces directly graphics synthesizer via gif dedicated 64-bit 150 mhz bus maximum theoretical bandwidth 1.2 gb/s provide communications emotion engine input output processor iop input output interface interfaces 32-bit wide 37.5 mhz input output bus maximum theoretical bandwidth 150 mb/s internal data bus interface provides enough bandwidth pcmcia extension connector used network adapter built-in p-ata interface faster data access online functionality advantage high bandwidth could easily used introduce hardware extensions like network adapter built-in ide hdd support extensions extend functionality product lifecycle seen competitive advantage newer variants like slim edition interface would however offer vastly bandwidth required playstation input output devices hdd support removed pcmcia connector design abandoned favor slimmer design emotion engine contained 13.5 million transistors die measuring 240 mm fabricated sony toshiba 0.25 µm 0.18 µm effective l complementary metal–oxide–semiconductor cmos process four levels interconnect emotion engine packaged 540-contact plastic ball grid array pbga primary use emotion engine serve playstation 2 cpu first skus playstation 3 also featured emotion engine motherboard achieve backwards compatibility playstation 2 games however second revision playstation 3 lacked physical emotion engine order lower costs performing functions using software emulation performed cell broadband processor coupled hardware graphics synthesizer still present achieve playstation 2 backwards compatibility subsequent revisions graphics synthesizer removed however playstation 2 software emulator available later system software revisions use sony ps2 classics titles available purchase sony entertainment network
[ 9091, 3077, 7173, 8327, 8711, 6926, 783, 528, 6799, 7445, 9851, 4124, 6815, 8481, 10658, 4516, 5028, 9126, 9512, 6057, 426, 938, 8237, 9911, 8126, 7234, 1480, 8523, 10316, 4060, 1501, 6247, 8937, 6250, 6252, 6253, 5358, 10734, 1776, 3824,...
Validation
4,099
4
Air_Force_Cyber_Command_(Provisional):air force cyber command provisional air force cyber command provisional afcyber p proposed united states air force major command existed provisional status 6 october 2008 air force announced command would brought permanent activation cyber mission would transferred standup twenty-fourth air force air force space command development afcyber announced secretary air force 2 november 2006 originally designated stand around summer 2007 pushed back late 2008 afcyber planned draw upon personnel resources 67th network warfare wing well resources eighth air force planned placed command major general william t. lord former secretary air force michael wynne summarized mission afcyber aim develop major command stands alongside air force space command air combat command provider forces president combatant commanders american people rely preserving freedom access commerce air space cyberspace 14 august 2008 air force made statement pause standing afcyber command set 1 october 2008 air force remains committed providing full-spectrum cyber capabilities include global command control electronic warfare network defense secretary chief staff air force considered delaying currently planned actions air force cyber command allow ample time comprehensive assessment afcyber requirements synchronize afcyber mission key air force initiatives new air force leaders continue make fresh assessment efforts provide nation joint force full spectrum air space cyberspace capabilities 8 october 2008 air force followed previous findings decided place afcyber numbered air force within air force space command wednesday 19 august 2009 24th air force stood following environmental impact analysis required law final list air force bases competition host cyber command headquarters listed alphabetically state 14 may 2009 air force announced lackland afb san antonio texas selected headquarters 24th air force air force downgraded version provisional cyber command however also reported continued separate armed services cyber operations exist cloud uncertainty ... light recent reports secretary defense robert gates considering creation multi-service cyber command based fort meade md tbd united states cyber command
[ 5002, 4435 ]
None
4,100
4
DriveSentry:drivesentry drivesentry antivirus program developed drivesentry inc protect microsoft windows users malware available free personal non commercial use though restricted functionality drivesentry provides realtime demand virus scanner uses following methods determine application contains virus allowing run drivesentry partners offensive computing frame4 security services collect analyze malware samples database list partnering way ensures database fed multiple sources therefore offers redundancy although drivesentry basic features available free advanced features automatically updating white blacklists paid via one-off payment articles computing publications discussing new malware protection technologies – whitelisting – claim traditional antivirus technologies increasingly hard time keeping latest virus trojans malicious threats popularity internet ease data spread allows threats propagate faster requiring traditional antivirus products play catch-up new zero day threats techniques using white/blacklisting community feedback may offer greater security however functionality come cost – specifically whitelisting allows pre-vetted software executed prevents software running even harmless drivesentry avoids issue allowing user prompted programs n't appear black whitelist forces responsibility end user determine good bad drivesentry attempts help user monitoring action program calculating displaying threat rating furthermore malicious software included whitelist still executed
[ 8640, 9281, 2050, 7139, 10756, 2213, 10631, 4746, 8283, 8331, 6797, 7983, 5749, 3382, 7515, 5407 ]
None
4,101
9
Cons:cons computer programming fundamental function dialects lisp programming language cons 'tructs memory objects hold two values pointers values objects referred cons cells conses non-atomic s-expressions natses cons pairs lisp jargon expression cons x onto means construct new object codice_1 resulting pair left half referred first element content address register right half second element content decrement register referred loosely related object-oriented notion constructor creates new object given arguments closely related constructor function algebraic data type system word cons expressions like cons onto also part general functional programming jargon sometimes operators similar purpose especially context list processing pronounced cons good example operator ml scala f elm operator haskell adds element beginning list although cons cells used hold ordered pairs data commonly used construct complex compound data structures notably lists binary trees example lisp expression constructs cell holding 1 left half so-called field 2 right half field lisp notation value looks like note dot 1 2 indicates s-expression dotted pair so-called cons pair rather list lisp lists implemented top cons pairs specifically list structure lisp either forms basis simple singly linked list structure whose contents manipulated note list also cons pair example consider list whose elements 1 2 3 list created three steps equivalent single expression shorthand resulting value list i.e generally abbreviated thus used add one element front existing linked list example x list defined produce list another useful list procedure concatenates two existing lists i.e combines two lists single list binary trees store data leaves also easily constructed example code results tree i.e technically list 1 2 3 previous example also binary tree one happens particularly unbalanced see simply rearrange diagram following equivalent cons refer general process memory allocation opposed using destructive operations kind would used imperative programming language example sped code bit putting side effects instead cons ridiculously since lisp first-class functions data structures including cons cells implemented using functions example scheme technique known church encoding re-implements cons car cdr operations using function cons cell church encoding usual way defining data structures pure lambda calculus abstract theoretical model computation closely related scheme implementation academically interesting impractical renders cons cells indistinguishable scheme procedure well introducing unnecessary computational inefficiencies however kind encoding used complex algebraic data types variants may even turn efficient kinds encoding encoding also advantage implementable statically typed language n't variants java using interfaces instead lambdas
[ 3212, 2062, 5521, 5783, 11674, 10012, 10145, 3876, 5796, 3370, 5677, 8251, 2557, 6087, 10571, 7894, 10584, 6239, 10083, 228, 7805, 6502, 8293, 5352, 5997, 5361, 8435, 3702, 3705, 2556, 5885 ]
None
4,102
3
Pentagram_(video_game):pentagram video game pentagram zx spectrum msx video game released ultimate play game 1986 fourth sabreman series following adventures sabre wulf underwurlde knight lore similarly knight lore uses isometric filmation engine game written either tim chris stamper u.s. gold programming team see main article reason confusion typically ultimate release inlay card provides little actual instruction playing game includes cryptic short story introduction ultimate way describing object game recover lost pentagram artifact magical power firstly sabreman must locate one wells located maze screens shoot several times spell take resultant bucket water one broken obelisks dropped water heal stone must done four obelisks make titular pentagram appear one rooms done five magic runestones must found placed pentagram though objective pentagram complex obscure simple find fetch gameplay two previous filmation games knight lore alien 8 gameplay similar two titles main differences final revision filmation engine new ability shoot enemies projectile magic spell ability enemies respawn directional control system previous games also removed spectrum single joystick button needed fire sabreman spell could longer used jump instead joystick used jump basic gameplay sabreman previous outing knight lore without game day/night shapeshifting cycle wanders mazelike system screens filled enemies pieces movable scenery often forming obstacles puzzles exits one walls sometimes high difficult reach pentagram features larger numbers enemies either knight lore alien 8 due sabreman newfound ability kill include new flying creatures ghosts lice n't kill sabreman get way idea reprised sabreman second adventure underwurlde may even jumped onto harmless frequently annoying foes gravitate toward sabreman hover around disrupting movement sometimes even nudging platforms destroyed others witches zombies lethal touch may destroyed head straight sabreman wander straight lines meeting obstruction point change direction behaviour true wood spiders though dangerous killed wulfsheads either static move set pattern also killed enemy destroyed use sabreman new magic fireball spell another drop top screen replace short happening much faster game player progresses maximum two enemies per screen one time excluding indestructible ones already place room entered due limitations hardware previous filmation games slows crawl four moving objects screen previous two filmation games enemies may interact scenery basic way shoving movable objects logs tables along bump sabreman may also push one objects though pentagram may even move distance blast magic terms gameplay features pentagram advanced filmation titles sections gaming press becoming tired concept accused ultimate unoriginality ultimate third filmation title fifth filmation ii games nightshade gunfright counted time publishers also releasing isometric filmation-inspired games confusion also factor sinclair lamenting pentagram nowiki /nowiki instructions shrouded ultimate rather confusing 'poetry sinclair user admitted could work objective something various wishing wells dotted game even crash rated pentagram highly n't quite worked game objective time review review scores ranged 3/5 awarded sinclair user described lazy criticised perceived lack imagination setting design 93 crash smash awarded ever ultimate-friendly crash magazine cited graphics re-spawning enemies atmosphere high points
[ 320, 9254, 9191, 2792, 9006, 10931, 4278, 5820, 2173 ]
Train
4,103
8
Frosmo:frosmo frosmo software service company founded 2008 company holds headquarters helsinki finland additional offices also poland united kingdom singapore spain sweden company actively develops offers javascript-based conversion rate optimization solution bypass limitations current cms ecommerce platforms founded mobile gaming company dodreams earlier mikael gummerus learned gap gaming market intelligent personalization software late 2008 frosmo launched gaming platform could analyze gamers ’ behavior personalize service accordingly roughly half year later frosmo secured angel round highly distinguished investors individuals risto siilasmaa actual size investment round n't disclosed speculated relatively large although gaming platform peaked 750,000 monthly active users company quickly realized technology could well implemented outside industry 2010 frosmo developed launched social optimizer first product aimed website personalization one first tools make use facebook like button plug-in released april year plug-in acts gateway detailed visitor data venturebeat explains data collection analyzing capabilities company software got positive feedback ui deemed poor design example part solution called social optimizer tool responsible displaying personalized messages used pop-ups ugly click 2014 company estimated gained deals worth 1 million euros world travel market travel tech trade show alone
[ 3462 ]
None
4,104
5
SquidNT:squidnt squidnt port squid proxy server microsoft windows nt-based operating systems squidnt effort since merged main squid project september 2006 maintained guido serassio one core developers squid name squidnt still often used referring squid running windows official name official name squid regardless platform compile source code minimalist gnu windows microsoft visual studio windows support still largely missing squid windows may installed run command line may also installed windows service graphical user interface squid windows run following windows operating systems
[ 6797, 7983, 8976, 4725, 2045 ]
None
4,105
4
Markovian_discrimination:markovian discrimination markovian discrimination spam filtering method used crm114 spam filters model statistical behaviors spam nonspam accurately simple bayesian methods simple bayesian model written text contains dictionary legal words relative probabilities markovian model adds relative transition probabilities given one word predict next word based theory markov chains andrey markov hence name essence bayesian filter works single words alone markovian filter works phrases entire sentences two types markov models visible markov model hidden markov model hmm difference visible markov model current word considered contain entire state language model hidden markov model hides state presumes current word probabilistically related actual internal state language example visible markov model word predict accuracy following word hidden markov model entire prior text implies actual state predicts following words actually guarantee state prediction since latter case encountered spam filtering hidden markov models almost always used particular storage limitations specific type hidden markov model called markov random field particularly applicable usually clique size four six tokens
[ 8747, 1771, 9053 ]
Test
4,106
1
FrontBase:frontbase frontbase relational database management system written ansi c. frontbase uses unicode character encoding frontbase complies sql 92 fully compliant unicode unicode 2.0 tcp/ip uses sockets frontbase available following platforms drivers adaptors include apple webobjects php3 php4 perl odbc jdbc omnis studio realbasic tcl eof fbaccess fbcaccess data types supported include integer decimal timestamp blob varchar
[ 6465, 6797, 8781, 7983, 10286, 5492, 10389, 823, 9177 ]
Test
4,107
8
Service-oriented_architecture:service-oriented architecture service-oriented architecture soa style software design services provided components application components communication protocol network basic principles service-oriented architecture independent vendors products technologies service discrete unit functionality accessed remotely acted upon updated independently retrieving credit card statement online service four properties according one many definitions soa different services used conjunction provide functionality large software application principle soa shares modular programming service-oriented architecture integrates distributed separately-maintained -deployed software components enabled technologies standards facilitate components communication cooperation network especially ip network soa services use protocols describe pass parse messages using description metadata metadata describes functional characteristics service quality-of-service characteristics service-oriented architecture aims allow users combine large chunks functionality form applications built purely existing services combining ad hoc manner service presents simple interface requester abstracts away underlying complexity acting black box users also access independent services without knowledge internal implementation related buzzword service-orientation promotes loose coupling services soa separates functions distinct units services developers make accessible network order allow users combine reuse production applications services corresponding consumers communicate passing data well-defined shared format coordinating activity two services manifesto published service-oriented architecture october 2009 came six core values listed follows soa seen part continuum ranges older concept distributed computing modular programming soa current practices mashups saas cloud computing see offspring soa industry standards relating exact composition service-oriented architecture although many industry sources published principles include following soa building block play three roles service consumer–provider relationship governed standardized service contract business part functional part technical part service composition patterns two broad high-level architectural styles choreography orchestration lower level enterprise integration patterns bound particular architectural style continue relevant eligible soa design service-oriented architecture implemented web services done make functional building-blocks accessible standard internet protocols independent platforms programming languages services represent either new applications wrappers around existing legacy systems make network-enabled implementers commonly build soas using web services standards one example soap gained broad industry acceptance recommendation version 1.2 w3c world wide web consortium 2003 standards also referred web service specifications also provide greater interoperability protection lock-in proprietary vendor software one however also implement soa using service-based technology jini corba rest architectures operate independently specific technologies therefore implemented using wide range technologies including implementations use one protocols example might use file-system mechanism communicate data following defined interface specification processes conforming soa concept key independent services defined interfaces called perform tasks standard way without service foreknowledge calling application without application needing knowledge service actually performs tasks soa enables development applications built combining loosely coupled interoperable services services inter-operate based formal definition contract e.g. wsdl independent underlying platform programming language interface definition hides implementation language-specific service soa-based systems therefore function independently development technologies platforms java .net etc. services written c running .net platforms services written java running java ee platforms example consumed common composite application client applications running either platform also consume services running web services facilitate reuse managed environments also wrap cobol legacy systems present software services high-level programming languages bpel specifications ws-cdl ws-coordination extend service concept providing method defining supporting orchestration fine-grained services coarse-grained business services architects turn incorporate workflows business processes implemented composite applications portals service-oriented modeling soa framework identifies various disciplines guide soa practitioners conceptualize analyze design architect service-oriented assets service-oriented modeling framework somf offers modeling language work structure map depicting various components contribute successful service-oriented modeling approach illustrates major elements identify aspects service development scheme model enables practitioners craft project plan identify milestones service-oriented initiative somf also provides common modeling notation address alignment business organizations enterprise architects believe soa help businesses respond quickly cost-effectively changing market conditions style architecture promotes reuse macro service level rather micro classes level also simplify interconnection to—and usage of—existing legacy assets soa idea organization look problem holistically business overall control theoretically would mass developers using whatever tool sets might please rather would coding standard set within business also develop enterprise-wide soa encapsulates business-oriented infrastructure soa also illustrated highway system providing efficiency car drivers point everyone car highway anywhere things would limited disorganized attempt get anywhere quickly efficiently ibm vice president web services michael liebow says soa builds highways respects soa could regarded architectural evolution rather revolution captures many best practices previous software architectures communications systems example little development solutions use truly static bindings talk equipment network taken place embracing soa approach systems position stress importance well-defined highly inter-operable interfaces predecessors soa include component-based software engineering object-oriented analysis design ooad remote objects instance corba service comprises stand-alone unit functionality available via formally defined interface services kind nano-enterprises easy produce improve also services mega-corporations constructed coordinated work subordinate services mature rollout soa effectively defines api organization reasons treating implementation services separate projects larger projects include soa promises simplify testing indirectly services autonomous stateless fully documented interfaces separate cross-cutting concerns implementation organization possesses appropriately defined test data corresponding stub built reacts test data service built full set regression tests scripts data responses also captured service service tested 'black box using existing stubs corresponding services calls test environments constructed primitive out-of-scope services stubs remainder mesh test deployments full services interface fully documented full set regression test documentation becomes simple identify problems test services testing evolves merely validate test service operates according documentation finds gaps documentation test cases services within environment managing data state idempotent services complexity examples may prove useful aid documenting service level becomes useful documentation apis within java community process provide good examples exhaustive staff would typically use important subsets 'ossjsa.pdf file within jsr-89 exemplifies file soa conflated web services however web services one option implement patterns comprise soa style absence native binary forms remote procedure call rpc applications could run slowly require processing power increasing costs implementations incur overheads soa implemented using technologies example java business integration jbi windows communication foundation wcf data distribution service dds depend remote procedure calls translation xml time emerging open-source xml parsing technologies vtd-xml various xml-compatible binary formats promise significantly improve soa performance services implemented using json instead xml suffer performance concern stateful services require consumer provider share consumer-specific context either included referenced messages exchanged provider consumer constraint drawback could reduce overall scalability service provider service-provider needs retain shared context consumer also increases coupling service provider consumer makes switching service providers difficult ultimately critics feel soa services still constrained applications represent primary challenge faced service-oriented architecture managing metadata environments based soa include many services communicate among perform tasks due fact design may involve multiple services working conjunction application may generate millions messages services may belong different organizations even competing firms creating huge trust issue thus soa governance comes scheme things another major problem faced soa lack uniform testing framework tools provide required features testing services service-oriented architecture major causes difficulty see drops.dagstuhl.de additional challenges partial solutions research roadmap input regarding software service engineering tim o'reilly coined term web 2.0 describe perceived quickly growing set web-based applications topic experienced extensive coverage involves relationship web 2.0 service-oriented architectures soa philosophy encapsulating application logic services uniformly defined interface making publicly available via discovery mechanisms notion complexity-hiding reuse also concept loosely coupling services inspired researchers elaborate similarities two philosophies soa web 2.0 respective applications argue web 2.0 soa significantly different elements thus regarded parallel philosophies whereas others consider two concepts complementary regard web 2.0 global soa philosophies web 2.0 soa serve different user needs thus expose differences respect design also technologies used real-world applications however use-cases demonstrated potential combining technologies principles web 2.0 soa microservices modern interpretation service-oriented architectures used build distributed software systems services microservice architecture processes communicate network order fulfill goal services use technology agnostic protocols aid encapsulating choice language frameworks making choice concern internal service microservices new realisation implementation approach soa become popular since 2014 introduction devops also emphasize continuous deployment agile practices single commonly agreed definition microservices following characteristics principles found literature
[ 9734, 7175, 9225, 4107, 8203, 530, 11303, 8751, 7216, 3121, 6193, 5700, 7753, 11339, 9301, 9305, 5210, 7775, 4194, 4199, 9330, 1657, 7802, 3196, 9345, 5767, 5768, 4233, 9351, 5772, 8342, 5789, 158, 7846, 3753, 2221, 2222, 2733, 4788, 5812...
None
4,108
3
Whiskey_Lake_(microarchitecture):whiskey lake microarchitecture whiskey lake intel codename third 14 nm skylake process-refinement following kaby lake refresh coffee lake intel announced low power mobile whiskey lake cpus availability august 28 2018 yet advertised whether cpu architecture contains hardware mitigations meltdown/spectre class vulnerabilities—various sources contain conflicting information unofficially announced whiskey lake hardware mitigations meltdown l1tf spectre v2 requires software mitigations well microcode/firmware update tdp cpus 15 w configurable core i5-8365u i7-8665u support intel vpro technology pentium gold celeron cpus lack avx2 support
[ 3459, 5380, 3973, 8325, 9095, 5386, 9611, 9741, 5649, 7313, 5523, 6804, 8851, 4886, 9111, 3352, 9500, 5883, 2088, 10669, 9391, 10675, 4276, 1461, 10548, 2237, 5309, 8125, 8126, 833, 6339, 5444, 9541, 1998, 2638, 977, 2514, 5073, 2516, 584...
None
4,109
3
Chuckie_Egg:chuckie egg chuckie egg home computer video game released f software 1983 initially zx spectrum bbc micro dragon subsequent popularity saw released following years wide variety computers including commodore 64 acorn electron msx tatung einstein amstrad cpc atari 8-bit family later updated released amiga atari st ibm pc game written nigel alderton 16 17 years old month two development nigel took pre-release version spectrum code two-year-old software company f co-founded doug anderson mike fitzgerald f respectively doug took simultaneous development bbc micro version whilst mike webb f employee completed dragon port chuckie egg went sell million copies remained steady earner f company went administration late 1980s versions fall broadly two groups — realistic physics e.g bbc micro amstrad cpc versions without e.g zx spectrum version although substantial difference play two levels remain largely 8-bit versions cited classics hen-house harry player must collect twelve eggs positioned level countdown timer reaches zero addition piles seed may collected increase points stop countdown timer otherwise eaten hens patrol level causing pause player touches hen falls gap bottom level loses life level made solid platforms ladders occasionally lift platforms constantly move upwards upon leaving top screen reappear bottom hitting top screen one lifts however also cause player lose life eight levels defined played initially watch giant caged duck upon completion eight levels played without hens harry pursued freed duck flying around screen homing second completion eight levels yields third play hens duck fourth pass introduces additional hens finally fifth pass duck additional hens moving greater speed player completes forty levels advance 'level 41 fact exactly level 33 player starts five lives extra life awarded every 10,000 points zx spectrum version rated number 13 sinclair official top 100 games time chuckie egg also followed two years first release sequel entitled chuckie egg 2 available much smaller subset platforms release changed genre quite radically involved player harry working factory attempting create easter eggs complete toy jet set willy-style graphic adventure whilst first game level one single screen new version levels covering multiple screens although sequel gained small number admirers never received attention original 2017 remake super chuckie egg released onto mobile devices official apparently f approved chuckie egg upgrade bbc electron machines called chukee published small company called bit twiddlers gave player ability start level also introduced extended jump feature instituted holding key whilst jumping one earliest available 'hacks 8-bit computer 2009 organ grinder monkey produced unofficial upgrade original chuckie egg bbc electron includes full level editor set eight new levels
[ 9006, 11311, 7536, 10931, 1527 ]
Test
4,110
3
Oh_Mummy:oh mummy oh mummy computer game amstrad cpc models home computer developed gem software published amsoft 1984 often included free bundles software came computer gameplay similar 1981 arcade game amidar object game unveil treasure within level pyramid game whilst avoiding mummies level consists two-dimensional board contrast pac-man player character walks around footprints left behind surrounding area maze footprints content revealed either scroll mummy key tomb nothing order complete level necessary unveil key tombstone scroll enables player kill/eat one mummy level mummy unveiled follows player next level difficulty speed game increases player progresses levels game primarily one player limited multiplayer mode players alternate taking turn play level whilst even time considered simple terms gameplay graphics sound many people one better addictive early offerings amstrad music played gameplay based children song streets cairo poor little country maid game also released msx zx spectrum amstrad cpc 464 tatung einstein zx spectrum version given away one several introductory software packs computer particular pack also including crazy golf alien destroyer punchy treasure island disco dan
[ 7536, 2898, 9006, 3039 ]
Train
4,111
2
Quartz_Composer:quartz composer quartz composer node-based visual programming language provided part xcode development environment macos processing rendering graphical data quartz composer uses opengl including glsl opencl mac os x 10.6 later core image core video javascript technologies create api developer tool around simple visual programming paradigm apple embedded quartz technologies deeply operating system compositions created quartz composer played standalone quicktime-aware application although mac os x 10.4 later system screen saver itunes visualizer inside quartz composer application embedded cocoa carbon application via supplied user interface widgets quartz composer included iphone sdk way running quartz compositions ios devices quartz programming quartz composer works implementing connecting patches similar routines traditional programming languages patches base processing units execute produce result better performance patch execution follows lazy evaluation approach meaning patches executed output needed three types patches consumers processors external input patches receive output mouse clicks scrolls movements midi audio keyboard movements collection patches melded one called macro macros nested subroutines also edited control order rendering renderer assigned layer indicated upper-right corner layers rendered sequentially lowest highest renderers enabled disabled essentially turning particular layer turning unused layers often results better performance since fewer upstream patches need evaluated patches subpatches allows global parameter changes included subpatches useful lighting 3d transformation glsl shaders among things subpatch support indicated square corners patch rather typical rounded corners version 3.0 became possible turn compositions virtual patches allow user reuse functionality without store duplicate copies composition quartz composer editor allows user save flattened copy virtual patches fully expanded inside easy distribution version 4.0 extended functionality even automatically includes flattened copies virtual patches use fallback desired virtual patch n't installed host system greatly simplifies composition distribution network functionality greatly improved release leopard became possible transmit data synchronize network interface also added support open sound control transmission reception also new version 3.0 possibility write custom patch plugins using xcode template notion safe mode plugins unsafe patches fail load prevents malicious compositions performing dangerous insecure operations custom patches using apple xcode template always considered unsafe possible develop custom patch plugins version 2.0 api undocumented private never supported apple eventually templates released simplify procedure quartz composer editor holding option key selecting preferences ... menu adds 3 additional tabs options user configure options include system settings editor settings quicktime integration settings notable options include expanded tooltips software rendering uncapped framerate rendering multisample antialiasing msaa added hidden option version 4.0 allowing antialiasing inside qc editor though works gpu support msaa data inside qc one following types two additional types introduced version 4.0 data usually converted types transparently quartz composer 3.0 connections patches change color indicate conversions taking place yellow connections mean conversion taking place orange indicates possible loss data conversion number index red indicates severe conversion image boolean example quartz composer documents called compositions compositions binary property lists though xml versions also supported filename extension .qtz com.apple.quartz-composer-composition uti patches connections input port states saved composition file images stored inside composition well making self-contained compositions embedded graphics dragging movie file quartz composer editor reference movie file created providing changing image connected renderer compositions also store metadata composition author copyright description user also add arbitrary metadata items desired many image formats supported including jpeg jpeg2000 gif png tiff tga openexr bmp ico pdf pict icns raw digital camera types images maintained native form long possible rasterizing display means quartz composer keep vector images vectors cropping scaling rotating translating allows work large logical image dimensions without consuming large amounts memory processing time functionality apparent working text-based images pdfs version 3.0 added ability add annotations areas composition called notes notes parallel comments programming languages notes yellow red green blue gray overlap notes version 3.0 concept composition protocols introduced protocols provide template required optional inputs outputs qualify conforming compositions various purposes following protocols available default additional protocol apple uses private api one new protocol added version 4.0 officially supported way add additional protocols quartz composer however undocumented methods may make possible future addition protocols compositions also conform different runtimes quartz composer available leopard runtimes tiger 32-bit well 32-bit 64-bit versions leopard quartz composer runtime editor also indicate used patches unsafe unavailable tiger aid making compatible compositions system-wide composition repository available version 3.0 allows applications share make use common compositions effects processing also possible applications query repository compositions match certain criteria protocol conformance repository spread across 3 file system locations adding compositions repository simple adding composition file one locations became possible compare compositions quartz composer 3.0 feature allows user compare inputs rendered output graph appearance two compositions developer tool called quartz composer visualizer released quartz composer 3.0 allows compositions rendered across multiple screens single machine even spanned across several machines displays support automator actions added release leopard pierre-olivier latour originally developed predecessor quartz composer name pixelshox studio
[ 2691, 10755, 3462, 6023, 6536, 9100, 1549, 5784, 9762, 10406, 11430, 6186, 3371, 7983, 8754, 8627, 7991, 2363, 2365, 2366, 576, 5696, 7292, 7378, 3286, 1623, 4186, 4571, 7133, 7422, 479, 3681, 3691, 3948, 4844, 10478, 8303, 5619, 2676, 55...
None
4,112
9
Dynamic_recompilation:dynamic recompilation computer science dynamic recompilation sometimes abbreviated dynarec pseudo-acronym drc feature emulators virtual machines system may recompile part program execution compiling execution system tailor generated code reflect program run-time environment potentially produce efficient code exploiting information available traditional static compiler dynamic recompilers used convert machine code architectures runtime task often needed emulation legacy gaming platforms cases system may employ dynamic recompilation part adaptive optimization strategy execute portable program representation java .net common language runtime bytecodes full-speed debuggers also utilize dynamic recompilation reduce space overhead incurred deoptimization techniques features dynamic thread migration main tasks dynamic recompiler perform dynamic recompiler may also perform auxiliary tasks suppose program run emulator needs copy null-terminated string program compiled originally simple processor processor copy byte time must first reading source string register writing register destination string original program might look something like emulator might running processor similar extremely good copying strings emulator knows take advantage might recognize string copy sequence instructions decide rewrite efficiently execution speed emulation say instruction new processor called movs specifically designed copy strings efficiently theoretical movs instruction copies 16 bytes time without load register c stop copies 0 byte marks end string set zero flag also knows addresses strings registers b increments b 16 every time executes ready next copy new recompiled code might look something like immediate speed benefit simply processor n't load many instructions task also movs instruction likely optimized processor designer efficient sequence used first example example may make better use parallel execution processor increment b still copying bytes
[ 1409, 5378, 7173, 6150, 7941, 8712, 6153, 1042, 10516, 10013, 2334, 1952, 8609, 5154, 7462, 5677, 814, 815, 7983, 9006, 9774, 9525, 9911, 2620, 576, 10316, 6477, 10703, 3413, 8280, 9432, 11644, 7134, 3553, 8037, 10470, 8937, 8554, 5356, 9...
None
4,113
2
KateOS:kateos kateos linux distribution originally based slackware designed intermediate users package management system used called tgzex .tgz packages unlike slackware packages support dependency tracking optional internationalized descriptions designed ease update two native tools package management pkg updateos last version released kateos iii 3.6 including live cd 2007 kateos project founded end 2003 damian rakowski kate linux 1.0 rabbit series first version system published 2004-10-09 system based slackware 9.0 unlike slackware used pam authentication mechanism possessed enriched package set due problems main server worked infrequently hardly anyone learned existence kate 1.0 move another server project begun gradually acquire users time kate 1.0.1 fix release including updatepack 1 live version published kate linux 2.0 zyklon series ii version 2.0 published 2005-04-09 longer based slackware long-term edition base development also first edition using linux 2.6 2005-05-06 name project changed kateos 2005-05-22 version 2.0.1 published providing tool managing remote updating tgzex packages tool called updateos written piotr korzuszek 2005-06-23 version 2.1 published updateos could install packages remotely 12 august 2005 first live edition series ii published distinctive graphical design used squashfs technology 2 gb data packed one cd unionfs detected hardware configured x server automatically 2005-10-13 last version series ii published 2.3 updateos gained new possibilities system better hardware autodetection discover tool kateos 3.0 virgen series iii 12 april 2006 first snapshot kateos 3.0 published 2006-07-09 version 3.0 published packaging system completely rewritten resulting pkg updateos2 tools libupdateos libsmarttools libraries functionality tgzex packages widened time include dependency tracking descriptions many languages installation process simplified allow full install 15 minutes system used udev d-bus hal detect hardware mount devices automatically 4 august 2006 first 'live edition series iii published aimed demonstrate possibilities kateos 3.0 used data rescue system cd contained 2gb data including xfce desktop environment many office multimedia applications detected configured hardware automatically 7 october 2006 version 3.1 published contained fixes updated gnome desktop environment first edition gnome adjusted especially kateos system also included update-notifier daemon system trace icon changed blinked new updates discovered let user choose packages updated update based libupdateos library supported kateos packages repositories 21 december 2006 version 3.2 published apart fixes updates included new tool katepkg katepkg graphical package manager written php php-gtk library making kateos first system include library default distribution designed allow users easily install update remove packages system supports number repositories including local ones located user hard drive also libsmarttools library optimized resulting 60 speed boost applications using updateos2 version kateos switched bootloader lilo grub make kernel updates easier 17 september 2007 version 3.6 released eight months development version brought several new updated features kateos software driven suspend mode improved internalization support addition several new programs katelan realm help make configuring system user friendly live cd version 3.6 first kateos provide disc installer called install agent allowing user directly install hard disk trying system live new kateos releases planned supported around two years users encouraged update via updateos command newer versions distribution although major version updates series updates e.g ii -- iii recommended damian rakowski 'project initiator leader 1st developer stated project named friend name kate simple nice everybody knows
[ 8837, 7435, 10127, 2321, 5397, 4887, 10394, 673, 3745, 10530, 9253, 6694, 10149, 11305, 7854, 2738, 4790, 439, 56, 59, 7483, 3903, 4673, 8644, 2375, 4039, 8907, 1110, 9693, 2143, 2914, 485, 3685, 9064, 4841, 6890, 7913, 7020, 10860, 7534,...
Test
4,114
3
Apple_Lisa:apple lisa lisa desktop computer developed apple released january 19 1983 one first personal computers offer graphical user interface gui machine aimed individual business users development lisa began 1978 underwent many changes development period shipping us 9,995 five-megabyte hard drive lisa challenged high price insufficient performance insufficient software library crash-prone operating system unreliable apple fileware twiggy floppy disks immediate release cheaper faster macintosh — yielding lifelong sales 10,000 units two years 1982 steve jobs forced lisa project appropriated existing macintosh project jef raskin conceived 1979 led develop text-based appliance computer jobs immediately redefined macintosh cheaper usable version graphical lisa macintosh launched january 1984 quickly surpassing lisa sales assimilating increasing numbers lisa staff newer lisa models introduced addressed faults lowered price considerably platform failed achieve favorable sales compared much less expensive mac final model lisa 2/10 modified high end macintosh series macintosh xl considered commercial failure technical acclaim lisa introduced number advanced features would reappear macintosh many years include operating system protected memory document-oriented workflow hardware overall advanced macintosh hard drive support 2 megabytes mb random-access memory ram expansion slots larger higher-resolution display main exception 68000 processor macintosh clocked 7.89 megahertz mhz lisa 5 mhz complexity lisa operating system associated programs overtaxes slower processor enough users perceive sluggish workstation-tier price lack technical application library made unviable technical workstation market though documentation shipped original lisa refers lisa apple officially stated name acronym locally integrated software architecture lisa steve jobs first daughter named lisa nicole brennan born 1978 normally inferred name also personal association perhaps acronym backronym invented later fit name andy hertzfeld states acronym reverse engineered name lisa late 1982 apple marketing team hired marketing consultancy firm come names replace lisa macintosh time considered jef raskin merely internal project codenames rejected suggestions privately hertzfeld software developers used lisa invented stupid acronym recursive backronym computer industry pundits coined term let invent acronym fit lisa name decades later jobs would tell biographer walter isaacson obviously named daughter project began 1978 effort create modern version then-conventional design epitomized apple ii ten-person team occupied first dedicated office nicknamed good earth building located 20863 stevens creek boulevard next restaurant named good earth initial team leader ken rothmuller soon replaced john couch whose direction project evolved window-and-mouse-driven form eventual release trip hawkins jef raskin contributed change design apple cofounder steve jobs involved concept xerox palo alto research center research already underway several years create new humanized way organize computer screen today known desktop metaphor steve jobs visited xerox parc 1979 absorbed excited revolutionary mouse-driven gui xerox alto late 1979 jobs successfully negotiated payment apple stock xerox exchange lisa team receive two demonstrations ongoing research projects xerox parc apple team saw demonstration alto computer able see action basic elements constituted workable gui lisa team put great deal work making graphical interface mainstream commercial product lisa major project apple reportedly spent 50 million development 90 people participated design plus sales marketing effort launch machine byte credited wayne rosing important person development computer hardware machine went production point became technical lead entire lisa project hardware development team headed robert paratore industrial design product design mechanical packaging headed bill dresselhaus principal product designer lisa team internal product designers contract product designers firm eventually became ideo bruce daniels charge applications development larry tesler charge system software user interface designed six month period hardware operating system applications created parallel 1982 steve jobs forced lisa project appropriated existing macintosh project jef raskin conceived 1979 led develop text-based appliance computer jobs redefined macintosh cheaper usable lisa leading project parallel secret substantially motivated compete lisa team september 1981 announcement ibm pc infoworld reported lisa mcintosh another apple computer secretly development ready release within year described lisa 68000 128kb ram designed compete new xerox star considerably lower price may 1982 magazine reported apple yet-to-be-announced lisa 68000 network work station also widely rumored mouse lisa low sales quickly surpassed january 1984 launch macintosh newer versions lisa introduced addressed faults lowered price considerably failed achieve favorable sales compared much less expensive mac macintosh project assimilated lot lisa staff final revision lisa lisa 2/10 modified sold macintosh xl high cost delays release date contributed lisa discontinuation although repackaged sold 4,995 lisa 2 1986 entire lisa platform discontinued 1987 sun remarketing purchased 5,000 macintosh xls upgraded leftover lisa computers spare parts available recently cherokee data purchased sun remarketing went business 1989 help sun remarketing apple disposed approximately 2,700 unsold lisas guarded landfill logan utah order receive tax write-off unsold inventory lisa first introduced january 19 1983 one first personal computer systems graphical user interface gui sold commercially uses motorola 68000 cpu clocked 5 mhz 1 mb ram lisa computer real-time clock uses 4-bit integer base year defined 1980 software wo n't accept value 1981 valid range 1981–1995 thus 1995 problem real-time clock depended 4 x aa-cell nicd pack batteries lasted hours main power present often causing packs burst open leak corrosive alkaline electrolyte could ruin circuit boards original lisa lisa 1 two apple fileware 5.25-inch double-sided floppy disk drives commonly known apple internal code name drive twiggy capacity approximately 871 kb proved unreliable required special diskettes macintosh intended implement single twiggy drive partway development revised use sony 400 kb microfloppy drive optional external 5 mb later 10 mb apple profile hard drive originally designed apple iii available introduction lisa 2/10 optional 10 mb internal proprietary hard disk manufactured apple known widget also offered first hardware revision lisa 2 released january 1984 priced 3,495 5,495 us much less expensive original model dropped twiggy floppy drives favor single 400k sony microfloppy lisa 2 little 512 kb ram lisa 2/5 consists lisa 2 bundled external 5- 10-megabyte hard drive 1984 time macintosh officially announced apple offered free upgrades lisa 2/5 lisa 1 owners swapping pair twiggy drives single 3.5-inch drive updating boot rom i/o rom addition lisa 2 new front faceplate included accommodate reconfigured floppy disk drive change lisa 2 notable distinction introducing new inlaid apple logo well first snow white design language features lisa 2/10 features 10mb internal hard drive external parallel port standard configuration 1mb ram developing early macintosh software required lisa 2 relatively third-party hardware offerings lisa compared earlier apple ii ast offered 1.5 mb memory board – combined standard apple 512 kb memory board – expands lisa total 2 mb memory maximum amount mmu address late product life lisa third-party hard disk drives scsi controllers double-sided 3.5-inch floppy-disk upgrades unlike original macintosh lisa features expansion slots conversely like apple ii open system lisa 2 motherboard basic backplane virtually electronic components plenty edge connector sockets slots two ram slots one cpu upgrade slot one i/o slot parallel placement end three lisa slots parallel january 1985 following macintosh lisa 2/10 integrated 10 mb hard drive rebranded macintosh xl given hardware software kit enabling reboot macintosh mode positioning apple high-end macintosh price lowered yet 4,000 sales tripled ceo john sculley said apple would lost money increasing production meet new demand apple discontinued macintosh xl leaving eight-month void apple high-end product line macintosh plus introduced 1986 lisa operating system features protected memory enabled crude hardware circuit compared sun-1 workstation c. 1982 features full memory management unit based part elements failed apple iii sos operating system released three years earlier lisa disk operating system also organizes files hierarchical directories unix workstations time main competition lisa terms price hardware filesystem directories correspond gui folders previous xerox parc computers lisa borrowed heavily conceptually lisa resembles xerox star sense envisioned office computing system consequently lisa two main user modes lisa office system workshop lisa office system gui environment end users workshop program development environment almost entirely text-based though uses gui text editor lisa office system eventually renamed 7/7 reference seven supplied application programs lisawrite lisacalc lisadraw lisagraph lisaproject lisalist lisaterminal operating system – rather applications – incapable supporting demands advanced users prone crash restart heavy load large complex spreadsheets graphs produced apple warranty said software works precisely stated apple refunded unspecified number users full systems operating system frailties costly recalls combined high price point led failure lisa marketplace within months lisa introduction us fully translated versions software documentation commercially available british french west german italian spanish markets followed several scandinavian versions shortly thereafter user interface os seven applications lisaguide lisa diagnostics rom fully translated without programming required using resource files translation kit keyboard identify native language layout entire user experience language including hardware diagnostic messages although several non-english keyboard layouts available dvorak keyboard layout never ported lisa though porting available apple iii iie iic later done macintosh keyboard-mapping lisa complex requires building new os kernels contain images layouts due serious memory constraints keyboard layouts stored differences set standard layouts thus bytes needed accommodate additional layouts exception dvorak layout moves every key thus requires hundreds extra bytes precious kernel storage regardless whether needed localized version built globalized core requires grammatical linguistic cultural adaptations throughout user interface including formats dates numbers times currencies sorting even word phrase order alerts dialog boxes kit provided translation work done native-speaking apple marketing staff country localization effort resulted many lisa unit sales outside us inside us product lifespan setting new standards future localized software products global project co-ordination april 1984 following release macintosh apple introduced macworks software emulation environment allows lisa run macintosh system software applications macworks helped make lisa attractive potential customers although enable macintosh emulation access hard disk september january 1985 re-branded macworks xl became primary system application designed turn lisa macintosh xl significant impediment third-party software lisa fact first launched lisa office system could used write programs separate development os called lisa workshop required development process engineers would alternate two oses startup writing compiling code one os testing later lisa workshop used develop software macintosh years macintosh-native development system developed lifetime lisa never went beyond original seven applications apple deemed enough everything although unipress software offer unix system iii 495 byte wrote february 1983 previewing lisa important development computers last five years easily outpacing ibm pc acknowledged 9,995 price high concluded apple ... unaware people would incredibly interested similar less expensive machine 'll see happens apple lisa commercial failure apple largest since failure apple iii 1980 apple sold approximately 10,000 lisa machines price generating total sales 100 million development cost 150 million corporate target market reluctant machine poor price-performance ratio high price put lisa price realm technical workstations without much technical application library lisa implementation requisite graphical interface paradigm novel costly sapping much computer resources away high end usage make business sense time largest lisa customer nasa used lisaproject project management lisa largely unable compete less expensive ibm pc dominating business desktop computing part due x86 platform backward compatibility cp/m operating system many existing business software applications originally written cp/m basic 1984 release macintosh half price better performance end lisa viability lisa 2 mac rom-enabled sibling macintosh xl final two releases lisa line discontinued april 1985 macintosh xl hardware software conversion kit effectively reboot lisa macintosh mode 1986 apple offered lisa xl owners opportunity return computer additional payment us 1,498 exchange macintosh plus hard disk 20 reportedly 2,700 working unsold lisa computers buried landfill macintosh project led apple cofounder steve jobs borrowed heavily lisa gui paradigm directly took many staff create apple ultimate flagship platform next several decades progenitor iphone apple culture object-oriented programming lisa contributed 1988 conception pink first attempt rearchitect operating system macintosh
[ 9732, 7697, 6675, 6165, 11289, 7706, 8222, 1057, 2594, 6183, 1576, 4137, 4139, 7211, 9778, 9784, 8253, 8767, 576, 1090, 8774, 8783, 11346, 4180, 10838, 10840, 9308, 3167, 9312, 9826, 7269, 8806, 8301, 6258, 7285, 10357, 4220, 10365, 7806, ...
None
4,115
3
After_the_War_(video_game):war video game war video game published 1989 dinamic software player controls character post-apocalyptic city probably nuclear war released unreleased artworks luis royo alfonso azpiri reveals city post-nuclear version new york city game consisted two separate parts second half game made accessible successfully completing part one whereupon player given password 94656981 first part localized streets city sequence fights minor enemies big bosses target find entry city underground transport opposed part map second part localized railways stations city underground transport enemies bigger first load complex design character movements slightly different parts common movements move left right jump duck first part way fighting using fists legs second part gives character ability use kind futuristic gun loads featured parts two levels 16-bit versions featured digitized voices ports featured tricky graphical effects e.g. amstrad cpc version included mode 0 mode 1 graphics time war featured two classical fx brands dinamic fx double load consisting two separate parts get advantage computer memory fx giant sprites made use big sprites even ¾ total play area height note fx brands simply commercial names dinamic used name features games giant sprites trick sprites composed set small parts allowed reusing parts different characters e.g. lot enemies share trousers leg movements ports problem vertical sync monitor lets player easily see trick sometimes characters got rendered divided two clearly different slices computer magazines published notes coin-op version game never released outside spain although coin-op game could played many years ago parque de atracciones de madrid graphically identical 16-bit computers counterpart cover artwork war created artist luis royo time development began spanish comic book author alfonso azpiri collaborator dinamic creation box art games azpiri whose brother jorge contributed graphics amstrad cpc version war drew initial version intended cover artwork game however due protracted development schedule time game completed azpiri ended collaboration dinamic work software company topo soft war released new cover art commissioned royo 2011 nearly two decades since dissolution dinamic founding members acquired rights distribute windows game collapse spain italy new software company fx interactive game rebranded war marketed belonging fictional universe original 1989 game
[ 9166, 10931, 6797, 9006 ]
Test
4,116
1
Fuzzy_Logix:fuzzy logix fuzzy logix develops high -performance analytics solutions big data fuzzy logix offers in-database gpu-based analytics solutions built comprehensive growing libraries 600 mathematical statistical simulation data mining time series financial models fuzzy logix formed 2007 partha sen mike upchurch met working bank america shared goal making analytics pervasive 2008 fuzzy logix released db lytix first complete commercially available library in-database analytics fin lytix released 2010 first comprehensive library in-database financial models 2010 aperity oem ’ fuzzy logix models run analytics cpg software saas solutions 2011 quest dell released toad data analyst data point included fuzzy logix ’ models running mysql company started charlotte nc usa headquarters located today fuzzy logix offices richmond va cupertino ca uk india reseller partners mexico sweden japan china fuzzy logix offers four software products db lytix fin lytix comprehensive libraries in-database analytic models libraries leverage user defined function udf capability available database platforms software available multiple database platforms since data movement database minimized database platforms growing increasingly powerful in-database models run 5x 100x faster models use multi-tiered analytics platforms fuzzy logix released first comprehensive library in-database models db lytix 2008 library development since 1998 library includes mathematical statistical data mining simulation classification models fuzzy logix released first comprehensive financial library fin lytix 2010 library contains models equity fixed income foreign exchange interest rate time series models used financial services industry risk management pricing portfolio optimization aster data informix netezza ibm puredata systems mysql paraccel sql server sybase iq teradata fuzzy logix solutions effective optimizing business process performance utilizing mathematical modeling based risk management industries like marketing healthcare insurance digital media services financial services investment retail banking brokerage houses stock exchanges hedge fund management examples techniques superior performance potentially utilized much broadly solving complex problems industries organization government programs educational institutions research need running analytics big data using complex models solutions derived predictive modeling behavior assessing risk modeling optimal system
[ 6850, 7022, 10511, 11030, 3196 ]
Validation
4,117
4
Full_disclosure_(computer_security):full disclosure computer security field computer security independent researchers often discover flaws software abused cause unintended behaviour flaws called vulnerabilities process analysis vulnerabilities shared third parties subject much debate referred researcher disclosure policy full disclosure practice publishing analysis software vulnerabilities early possible making data accessible everyone without restriction primary purpose widely disseminating information vulnerabilities potential victims knowledgeable attack essay topic bruce schneier stated full disclosure – practice making details security vulnerabilities public – damned good idea public scrutiny reliable way improve security secrecy makes us less secure leonard rose co-creator electronic mailing list superseded bugtraq become de facto forum disseminating advisories explains n't believe security obscurity far know full disclosure way ensure everyone insiders access information need controversy around public disclosure sensitive information new issue full disclosure first raised context locksmithing 19th-century controversy regarding whether weaknesses lock systems kept secret locksmithing community revealed public today three major disclosure policies others categorized non disclosure coordinated disclosure full disclosure major stakeholders vulnerability research disclosure policies shaped various motivations uncommon observe campaigning marketing lobbying preferred policy adopted chastising dissent many prominent security researchers favor full disclosure whereas vendors prefer coordinated disclosure non disclosure generally favoured commercial exploit vendors blackhat hackers proponents coordinated disclosure believe software vendors right control vulnerability information concerning products primary tenet coordinated disclosure nobody informed vulnerability software vendor gives permission often exceptions variations policy distribution must initially limited vendors given privileged access nonpublic research advocates coordinated disclosure often prefer weighted less-descriptive term “ responsible disclosure ” coined microsoft security manager scott culp essay “ time end information anarchy ” referring full disclosure microsoft later asked term phased favour “ coordinated disclosure ” although reasoning varies many practitioners argue end-users benefit access vulnerability information without guidance patches vendor risks sharing research malicious actors great little benefit microsoft explain coordinated disclosure serves everyone best interests ensuring customers receive comprehensive high-quality updates security vulnerabilities exposed malicious attacks update developed full disclosure policy publishing information vulnerabilities without restriction early possible making information accessible general public without restriction general proponents full disclosure believe benefits freely available vulnerability research outweigh risks whereas opponents prefer limit distribution free availability vulnerability information allows users administrators understand react vulnerabilities systems allows customers pressure vendors fix vulnerabilities vendors may otherwise feel incentive solve fundamental problems coordinated disclosure full disclosure resolve discovery specific flaw vulnerability mutually exclusive event multiple researchers differing motivations discover flaws independently standard way make vulnerability information available public researchers often use mailing lists dedicated topic academic papers industry conferences non disclosure principle vulnerability information shared shared non-disclosure agreement either contractually informally common proponents non-disclosure include commercial exploit vendors researchers intend exploit flaws find proponents security obscurity researchers favour coordinated disclosure believe users make use advanced knowledge vulnerabilities without guidance vendor majority best served limiting distribution vulnerability information advocates argue low-skilled attackers use information perform sophisticated attacks would otherwise beyond ability potential benefit outweigh potential harm caused malevolent actors vendor prepared guidance even unsophisticated users digest information made public argument presupposes vulnerability discovery mutually exclusive event one person discover vulnerability many examples vulnerabilities discovered simultaneously often exploited secrecy discovery researchers may exist users benefit vulnerability information full disclosure advocates believe demonstrates contempt intelligence end users true users benefit vulnerability information 're concerned security networks position hire expert assist would hire mechanic help car non disclosure typically used researcher intends use knowledge vulnerability attack computer systems operated enemies trade knowledge vulnerability third party profit typically use attack enemies researchers practicing non disclosure generally concerned improving security protecting networks however proponents argue simply want assist vendors claim intent harm others full coordinated disclosure advocates declare similar goals motivations simply disagreeing best achieve non disclosure entirely incompatible
[ 1024, 9217, 5636, 8725, 535, 9761, 3619, 4644, 4133, 5173, 2558, 1608, 3657, 8779, 4703, 8288, 8292, 9317, 10875, 3711, 8320, 5764, 2187, 4240, 4755, 1688, 2717, 9375, 9904, 9395, 8886, 10442, 3789, 4304, 4314, 9435, 3807, 1251, 5349, 125...
Test
4,118
4
Martin_and_Mitchell_defection:martin mitchell defection martin mitchell defection occurred september 1960 two u.s. national security agency nsa cryptologists william hamilton martin bernon f. mitchell defected soviet union secret 1963 nsa study said beyond doubt event likely future greater impact agency security program martin mitchell met serving u.s. navy japan early 1950s joined nsa day 1957 defected together soviet union 1960 moscow press conference revealed denounced various u.s. policies especially provocative incursions air space nations spying america allies underscoring apprehension nuclear war said would attempt crawl moon thought would lessen threat atomic war within days citing trusted source congressman francis e. walter chairman house un-american activities committee huac said martin mitchell sex deviates prompting sensational press coverage u.s. officials national security council privately shared assumption two part traitorous homosexual network classified nsa investigations hand determined pair greatly inflated opinions concerning intellectual attainments talents defected satisfy social aspirations house un-american activities committee publicly intimated interpretation relationship martin mitchell homosexual reading guided pentagon discussion defection decades william hamilton martin may 27 1931 – january 17 1987 born columbus georgia family soon moved washington state father president ellensburg chamber commerce graduated ellensburg high school two years studies central washington college education central washington university earned degree mathematics university washington seattle 1947 enlisted united states navy served 1951 1954 working cryptologist naval security group japan martin played chess collected japanese sword handles tsuka bernon f. mitchell march 11 1929 – november 12 2001 born raised eureka california enlisted us navy one year college gained experience cryptologist tour duty navy 1951 1954 serving japan naval security group kami seya stayed japan another year working army security agency following navy service earned bachelor degree stanford university martin mitchell became friends navy service naval communications intercept facility kami seya japan kept touch returned school navy service encountered one another recruited national security agency nsa 1957 years nsa uneventful martin gained enough recognition twice awarded scholarships study towards master degree mitchell martin became disturbed learned american incursions foreign airspace realized congress unaware nsa-sponsored flights february 1959 violation nsa rules tried report knew congressman expressed frustration information receiving nsa ohio democrat wayne hays december 1959 pair visited cuba without notifying superiors required nsa procedures june 25 1960 mitchell martin left u.s. mexico traveled havana sailed russian freighter soviet union august 5 pentagon announced returned vacation said likelihood gone behind iron curtain september 6 1960 appeared joint news conference house journalists moscow announced requested asylum soviet citizenship new york times described long-time bachelor friends reported smiled described social advantages anticipated soviet union prepared statement said talents women encouraged utilized much greater extent soviet union united states feel enriches soviet society makes soviet women desirable mates conference defectors made public first time mission activities nsa prepared statement written said without consulting government soviet union said united states government unscrupulous accused soviet government also said particularly attacked views general thomas s. power recently told congressional committee u.s. needed maintain nuclear first-strike capability senator barry goldwater opposition banning nuclear tests negotiating disarmament treaty contrast said would attempt crawl moon thought would lessen threat atomic war u.s. recently admitted sending reconnaissance flights foreign countries recent years martin mitchell said knew navy service flights occurred early 1952–1954 detailed u.s. c-130 flight soviet armenia soviets brought contended designed gain understanding soviet defenses therefore represented american interest attacking soviets rather defending also complained restrictions freedom u.s. government confiscation mail particularly freedom theists whose political convictions unpopular response american government called mitchell martin charges completely false department defense called turncoats tools soviet propaganda one mentally sick obviously confused also characterized positions nsa junior mathematicians issue pair sexuality raised dismissed report representative francis e. walter democrat pennsylvania chairman house un-american activities committee denied made allegation reported news agency one men described homosexual report federal bureau investigation pentagon spokesman told reporters nothing mitchell martin personnel records suggest homosexuality sexual perversion next day congressman walter explicitly stated source trusted told two defectors known acquaintances 'sex deviates charge promptly picked press resulted immediately stories homosexuals recruiting sexual deviates jobs federal government hearst newspapers referred martin mitchell two defecting blackmailed homosexual specialists love team time reported review security checks turned mitchell visit psychiatrist presumably concern homosexual tendencies interview soviet news agency tass december 1960 expressed belief american espionage russia u.s. allies neutral nations would continue unchanged despite inauguration new american president january 1961 according later government report martin—who fluent russian—studied leningrad university saint petersburg state university used name vladimir sokolodsky married soviet citizen divorced 1963 later told russian newspaper defection foolhardy also expressed disappointment russians trust important work occasionally sought help american visitors arranging repatriation including donald duffy vice president kaiser foundation bandleader benny goodman another occasion told american defecting believed vision russia presented propaganda publications like ussr soviet life 1975 source told u.s. government martin totally skids 1979 inquired american consulate repatriation result case examined stripped american citizenship next denied permission immigrate u.s. denied tourist visa martin eventually left soviet union died cancer mexico january 17 1987 tijuana hospital del mar buried u.s. less known mitchell renounced u.s. citizenship remained soviet union rest life married galina vladimirovna yakovleva member piano department faculty leningrad conservatory became alcoholic regretted decision mitchell died november 2001 buried st. petersburg defections another life inside u.s. intelligence community meeting national security council october 1960 officials considered response martin-mitchell affair attorney general william p. rogers believed soviets list homosexuals use recruiting blackmail efforts martin mitchell part organized group several meeting thought polygraph tests would help prevent hiring homosexuals president eisenhower wanted central authority coordinate government lists homosexuals order prevent another occurrence nsa needed understand motivated defectors initial investigation turned little interest notes psychological counseling sessions 1940s described martin brilliant emotionally immature offered diagnosis beginning character neurosis schizoid tendencies mentioned likely sadistic mitchell told nsa questioned long starting work agency experimented sexually teenager dogs chickens immediate nsa response focused sexual issues july 1961 agency announced purged 26 employees identified sexual deviates though added qualification homosexuals yet series nsa investigations gave little credit role sexuality mitchell martin defection 1961 nsa report called close friends somewhat anti-social egotistical arrogant insecure young men whose place society much lower believed deserved greatly inflated opinions concerning intellectual attainments talents 1963 another nsa report found clear motive recruited foreigners termed defection impulsive nsa files obtained journalists seattle weekly 2007 cited definitive testimony part women acquaintances attested heterosexuality perversions recorded martin all-controlling sadomasochism occasionally watched women sex sex multiple female partners 1962 congressman walters house un-american activities committee huac concluded 13-month investigation issued report defections mitchell told psychiatrist affairs men women troubled sexual identity report referred homosexual problems report never identified rationale mitchell martin defections focused inadequacy investigations granted security clearances despite evidence homosexuality sexual abnormality atheism communist sympathies part one men report made series recommendations respect nsa hiring practices security investigations promptly adopted agency later government analyses went beyond characterizations huac account unaware nsa unpublished analysis despite contrary evidence 1991 study pentagon defense security service—still use 2007—called martin mitchell publicly known homosexuals
[ 3495, 6344, 8750, 7887, 208, 4595, 7893 ]
Validation
4,119
4
Network_security_policy:network security policy network security policy nsp generic document outlines rules computer network access determines policies enforced lays basic architecture company security/ network security environment document usually several pages long written committee security policy goes far beyond simple idea keep bad guys complex document meant govern data access web-browsing habits use passwords encryption email attachments specifies rules individuals groups individuals throughout company security policy keep malicious users also exert control potential risky users within organization first step creating policy understand information services available users potential damage whether protection already place prevent misuse addition security policy dictate hierarchy access permissions grant users access necessary completion work writing security document major undertaking good start achieved using template national institute standards technology provides security-policy guideline policies could expressed set instructions could understood special purpose network hardware dedicated securing network
[ 3941, 939, 8267, 3629, 10417, 9524, 11188, 119, 3643, 5373, 2558 ]
Test
4,120
5
Joost:joost joost internet tv service created niklas zennström janus friis founders skype kazaa 2007–2008 joost used peer-to-peer tv p2ptv technology distribute content mozilla-based desktop player late 2008 migrated use flash-based web player instead joost began development 2006 working code name venice project zennström friis assembled teams 150 software developers six cities around world including new york city london leiden toulouse according zennström 25 july 2007 press conference skype held tallinn estonia joost signed million beta testers launch scheduled end 2007 team signed warner music indianapolis motor speedway productions indianapolis 500 indycar series production company endemol beta february 2007 viacom entered deal company distribute content media properties including mtv networks black entertainment television bet film studio paramount pictures company went restructuring several times sold assets 2009 suspended operations 2012 program based p2ptv technology expected deliver relaying near-tv resolution images turned pc instant on-demand tv need additional set-up box news updates discussion forums show ratings multi-user chat sessions often linked active stream/channel made possible use semi-transparent widget overlays initial version software based xulrunner audio management re-used zap media kit peer peer layer on-demand video came joltid company also provided peer peer layer skype peer peer layer live video developed scratch first trial run broadcasting march madness 2008 video playback used corecodec coreavc h.264 video decoder joost soft launched widget api august 29 2007 non-copyleft open source license encouraged third party developers create tools tv 2.0 platform 2009 joost released special website playstation 3 internet browser took advantage browser full screen x button capabilities holding x button could choose various video options using d-pad opposed streaming technology clients get feed server p2p tv technology differs sense servers serve handful clients clients turn propagate stream downstream clients moves distribution costs channel owner user co-owners skype friis zennström received part 2.6 billion cash payment ebay acquired skype 2005 easily covered development marketing cost joost venture week launching service founders announced raised additional 45 million sequoia capital backed yahoo google youtube index ventures early investor skype li ka-shing hong kong tycoon cbs us media group taken “ small minority ” stakes start-up viacom also understood among partners although nature backing disclosed joost service ad-supported advertising analogous shown traditional tv according former ceo fredrik de wahl joost 40 advertisers including sony pictures bmw sprite aside injected video-advertisements served additional interactive advertisements via overlays short pop-ups clickable viacom inc. joost entered content provider agreement joost platform february 20 2007 agreement divisions viacom including mtv networks bet networks paramount pictures license television theatrical programming joost came shortly viacom requested 100,000 potentially infringing videos removed youtube.com showed preference viacom joost platform youtube joost licensing agreements place ministry sound tv aardman animation warner music production company endemol fremantle media rdf media diversion media cbs centerstaging rehearsals.com may 1 2007 joost signed deal distribute nhl content including full game replays stanley cup finals vintage games bollywood distributor eros international also announced deal joost 2007 majority content joost restricted users united states america due lack international licensing arrangements company first ceo frederick de wahl succeeded mike volpi june 2007 volpi stepped july 2009 amidst round job cuts succeeded matt zelesko volpi blamed content companies sidelining joost december 17 2008 joost sent email customers explaining project moving website-only model joost application would stop working friday december 19 joost uk subsidiary liquidated 2009 november 24 2009 adconion media group announced would purchasing company assets undisclosed amount companies index ventures major investor 30 april 2012 joost.com website announced without explanation re-evaluating joost.com purpose services near-term decided suspend site allow full re-evaluation may 2012 adconion rebranded folded joost media smartclip another company previously acquired zennstrom written post-mortem analysis company 2016 book founders fail
[ 10368, 8833, 8937, 7983, 499, 10995, 8413, 10270 ]
None
4,121
9
G-code:g-code g-code also rs-274 many variants common name widely used numerical control nc programming language used mainly computer-aided manufacturing control automated machine tools g-code language people tell computerized machine tools make something defined g-code instructions provided machine controller industrial computer tells motors move fast move path follow two common situations within machine tool lathe mill cutting tool moved according instructions toolpath cutting away material leave finished workpiece and/or unfinished workpiece precisely positioned 9 axes around 3 dimensions relative toolpath either move relative concept also extends noncutting tools forming burnishing tools photoplotting additive methods 3d printing measuring instruments first implementation numerical control programming language developed mit servomechanisms laboratory late 1950s decades since many implementations developed many commercial noncommercial organizations g-code often used implementations main standardized version used united states settled electronic industries alliance early 1960s final revision approved february 1980 rs-274-d countries standard iso 6983 often used many european countries use standards example din 66025 used germany pn-73m-55256 pn-93/m-55251 formerly used poland extensions variations added independently control manufacturers machine tool manufacturers operators specific controller must aware differences manufacturer product one standardized version g-code known bcl binary cutter language used machines developed mit bcl developed control cnc machines terms straight lines arcs 1970s 1990s many cnc machine tool builders attempted overcome compatibility difficulties standardizing machine tool controllers built fanuc siemens another market dominator cnc controls especially europe 2010s controller differences incompatibility troublesome machining operations developed cad/cam applications output appropriate g-code called post specific machine tool cnc machines use conversational programming wizard-like programming mode either hides g-code completely bypasses use g-code popular examples okuma advanced one touch aot southwestern industries prototrak mazak mazatrol hurco ultimax winmax haas intuitive programming system ips mori seiki caps conversational software g-code began limited language lacked constructs loops conditional operators programmer-declared variables natural-word-including names expressions use unable encode logic way connect dots programmer figured many dots locations longhand latest implementations g-code include macro language capabilities somewhat closer high-level programming language additionally primary manufacturers e.g. fanuc siemens heidenhain provide access plc data axis positioning data tool data via variables used nc programs constructs make easier develop automation applications g-codes also called preparatory codes word cnc program begins letter g. generally code telling machine tool type action perform codes type codes thought like registers computer pointed years term g-code imprecise g one many letter addresses complete language comes literal sense term referring one letter address specific codes formed example g00 g01 g28 every letter english alphabet used somewhere language nevertheless g-code metonymically established common name language letter addresses used milling turning used bold letters seen frequently throughout program sources smid 2008 smid 2010 green et al 1996 sources smid 2008 smid 2010 green et al 1996 sources smid 2008 smid 2010 green et al 1996 older controls require codes separate blocks line generic program demonstrates use g-code turn part 1 diameter 1 long assume bar material machine bar slightly oversized length diameter bar protrudes 1 face chuck caution generic might work real machine pay particular attention point 5 several points note g-code programming environments evolved parallel general programming—from earliest environments e.g. writing program pencil typing tape puncher latest environments combine cad computer-aided design cam computer-aided manufacturing richly featured g-code editors g-code editors analogous xml editors using colors indents semantically plus features aid user ways basic text editors ca n't cam packages analogous ides general programming two high-level paradigm shifts 1 abandoning manual programming nothing pencil text editor human mind systems generate g-code automatically via postprocessors analogous development visual techniques general programming 2 abandoning hardcoded constructs parametric ones analogous difference general programming hardcoding constant equation versus declaring variable assigning new values object-oriented approach general macro parametric cnc programming uses human-friendly variable names relational operators loop structures much general programming capture information logic machine-readable semantics whereas older manual cnc programming could describe particular instances parts numeric form macro programming describes abstractions easily apply wide variety instances difference many analogues computing era advent 1 creating text bitmaps versus using character encoding glyphs 2 abstraction level tabulated engineering drawings many part dash numbers parametrically defined one drawing parameter table 3 way html passed phase using content markup presentation purposes matured toward css model cases higher layer abstraction introduced missing semantically step-nc reflects theme viewed yet another step along path started development machine tools jigs fixtures numerical control sought build skill tool recent developments g-code step-nc aim build information semantics tool idea new beginning numerical control concept end-to-end cad/cam environment goal early technologies dac-1 apt efforts fine huge corporations like gm boeing however small medium enterprises went era simpler implementations nc relatively primitive connect-the-dots g-code manual programming cad/cam improved disseminated throughout industry machine tool great number axes spindles tool stations difficult program well manually done years easily challenge existed decades cnc screw machine rotary transfer programming also arises today newer machining centers called turn-mills mill-turns multitasking machines multifunction machines cad/cam systems widely used cnc programming g-code requires cad/cam opposed manual programming practical competitive market segments classes machines serve smid says combine axes additional features amount knowledge required succeed quite overwhelming say least time however programmers still must thoroughly understand principles manual programming must think critically second-guess aspects software decisions since mid-2000s seems death manual programming writing lines g-code without cad/cam assistance may approaching however currently contexts manual programming obsolete plenty cam programming takes place nowadays among people rusty incapable manual programming—but true cnc programming done done well efficiently without knowing g-code tailoring refining cnc program machine area practice easier efficient edit g-code directly rather editing cam toolpaths re-post-processing program making living cutting parts computer-controlled machines made easier harder cad/cam software efficiently written g-code challenge cam software ideally cnc machinist know manual cam programming well benefits brute-force cam elegant hand programming used needed many older machines built limited computer memory time memory expensive 32k considered plenty room manual programs whereas modern cam software post gigabytes code cam excels getting program quick may take machine memory take longer run often makes quite valuable machining low quantity parts balance must struck time takes create program time program takes machine part become easier faster make parts newer machines lots memory taken toll hand programmers manual machinists given natural turnover retirement realistic expect maintain large pool operators highly skilled manual programming commercial environment mostly longer provide countless hours deep experience took build skill yet loss experience base appreciated times pool sorely missed cnc runs still optimized without skill list selection except key terms mostly avoids duplicating many abbreviations listed engineering drawing abbreviations symbols see
[ 9345, 2691, 996, 9349, 8262, 9795, 11625, 7341, 9330, 1590, 9911, 4121, 8923, 7964 ]
None
4,122
9
Macintosh_Common_Lisp:macintosh common lisp macintosh common lisp mcl implementation ide common lisp programming language various versions mcl run classic mac os m68k ppc mac os x versions mcl including 5.1 proprietary version 5.2 open sourced 2009 new different version mcl open sourced rmcl rmcl based mcl 5.1 run rosetta intel-based macs mcl famous integration macintosh toolbox later apple carbon allowed direct access mac os functionality directly lisp achieved low-level interface allowed direct manipulation native mac os data structures lisp together high-level interface convenient use 2001 article dr. dobb journal peter norvig wrote mcl favorite ide macintosh platform language serious rival platforms development mcl began 1984 history mcl known different names running 68k-based apple macintosh computers running powerpc-based apple macintosh computers also spawned least one separately maintained fork
[ 10752, 11269, 2062, 9231, 1042, 9749, 8728, 4633, 8226, 2105, 6201, 6717, 576, 8258, 8771, 8262, 1613, 9299, 3675, 7267, 8293, 3176, 2666, 2667, 5751, 7805, 9865, 9877, 4779, 5803, 2225, 8883, 7867, 4799, 7880, 8908, 205, 7896, 10463, 739...
Train
4,123
2
DCC_Alliance:dcc alliance dcc alliance dcca industry association designed promote common subset debian gnu/linux operating system multiple companies within consortium could distribute founded ian murdock 2005 wound 2007 main force behind dcc alliance ian murdock original founder debian project dcc alliance formed whilst murdock ceo progeny linux systems remained key spokesperson consortium visible existence founding dcc alliance announced linuxworld san francisco 9 august 2005 following number pre-announcements stated intention assemble standards-based core debian provide predictable release cycle linux standards base compliance dcc alliance shipped first code 6 months original pre-announcements providing linux standards base lsb 3.0 compliant set program packages based available debian alliance primary goals two classes membership dcc alliance membership remained open additional organizations interest debian-based solutions visible absent involvement ubuntu distribution declined join alliance ubuntu founder mark shuttleworth stated 2006 believe dcc alliance future one founding members mepis later left dcca citing creative differences mepis transitioned simplymepis linux distribution debian unstable/dcca-provided core ubuntu-based one 2006 ian murdock left dcc alliance chair linux standard base workgroup later moved employment sun microsystems 2007 progeny original driver behind consortium wound 2006 xandros still claiming xandros leads engineering team dcca originally formed names given media debian core consortium debian common core following trademark notification debian project name withdrawn replaced—without formal announcement—by dcc alliance ian murdock explained longer treated abbreviation debian dcc —becoming recursive acronym dcc common core notably debian trademark denied mr. murdock dcc alliance originates combination -ian part mr. murdock given name concatenated wife name debra murdock decision infringement trademark fell branden robinson debian project leader dpl employee progeny linux systems mr. murdock time decision made mr. robinson stated would represent conflict interest
[ 9665, 5410, 390, 10687, 5962, 9324, 8690, 7027, 9074, 8476, 8727, 5721, 11263, 3068, 9693, 543 ]
Test
4,124
3
Ingenic_Semiconductor:ingenic semiconductor ingenic semiconductor chinese fabless semiconductor company based beijing china founded 2005 purchased licenses mips architecture instruction sets 2009 design cpu-microarchitectures based also design system chip products including cpus licensed semiconductor intellectual property blocks third parties vivante corporation commission fabrication integrated circuits semiconductor fabrication plants sell xburst cpu microarchitecture based upon mips32 revision 1 respectively mips32 revision 2 instruction set implements 8-stage pipeline xburst cpu technology consists 2 parts ingenic semiconductor purchased mips64 instruction set license designed microarchitecture based xburst2 xburst2 dual-issue/dual-threaded cpu design development basically completed first half 2014 announced summer 2013 socs incorporating xburst microarchitecture xburst1-based socs commonly used tablet computers portable media players digital photo frames gps devices jz4730 cpu used skytone alpha-400 variants jz4720 utilized copyleft hardware project ben nanonote another popular device dingoo gaming handheld uses jz4732 de facto jz4740 game gadget using jz4750 velocity micro t103 cruz t301 cruz 7-inch android 2.0 tablets used jz4760 jz4770 soc used several ainol novo 7 android tablets 3q tablet pc qoo ic0707a/4a40 jz4770 soc also used dedicated handheld neogeo-x open source handheld gcw zero running opendingux jz4780 used imgtec mips based single-board computer sbc creator ci20
[ 3585, 4098, 11396, 8327, 8711, 6925, 398, 783, 1682, 11282, 7445, 410, 9851, 8481, 5028, 6057, 426, 938, 2349, 3117, 8237, 9391, 5681, 3511, 1849, 9913, 10303, 6978, 7234, 6981, 3911, 1480, 11080, 10316, 1624, 2788, 1766, 6247, 6250, 6252...
None
4,125
3
Ian_Cullimore:ian cullimore ian h. s. cullimore english-born mathematician computer scientist influential pocket pc arena cullimore degree mathematics king college london phd cognitive computer science university sussex original founder 1985 main inventor pocket pc became atari portfolio originally known dip pocket pc 1989 dip research ltd. acquired phoenix technologies 1994 1988 cullimore also one founders vice president software poqet computer corporation silicon valley developed poqet pc interest pdas sparked early times psion working first organiser products also original instigator pc card formerly pcmcia card movement came decision use then-emerging credit card memories design atari portfolio founding poqet major investment fujitsu decision made use 68-pin jeida card successfully persuaded board poqet set industry standards organization pcmcia promote standard cullimore wrote parts pcmcia driver stack netware palmdos 1.0 variant digital research dr dos tailored specifically battery powered mobile pcs 1992
[ 6090, 178 ]
None
4,126
4
KeepVault:keepvault keepvault online backup service perform online local backups windows-based personal computers servers keepvault uses storage-based pricing model allows offer unlimited users devices one account keepvault technology uses end-to-end encryption files accessed computers via web keepvault first created proxure 2006 january 2012 proxure acquired authentec inc following authentec inc. ’ acquisition apple inc. keepvault acquired group original developers became independent company keepvault offers windows desktop application windows server add-in two plan types home professional well free local backup 2007 keepvault early oem vendor backup microsoft launched windows home server keepvault shipped hp data vault hp mediasmart servers starting 2013 keepvault dashboard add-in preinstalled western digital sentinel server series joint business community effort keepvault launched backup awareness week may 2014 “ backup week ” designed educate public risks data loss ways protect data 2008 bloggers complained end unlimited data plans since keepvault taken position unlimited plans unsustainable
[ 6565, 838, 1358, 7983, 2196 ]
None
4,127
2
Cambria_(typeface):cambria typeface cambria transitional serif typeface commissioned microsoft distributed windows office designed dutch typeface designer jelle bosma 2004 input steve matteson robin nicholas intended serif font suitable body text readable printed small displayed low-resolution screen even spacing proportions part cleartype font collection suite fonts various designers released windows vista start letter c reflect designed work well microsoft cleartype text rendering system text rendering engine designed make text clearer read lcd monitors fonts group calibri candara consolas constantia corbel diagonal vertical hairlines serifs relatively strong horizontal serifs small intend emphasize stroke endings rather stand principle noticeable italics lowercase characters subdued style somewhat condensed average font kind profile bosma monotype website commented one defining features typeface contrast heavy vertical serifs hairlines – keep font sturdy ensures design preserved small sizes – relatively thin horizontals ensure typeface remains crisp used larger sizes bosma describes transitional slab-serif hybrid many aspects design somewhat blocky render well screen full stops square rather round designers recommended avoiding using printed text designer matthew butterick described monotonous attractive paper bosna compared optical sizes fonts designed printed small design bit like old metal type font days sizes drawing small sizes wider lower contrast compared large fonts design optical correction sense cambria like small size font except may also used large sizes cleartype fonts lining figures text figures offered lining figures default shown sample image variant designed mathematical scientific texts replacement times new roman cambria math first font implement opentype math extension inspired tex led jelle bosma agfa monotype ross mills tiro typeworks project planned development cambria started cambria math developed three stages cambria distributed windows versions since windows vista microsoft office versions since microsoft office 2007 windows microsoft office 2008 mac microsoft office 2007 viewers converters cambria regular cambria math packaged together truetype collection ttc file microsoft office 2008 mac include cambria math omml supported therefore macintosh version cambria packaged individual truetype font ttf files rather single ttc file font along calibri candara consolas corbel constantia also distributed microsoft excel viewer microsoft powerpoint viewer microsoft office compatibility pack microsoft windows open xml file format converter mac use operating systems gnu/linux cross-platform use web use available freeware typeface licensed ascender corporation use end users consumer electronics device manufacturers typeface also licensed monotype imaging printer manufacturers part vista 8 font set package 2013 part chrome google released freely-licensed font called caladea metric-compatible cambria i.e replace document without changing layout based cambo font developed argentine type foundry huerta tipográfica despite metric-compatible caladea covers much smaller language range e.g n't support cyrillic greek advanced typographic features like ligatures old style numerals fractions cambria math used presentation office mathml equations microsoft office 2007 later free typesetting systems xetex luatex make direct use cambria math alternative traditional tex mathematical fonts cambria available use google google drive suite web applications
[ 2593, 4130, 9539, 7973, 8422, 1098, 4138, 2221, 4141, 1487, 2864, 6797, 3538, 4146, 4148, 8374, 9654 ]
Test
4,128
4
Differential_fault_analysis:differential fault analysis differential fault analysis dfa type side channel attack field cryptography specifically cryptanalysis principle induce faults —unexpected environmental conditions—into cryptographic implementations reveal internal states example smartcard containing embedded processor might subjected high temperature unsupported supply voltage current excessively high overclocking strong electric magnetic fields even ionizing radiation influence operation processor processor may begin output incorrect results due physical data corruption may help cryptanalyst deduce instructions processor running internal data state des triple des 200 single-flipped bits necessary obtain secret key dfa also applied successfully aes cipher many countermeasures proposed defend kind attacks based error detection schemes
[ 7556, 2567, 3084, 2957, 7056, 9745, 658, 660, 1173, 1941, 4389, 10662, 169, 11185, 2357, 10806, 9528, 9541, 10315, 6863, 8273, 10963, 212, 9556, 2265, 7643, 9697, 8674, 618, 1898, 4334, 881, 1654, 7161, 7034, 892 ]
Test
4,129
4
Commwarrior:commwarrior commwarrior symbian bluetooth worm first spread via multimedia messaging service mms bluetooth worm affects nokia series 60 software platform commwarrior particularly effective via mms vector used infect phones appeared though sent source known victim leading even security-conscious users open infected message actually message sent random contact sender address book message opened virus attempts install phone via sis file runs worm executed every time phone switched secondary method infection create malicious .sis file compromised phone per minute thereafter worm attempts send file phone bluetooth enabled according sophos installation program one six chance displaying following text commwarrior v1.0 c 2005 e10d0r
[ 11277, 7246, 9055 ]
Validation
4,130
2
Calibri:calibri calibri sans-serif typeface family designed luc de groot 2002–2004 released general public 2007 microsoft office 2007 windows vista office 2007 replaced times new roman default typeface word replaced arial default powerpoint excel outlook wordpad de groot described subtly rounded design warm soft character calibri part cleartype font collection suite fonts various designers released windows vista start letter c reflect designed work well microsoft cleartype text rendering system text rendering engine designed make text clearer read liquid-crystal display monitors fonts group cambria candara consolas constantia corbel calibri features subtly rounded stems corners visible larger sizes sloped form true italic handwriting influences common modern sans-serif typefaces typeface includes characters latin latin extended greek cyrillic scripts calibri makes extensive use sophisticated opentype formatting features range ligatures well lining text figures indices numbers enclosed circles 20 alternate f g accessible enabling fourth fifth stylistic sets features calibri remain unsupported office including true small caps all-caps spacing superscript subscript glyphs ability create arbitrary fractions may accessed using programs adobe indesign one potential source confusion calibri visible homoglyph pair easily confused characters lowercase letter l uppercase letter l latin script effectively indistinguishable true many common fonts however design clear similarities de groot famous much extensive commercial family thesans although straight ends rather rounding calibri default typeface microsoft office much microsoft software joe friend program manager word office 2007 release explained decision switch calibri caused desire make default font one optimised towards onscreen display believed documents would never printed would solely consumed digital device achieve modern look long development windows vista calibri development – 2002 2004 – occurred several years release os first presented 2004 beta windows vista codenamed longhorn first became available use beta 2 version office 2007 released may 23 2006 calibri rest cleartype font collection finally released general public january 30 2007 since released microsoft software environments calibri also distributed microsoft excel viewer microsoft powerpoint viewer microsoft office compatibility pack microsoft windows open xml file format converter mac use operating systems cross-platform web use calibri licensed ascender corporation parent company monotype imaging font calibri light introduced microsoft windows 8 added windows 7 server 2008 part software update microsoft word 2013 onwards calibri calibri light default fonts body text headings respectively calibri light also default font headings powerpoint 2013 due calibri widespread use microsoft office documents google released freely-licensed font called carlito metric-compatible calibri part chromeos carlito font metrics calibri chromeos users correctly display print document designed calibri without disrupting layout carlito based prior open-source typeface lato without de groot involvement calibri tdc2 2005 award type directors club type system category calibri position default font office many cases reported documents shown forged thanks purported creation date calibri available general public 2017 font came public attention evidence pakistani government-related panama papers case also known fontgate document supposedly signed february 2006 found typed calibri. ref name= thenextweb/11july2017 /ref de groot said really zero chance document genuine
[ 2593, 9539, 7973, 8422, 1098, 4138, 1581, 2221, 1487, 2864, 4141, 3538, 4146, 4148, 6797, 8374, 9654, 4127 ]
Validation
4,131
0
Jun'ichi_Tsujii:jun'ichi tsujii tsujii received bachelor engineering master engineering ph.d degrees electrical engineering kyoto university 1971 1973 1978 respectively assistant professor associate professor kyoto university accepting position professor computational linguistics university manchester institute science technology umist 1988 president association computational linguistics acl 2006 permanent member international committee computational linguistics iccl since 1992 since may 2015 tsujii director artificial intelligence research center national institute advanced industrial science technology japan tsujii previously principal researcher microsoft research asia msra joining msra professor university tokyo belonged school inter-faculty initiative informatics graduate school information science technology tsujii also visiting professor scientific advisor national centre text mining nactem university manchester united kingdom 14 may 2010 tsujii awarded medals honor purple ribbon one japan highest awards presented influential contributors fields art academics sports september 2014 tsujii awarded funai achievement award forum information technology fit took place university tsukuba award presented distinguished individuals engaged research related business activities field information technology produced excellent achievements field still active leading positions strong impact young students researchers december 2014 tsujii named acl fellow recognition significant contributions mt parsing unification-based grammar text mining biology
[ 9379, 7780, 5288, 7724, 8440 ]
Test
4,132
2
Nokia_5250:nokia 5250 nokia 5250 budget nokia resistive touchscreen smartphone running symbian v9.4 operating system s60 5th edition user interface price tax subsidies €115 announced august 2010 available china eurasia europe india latin america middle east south east asia pacific region small compact comes preloaded guitar hero mobile series 5 cnet asia praised resolution budget price criticized lack 3g capabilities relying gsm edge
[ 1537, 8577, 6276, 3205, 11271, 11655, 9359, 1424, 529, 2449, 659, 8083, 10770, 5143, 2072, 7063, 5274, 5019, 5659, 669, 8472, 11545, 4003, 6310, 167, 40, 1833, 3626, 5290, 10410, 9137, 10802, 7220, 821, 5175, 7866, 1083, 1216, 1728, 7617,...
Validation
4,133
4
Operation_Payback:operation payback operation payback coordinated decentralized group attacks high-profile opponents internet piracy internet activists using anonymous moniker operation payback started retaliation distributed denial service ddos attacks torrent sites piracy proponents decided launch ddos attacks piracy opponents initial reaction snowballed wave attacks major pro-copyright anti-piracy organizations law firms individuals following united states diplomatic cables leak december 2010 organizers commenced ddos attacks websites banks withdrawn banking facilities wikileaks 2010 several bollywood companies hired aiplex software launch ddos attacks websites respond takedown notices piracy activists created operation payback september 2010 retaliation original plan attack aiplex software directly upon finding hours planned ddos another individual taken firm website operation payback moved launching attacks websites copyright stringent organisations motion picture association america mpaa international federation phonographic industry giving two websites combined total downtime 30 hours following two days operation payback attacked multitude sites affiliated mpaa recording industry association america riaa british phonographic industry law firms davenport lyons dunlap grubb weaver us copyright group also attacked september 21 2010 website united kingdom law firm subjected ddos attack part operation payback asked attacks andrew crossley owner acs law said hours far concern fact train turning 10 minutes late queue coffee wasting time sort rubbish site came back online 350mb file backup site visible anyone short period time backup included copies emails sent firm downloaded made available various peer-to-peer networks websites including pirate bay emails contained unencrypted excel spreadsheets listing names addresses people acs law accused illegally sharing media one contained 5,300 sky broadband customers accused illegally sharing pornography another contained details 8,000 sky customers 400 plusnet customers accused infringing copyright music sharing peer-to-peer networks alleged breach data protection act become part ongoing investigation acs law information commissioner office september 30 leesburg virginia office dunlap grubb weaver law firm – also business u.s copyright group – evacuated police emailed bomb threat received believed event could connected anonymous non-related copyright law firms sites websheriff.com also attacked attacks originally organized internet relay chat channel attacks also became popular topic twitter september 27 2010 ddos attack australian federation copyright theft afact unintentionally brought 8,000 small websites hosted server september 2010 attempt ensure portuguese citizens ca n't access thepiratebay.org associação comércio audiovisual de portugal acapor filed complaint pirate bay complaint filed general inspection cultural activities part portuguese ministry culture according movie rental association pirate bay directly responsible 15 million illegal downloads portugal every year installing pirate bay block isps acapor hoped decrease financial damage claims pirate bay causes october 18 2010 acapor website defaced presenting text operation payback redirect pirate bay seconds addition defacing website copy email database acapor uploaded pirate bay leaked e-mails far revealed acapor methods denunciation dissatisfaction portuguese government justice system perception copyright debate war antagonism isps acapor claimed business isps illegal downloading october 4 2010 operation payback launched attack ministry sound website gallant macmillan website october 7 2010 attacked website spanish copyright society sgae.es october 7 2010 total downtime websites attacked operation payback 537.55 hours october 15 2010 copyprotected.com sql injected defaced three days later operation payback launched ddos attack uk intellectual property office production companies satelfilm.at wega-film.at hit drive-by ddoses october 21 2010 response efforts gain court injunction isp refused block movie-streaming website operation payback knocked porn website hustler.com offline following day 2010 mipcom convention gene simmons kiss stated response simmons comments members operation payback switched attentions two websites simmonsrecords.com genesimmons.com taking offline total 38 hours point course ddos genesimmons.com hacked redirected thepiratebay.org response attack simmons wrote led additional attacks subsequently downtime websites later simmons message removed website one year later december 2011 person supposedly known nickname spydr101 arrested relation attack genesimmons.com charged conspiracy unauthorized impairment protected computer october 26 2010 limewire ordered disable searching downloading uploading file trading and/or file distribution functionality losing court battle riaa claims copyright infringement satisfied injunction riaa announced intention continue arista records llc v. lime group llc trial recover damages caused program retaliation members operation payback announced would attack riaa website october 29 despite fact group typically hit target twice october 29 riaa.org indeed taken offline via denial-of-service attack attack riaa.com riaa.org sites inaccessible europe operation payback main site attacked later day subsequently moved website tieve.tk anonops.net damages phase limewire trial riaa attempted switch seeking statutory damages per-work seeking per-infringement quote total damage amount method calculating number infringements judge case rejected proposal holding case law supported statutory damages per-work basis large-scale infringement thus capping potential award 1.5 billion march 15 2011 four days ruling report appeared law.com highlighting judge remark per-infringement award sought record companies might total trillions report estimated 75 trillion attention-grabbing headline usa nominal gdp 2012-2013 16–17 trillion figure repeated pc magazine march 23 operation payback call-to-arms followed citing 75 trillion figure still actively sought riaa ddos attack riaa website commenced march 25 around october 28 2010 group set new website intention coordinating protests around world raise awareness cause date protest activities november 5 intended day gunpowder plot anonymous heavily affiliates use guy fawkes masks protest activity included attack united states copyright office fbi launched investigation later arrested one person accused taking part attack paypal november 9 2010 operation payback temporarily ceased attacking websites hiatus lasted four months ending early march 2011 attack temporarily took website bmi prominent collection society operating behalf music publishers followed aforementioned second attack riaa website december 8 2010 u.s politician sarah palin announced website personal credit card information compromised palin team believed attack executed anonymous though anonymous never commented palin possible target attack interview rt anonymous member said n't really care sarah palin much honest n't really know trying accomplish attention trying gain personally n't care sarah palin palin technical team posted screenshot server log file showing wikileaks.org url visa attacks denial service attacks credit card data compromised unknown whether palin card compromised part broad attack visa specific attack palins palin email previously hacked campaigning 2008 u.s. presidential election december 2010 wikileaks came intense pressure stop publishing secret u.s. diplomatic cables corporations amazon paypal bankamerica swiss bank postfinance mastercard visa either stopped working froze customers donations wikileaks due political pressures response behind operation payback directed activities companies operation payback launched ddos attacks paypal postfinance swedish prosecution authority december 8 2010 coordinated ddos attack operation payback brought mastercard visa websites december 9 2010 prior sustained ddos attack paypal website caused minor slowdown service paypal announced blog would release frozen funds account wau holland foundation raising funds wikileaks would reactivate account regarding attacks wikileaks spokesman kristinn hrafnsson denied relation group said neither condemn applaud attacks believe reflection public opinion actions targets day 16-year-old boy arrested hague netherlands connection distributed denial-of-service attacks mastercard paypal boy irc operator nickname jeroenz0r december 10 2010 daily telegraph reported anonymous threatened disrupt british government websites assange extradited sweden anonymous issued press release attempt clarify issue electronic frontier foundation co-founder john perry barlow described attacks shot heard round world—this lexington following list sites domains known targeted operation payback attempt take amazon.com aborted failed recruit enough users botnet cnn noted massive amazon website almost impossible crash late december fbi began raid suspected participants operation payback beginning 2011 operation payback brought zimbabwean government websites zimbabwean president wife sued newspaper 15 million publishing wikileaks cable linked alleged trade illicit diamonds january 27 2011 five males aged 15 26 arrested early morning raids u.k. suspicion involvement fbi executed 40 search warrants day united kingdom intellectual property office said site attacked responsible depriving citizens access information democratic right access critics claimed attacks restricted gene simmons right free speech spokesman mpaa said troubling groups seem concerned rights steal copy films music books creative resources rights american workers producing products also criticism pirate party uk united states pirate party joint public statement urged group immediately cease distributed denial-of-service ddos attacks instead seek legal method express frustration disquiet copyright industry perversions copyright law personal gain acknowledging ddos attacks credit card banking web sites serve political protests cyber experts said operation payback done long-term damage sites back online attacks penetrated brought entire banking systems used conduct transactions people still continuing use credit cards make payments like noisy political demonstration like mob surrounding bank refusing let anyone said one cyber expert operation payback members used modified version low orbit ion cannon loic execute ddos attacks september 2010 hive mind mode added loic hive mind mode loic connects irc controlled remotely allows computers loic installed behave part botnet utilising tool coordinators operation payback able quickly take websites belonging anti-piracy groups botnets sizes also used members operation payback reportedly used irc channel communicate targets select instructions attacking targets produced posted various imageboards 4chan/7chan/711chan/420chan/808chan media twitter facebook also utilized coordination december 8 2010 operation payback facebook page removed official twitter account suspended additionally federal court order forced encyclopedia dramatica delete operation payback article featured detailed history operation including personal information individuals associated companies attacked october 2013 13 members operation payback indicted federal court alexandria virginia co-conspirators violation 18 u.s.c § 731 18 u.s.c § 1030 2014 members received plea deal reducing felony charges single misdemeanor
[ 1024, 5636, 5133, 4117, 8726, 535, 9761, 4644, 1608, 3657, 8779, 4703, 8288, 8292, 7798, 10875, 3711, 8320, 5251, 5764, 2187, 4240, 1688, 2717, 9375, 11437, 9904, 9395, 8886, 202, 6347, 3789, 4304, 4314, 9435, 4830, 3807, 5349, 1254, 1047...
Test
4,134
9
Lennart_Augustsson:lennart augustsson lennart augustsson swedish computer scientist previously lecturer computing science department chalmers university technology research field functional programming implementations functional languages augustsson worked carlstedt research technology sandburst credit suisse standard chartered bank facebook currently employed x company augustsson author also co-developer thomas johnsson lazy ml functional programming language developed early 1980s prior miranda haskell lml strongly typed statically scoped implementation ml lazy evaluation key innovation lml demonstrate compile lazy functional language lazy languages implemented via interpreted graph reduction lml compiled g-machine code augustsson intimately involved early lpmud development lpmud driver cd mudlib mud community pseudonym marvin augustsson written three winning entries international obfuscated c code contest
[ 3876, 8262, 6536, 7144, 7019, 7386, 5885 ]
None
4,135
5
Tabular_Data_Stream:tabular data stream tabular data stream tds application layer protocol used transfer data database server client initially designed developed sybase inc. sybase sql server relational database engine 1984 later microsoft microsoft sql server early development sybase sql server developers sybase perceived lack commonly accepted application-level protocol transfer data database server client order encourage use products sybase promoted use flexible pair libraries called codice_1 codice_2 implement standard sql library included order implement bulk copy called blk codice_1 job ferry data two computers underlying network protocol codice_2 provides api client program communicates server via codice_1 codice_2 sends server structured stream bytes meant tables data hence tabular data stream codice_7 provides like codice_2 api client programs communicates server via codice_1 1990 sybase entered technology-sharing agreement microsoft resulted microsoft marketing sql server — microsoft sql server — based sybase code microsoft kept codice_2 api added odbc microsoft since added additional apis time sybase introduced powerful successor codice_2 called codice_12 called pair open client codice_2 though officially deprecated remains widespread use tds protocol comes several varieties openly documented regarded proprietary technology exception tds 5.0 used exclusively sybase documentation available sybase situation changed microsoft published tds specification 2008 part open specification promise freetds team developed free native-library implementation tds protocol licensed lgpl license wireshark protocol decoder tds oracle corporation provides oracle net software analogous tds
[ 9286, 4490, 1964, 10413, 270, 5104, 2804, 10518, 11030 ]
Test
4,136
9
Family_BASIC:family basic family basic famicom basic consumer product programming nintendo family computer video game console japan family basic launched june 21 1984 consumers japan nintendo cooperation hudson soft sharp corporation second version titled family basic v3 released february 21 1985 greater memory new features first edition family basic application cartridge bundled computer style keyboard instructional textbook requires cassette tape recorder save user-generated basic programs programs saved using cassette tape drive famicom data recorder family basic designed compatible floppy disk storage famicom disk system disk system ram adapter requires use famicom cartridge slot prevents using slot family basic cartridge family basic includes dialect basic programming language enhanced game development microsoft basic-derived command set extended support sprites animation backgrounds musical sequences gamepads several visual components seen nintendo games backgrounds characters mario donkey kong series games made available family basic development componentry appear premade family basic games family basic normally used nes consoles console lacks famicom 15-pin expansion port circumvented use custom i/o adapter hooks otherwise unused nes expansion port bottom console 1990 manufacturer shenzhen named nedc developed sold clone famicom family basic china first model called fcs-90 combines famicom chipset cartridge slot pair controllers rf output making complete console used program play famicom video games nedc also translated built-in software english fcs-90 revised model fcs-92 instruction manual section programming japanese popular music family basic developed koji kondo second nintendo product tenure kondo previously initiated computer audio interests programming sounds basic home computer satoshi tajiri creator pokémon initially used family basic gateway build understanding internal operation famicom inspired create handmade famicom game development hardware make game freak debut game quinty later released mendel palace 1990
[ 3718, 7691, 1805, 9997, 786, 11412, 22, 3736, 3481, 9881, 797, 10784, 3233, 11683, 5925, 6949, 8101, 10666, 8494, 303, 7343, 11315, 315, 7355, 6845, 7486, 7870, 4160, 4674, 8262, 10750, 712, 847, 1879, 92, 11229, 6878, 2915, 9188, 5733, ...
Test
4,137
2
Object-oriented_user_interface:object-oriented user interface computing object-oriented user interface ooui type user interface based object-oriented programming metaphor ooui user interacts explicitly objects represent entities domain application concerned many vector drawing applications example ooui – objects lines circles canvases user may explicitly select object alter properties size colour invoke actions upon move copy re-align business application ooui user may selecting and/or invoking actions objects representing entities business domain customers products orders jakob nielsen defines ooui contrast function-oriented interfaces object-oriented interfaces sometimes described turning application inside-out compared function-oriented interfaces main focus interaction changes become users data information objects typically represented graphically screen icons windows dave collins defines ooui demonstrating three characteristics jef raskin suggests important characteristic ooui adopts 'noun-verb rather 'verb-noun style interaction several advantages terms usability great deal potential synergy ooui concept important ideas user interface design including many futuristic imaginings user interfaces rely heavily ooui especially oogui concepts however many examples user interfaces implement one ideas fact oouis though often wrongly labelled oouis conversely examples oouis neither graphical employ direct manipulation techniques employ strong metaphors example earliest versions smalltalk programming language command line interface nonetheless also clearly ooui though subsequently became better known pioneering role development guis direct manipulation visual metaphors although many conceptual parallels oouis object-oriented programming follow ooui implemented using object-oriented programming language guidelines ibm common user access cua possibly comprehensive attempt defining standard ooui design stated 'while object-oriented programming facilitate development object-oriented user interface pre-requisite object-oriented user interface developed traditional programming languages tools however strong synergies larry tesler left xerox parc 1980 join apple underlined relationship also obvious synergy concept ooui idea constructing software domain objects however follow objects user sees interacts within ooui correspond domain objects application built cua guidelines stated 'in object-oriented user interface objects user works necessarily correspond objects modules code programmer used create product basic design methods described cua refined ovid method used uml model interface mark van harmelen states 'object-oriented user interface design require designers take object-oriented view problem beginning project furthermore even designers take object-oriented perspective throughout benefit focusing separately object model object-oriented user interface design contrast naked objects pattern approach design applications least naive form enforces direct correspondence objects represented ooui underlying domain objects auto-generating former latter
[ 10289, 4114, 8524 ]
None
4,138
2
Candara:candara candara humanist sans-serif typeface designed gary munch commissioned microsoft part cleartype font collection suite fonts various designers released windows vista starting letter c reflect designed work well microsoft cleartype text rendering system others calibri cambria consolas corbel constantia candara ’ verticals show entasis ekstasis opposite sides stems high-branching arcades lowercase large apertures open forms unique ogee curves diagonals italic includes many calligraphic serif font influences common modern sans-serif typefaces calibri corbel family similar designs spacing family supports wgl4 character set opentype features include automatic ligature sets numerals tabular proportional oldstyle lining numerator denominator scientific inferior subscripts small caps also distributed microsoft excel viewer microsoft powerpoint viewer microsoft office compatibility pack microsoft windows open xml file format converter mac available freeware use operating systems gnu/linux cross-platform use web use
[ 2593, 4130, 9539, 7973, 8422, 1098, 2221, 4141, 1487, 6797, 3538, 4146, 4148, 8374, 9654, 4127 ]
None
4,139
3
Apple_A5:apple a5 apple a5 32-bit system-on-a-chip designed apple inc. manufactured samsung successor apple a4 a5 commercially debuted release apple ipad 2 tablet also powers iphone 4s ipod touch fifth generation apple tv third generation ipad mini first generation consistent apple debuted a4 chip first original ipad followed iphone 4 ipod touch fourth generation apple claims compared predecessor a4 a5 cpu twice work gpu nine times graphics performance software updates devices using chip ceased 2016 release ios 10 a5 consists dual-core arm cortex-a9 cpu neon simd accelerator dual core powervr sgx543mp2 gpu apple lists a5 clocked 1 ghz ipad 2 technical specifications page though dynamically adjust frequency save battery life unit used iphone 4s clocked approximately 800 mhz apple also included image signal processor unit isp advanced image post-processing face detection white balance automatic image stabilization earsmart unit audience noise canceling a5 first released estimated time cost 75 previous generation difference expected diminish production increased a5 manufactured samsung austin texas factory samsung invested 3.6 billion austin facility produce chips processors nearly facility output dedicated apple components samsung invested 4.2 billion austin facility order transition 28 nm fabrication process second half 2013 a5 part model numbers s5l8940 45 nm version s5l8942 32 nm version s5l8947 32 nm single core version version a5 wider memory subsystem four graphic cores called apple a5x found third generation ipad apple uses first version a5 chip iphone 4s ipad 2 a5 manufacturing process 45 nm 122.2 mm die area manufactured package package pop together 512 mb dual-channel lp-ddr2 dram apple used second version a5 chip third generation apple tv announced march 7 2012 well ipod touch fifth generation ipad mini 32 nm revision ipad 2 chip manufactured 32 nm fabrication process id code s5l8942 one core disabled apple tv new a5 measures nearly 41 smaller first-generation a5 coming 69.6 mm manufactured package package pop together 512 mb lpddr2 dram march 2013 apple released updated version third generation apple tv appletv3,2 containing smaller single cpu core single gpu core version a5 processor unlike a5 variants version a5 package-on-package pop stacked ram chip small 37.8 mm decrease size due decrease feature size still 32 nm fabrication process indicates a5 revision new design markings tell named apl7498 software chip called s5l8947 images illustrations approximately scale
[ 7170, 10755, 9732, 5647, 8720, 7697, 4114, 9235, 11282, 6165, 11289, 7706, 1563, 8222, 1057, 2551, 38, 6183, 1576, 6186, 7211, 6700, 8237, 9774, 2097, 1074, 8754, 9784, 8250, 8253, 7745, 1090, 7235, 7747, 2635, 8783, 4180, 10838, 1623, 36...
Test
4,140
4
John_the_Ripper:john ripper john ripper free password cracking software tool initially developed unix operating system runs fifteen different platforms eleven architecture-specific versions unix dos win32 beos openvms one popular password testing breaking programs combines number password crackers one package autodetects password hash types includes customizable cracker run various encrypted password formats including several crypt password hash types commonly found various unix versions based des md5 blowfish kerberos afs windows nt/2000/xp/2003 lm hash additional modules extended ability include md4-based password hashes passwords stored ldap mysql others sample output debian environment first line command expand data stored file codice_1 next line contents file i.e user codice_2 hash associated user codice_3 third line command running john ripper utilizing codice_4 flag codice_5 name text file full words program use hash codice_1 makes another appearance file want john work see output john working loaded 1 password hash — one saw cat command — type hash john thinks traditional des also see attempt required one guess time 0 100 guess rate one modes john use dictionary attack takes text string samples usually file called wordlist containing words found dictionary real passwords cracked encrypting format password examined including encryption algorithm key comparing output encrypted string also perform variety alterations dictionary words try many alterations also used john single attack mode modifies associated plaintext username encrypted password checks variations hashes john also offers brute force mode type attack program goes possible plaintexts hashing one comparing input hash john uses character frequency tables try plaintexts containing frequently used characters first method useful cracking passwords appear dictionary wordlists takes long time run
[ 7426, 6916, 7556, 7557, 6797, 10135, 2716, 4514, 8867, 3629, 7983, 63, 8513, 6098, 8787, 6617, 3290, 4956, 4445, 733, 7135, 3937, 5612, 7022, 8827, 3826, 6651 ]
None
4,141
2
Consolas:consolas consolas monospaced typeface designed luc de groot part suite fonts take advantage microsoft cleartype font rendering technology included windows since windows vista microsoft office 2007 microsoft visual studio 2010 available download microsoft standard windows vista font slash zero character consolas supports following opentype layout features stylistic alternates localized forms uppercase-sensitive forms oldstyle figures lining figures arbitrary fractions superscript subscript although consolas designed replacement courier new 713 glyphs initially available compared courier new 2.90 1318 glyphs version 5.22 included windows 7 support greek extended combining diacritical marks symbols number forms arrows box drawing geometric shapes added version 5.32 total number supported glyphs 2735 font along calibri cambria candara corbel constantia also distributed microsoft excel viewer microsoft powerpoint viewer microsoft office compatibility pack microsoft windows open xml file format converter mac consolas also available licensing ascender corporation bare bones software licensed font ascender use text editor bbedit inconsolata open source alternative available google fonts
[ 6797, 1435, 4127, 2593, 2978, 4130, 7973, 1191, 4138, 2221, 4146, 4148, 8374, 9654, 10432, 9539, 1098, 1487, 3538, 8422, 8701 ]
Test
4,142
7
TradeGecko:tradegecko tradegecko singapore based software-as-a-service company develops online inventory order management software targeted smes company recognised one innovative business-to-business software providers red herring asia 100 tradegecko launched 2013 carl thompson brothers cameron bradley priest three new zealanders thompson ran label crowded elevator saw need solution managing inventory administration made decision create one “ running clothing label exciting enjoyed lot grew fast amount administration quickly overwhelmed us ’ find solution pull together spreadsheets manual data processing turned absolute nightmare said trio went jfdi.asia accelerate program going raise round financing singapore-based investors april 2015 tradegecko raised 6.5 million series round led nsi ventures jungle ventures tradegecko provides inventory management platform targeted wholesalers online retailers system also integrates cloud based software shopify e-commerce woocommerce e-commerce xero accounting software designed help businesses manage sales supply chains inventory control customer supplier tracking intelligence reports customers able generate sales purchase orders create reports track inventory multiple warehouses tradegecko also released mobile tablet apps system
[ 4194, 467 ]
None
4,143
2
CAPICOM:capicom capicom discontinued activex control created microsoft help expose select set microsoft cryptographic application programming interface cryptoapi functions microsoft component object model com intended enable every environment supports activex use microsoft cryptographic technologies including web pages opened microsoft internet explorer web browser supports activex capicom used digitally sign data inspect verify display digital signature digital certificate add remove certificates certificate stores finally encrypt decrypt data capicom version 2.1.0.3 latest last version capicom officially supported windows vista however microsoft announced capicom discontinued longer developed microsoft suggests replacing capicom .net framework x509 cryptographic classes number alternatives capicom included windows 7 linked microsoft article goes detail
[ 10243, 10769, 9234, 1043, 1055, 2083, 8227, 1577, 9263, 11316, 1077, 8246, 4174, 4178, 9813, 603, 2145, 1656, 5754, 9340, 5761, 9348, 5765, 10886, 2183, 5259, 653, 6797, 3224, 4771, 7846, 10414, 8391, 214, 9943, 9434, 2783, 736, 4321, 637...
Test
4,144
3
Berkeley_RISC:berkeley risc berkeley risc one two seminal research projects risc-based microprocessor design taking place arpa vlsi project risc led david patterson coined term risc university california berkeley 1980 1984 project took place short drive away stanford university mips effort starting 1981 running 1984 berkeley project successful became name similar designs follow even mips would become known risc processor berkeley risc design later commercialized sun microsystems sparc architecture inspired arm architecture risc mips developed realization vast majority programs use vast majority processor instructions one calculation found entire unix system compiled used 30 available instructions motorola 68000 much circuitry cpu dedicated decoding instructions never used risc idea include instructions really used using space used removed circuitry circuits would speed system instead risc concentrated adding many registers small bits memory holding temporary values accessed negligible cost contrasts normal main memory might take several cycles access providing registers making sure compilers actually used programs run much faster additionally speed processor would closely defined clock speed less time would spent waiting memory accesses transistor transistor risc design would outperform conventional cpu hopefully lot downside instructions removed generally performing several sub-instructions instance codice_1 instruction traditional design would generally come several flavours one added numbers two registers placed third another added numbers found main memory put result register etc risc designs hand included single flavour particular instruction codice_1 instance would always use registers operands forced programmer write additional instructions load values memory needed making risc program less dense era expensive memory real concern notably memory also much slower cpu since risc design codice_1 would actually require four instructions two loads add save machine would much memory access read extra instructions potentially slowing considerably offset degree fact new designs used large instruction word 32-bits allowing small constants folded directly instruction instead loaded separately additionally results one operation often used soon another skipping write memory storing result register program end much larger could theory run much faster instance string instructions carrying series mathematical operations might require loads memory majority numbers used would either constants instructions intermediate values registers sense technique registers used shadow memory locations registers used proxies memory locations final values group instructions determined casual observer clear risc concept would improve performance might even make worse way sure actually simulate done results definite test test every simulation showed enormous overall benefit performance design two projects risc mips differed handling registers mips simply added lots left compilers assembly-language programmers make use risc hand added circuitry cpu help compiler risc used concept register windows entire register file broken blocks allowing compiler see one block global variables another local variables idea make one particularly common instruction procedure call extremely easy implement compilers almost computer languages use system known activation record stack frame procedure—a modular unit execution—that contains address procedure called data parameters passed space result values need returned vast majority cases frames small typically three fewer inputs one outputs sometimes input reused output berkeley design register window set several registers enough entire procedure stack frame would likely fit entirely within register window case call return procedure simple extremely fast single instruction called set new block registers—a new register window—and operands passed procedure low end new window program jumps procedure return results placed window end procedure exits register windows set overlap ends results call simply appear window caller data copied thus common procedure call interact main memory greatly accelerating downside approach means procedures large numbers local variables problematic ones fewer lead registers—an expensive resource—being wasted finite number register windows design e.g eight procedures nested many levels deep register windowing mechanism reaches limit last window reached new window set another nested call procedures nested levels deep registers windows deepest call nesting level never accessed completely wasted stanford work compilers led ignore register window concept believing efficient compiler could make better use registers fixed system hardware reasoning would apply smart assembly-language programmer first attempt implement risc concept originally known gold work design started 1980 part vlsi design course then-complicated design crashed almost existing design tools team spend considerable amounts time improving re-writing tools even new tools took hour extract design vax-11/780 final design known risc published acm isca 1981 44,500 transistors implementing 31 instructions register file containing 78 32-bit registers allowed six register windows containing 14 registers additional 18 globals control instruction decode section occupied 6 die whereas typical design era used 50 role register file took space risc also featured two-stage instruction pipeline additional speed without complex instruction re-ordering modern designs makes conditional branches problem compiler fill instruction following conditional branch so-called branch delay slot something selected safe i.e. dependent outcome conditional sometimes suitable instruction case codice_4 notable number later risc-style designs still require consideration branch delay month validation debugging design sent innovative mosis service production june 22 1981 using 2 μm 2,000 nm process variety delays forced abandon masks four separate times wafers working examples arrive back berkeley may 1982 first working risc computer actually checkout board ran june 11 testing chips proved lesser performance expected general instruction would take 2 μs complete original design allotted .4 µs five times fast precise reasons problem never fully explained however throughout testing clear certain instructions run expected speed suggesting problem physical logical design worked full speed performance would excellent simulations using variety small programs compared 4 mhz risc 5 mhz 32-bit vax 11/780 5 mhz 16-bit zilog z8000 showed clearly program size 30 larger vax close z8000 validating argument higher code density cisc designs actually impressive reality terms overall performance risc twice fast vax four times z8000 programs ended performing overall amount memory access large register file dramatically improved odds needed operand already on-chip important put performance context even though risc design run slower vax made difference importance design risc allowed production true 32-bit processor real chip die using already older fab traditional designs simply could much chip surface dedicated decoder logic true 32-bit design like motorola 68020 required newer fabs becoming practical using fabs risc could largely outperformed competition february 12 2015 ieee installed plaque uc berkeley commemorate contribution risc-i plaque reads risc design ran delays work berkeley already turned new blue design work blue progressed slower gold due lack pressing need gold going fab well changeovers classes students staffing effort pace also allowed add several new features would end improving design considerably key difference simpler cache circuitry eliminated one line per bit three two dramatically shrinking register file size change also required much tighter bus timing small price pay order meet needs several parts design sped well savings due new design tremendous whereas gold contained total 78 registers 6 windows blue contained 138 registers broken 8 windows 16 registers another 10 globals expansion register file increases chance given procedure fit local storage registers well increasing nesting depth nevertheless larger register file required fewer transistors final blue design fabbed risc ii implemented risc instruction set 39,000 transistors major change include instruction-format expander invisibly up-converted 16-bit instructions 32-bit format allowed smaller instructions typically things one operands like codice_4 stored memory smaller 16-bit format two instructions packed single machine word instructions would invisibly expanded back 32-bit versions reached alu meaning changes needed core logic simple technique yielded surprising 30 improvement code density making otherwise identical program blue run faster gold due decreased number memory accesses risc ii proved much successful silicon testing outperformed almost minicomputers almost tasks instance performance ranged 85 vax speed 256 variety loads risc ii also benched famous motorola 68000 considered best commercial chip implementation outperformed 140 420 work original risc designs ended risc ii concept lived berkeley basic core re-used soar 1984 basically risc converted run smalltalk way could claimed risc ran c later similar vlsi-bam ran prolog instead smalltalk another effort spur full set chips needed build complete 32-bit workstation risc less famous influential basis commercial sparc processor design sun microsystems sparc first clearly demonstrated power risc concept shipped first sun-4s outperformed anything market led virtually every unix vendor hurrying risc design leading designs like dec alpha pa-risc sgi purchased mips computer systems 1986 large chip vendors followed working efforts like motorola 88000 fairchild clipper amd 29000 powerpc february 13 2015 ieee installed plaque oracle corporation santa clara reads techniques developed alongside idea reduced instruction set also adopted successively powerful implementations extensions traditional complex x86 architecture much modern microprocessor transistor count devoted large caches many pipeline stages superscalar instruction dispatch branch prediction modern techniques applicable regardless instruction architecture amount silicon dedicated instruction decoding modern x86 implementation proportionately quite small distinction complex risc processor implementations become blurred
[ 8450, 1298, 9371, 8861, 6815, 1952, 10786, 3493, 6311, 8231, 682, 9003, 4269, 9391, 2224, 1462, 9911, 2623, 9665, 7234, 10051, 6084, 709, 3014, 3142, 2895, 6607, 11604, 2517, 7770, 219, 7269, 2535, 10985, 9964, 8048, 4465, 8944, 5492, 757...
Test
4,145
2
SUSE_Studio_ImageWriter:suse studio imagewriter suse studio imagewriter official tool designed create live usbs suse opensuse part suse kiwi image creation system designed ease creation liveusb system suse studio however used standard opensuse livecd iso files
[ 7983, 3791, 823, 6012, 4637 ]
Test
4,146
2
Constantia_(typeface):constantia typeface constantia serif typeface designed john hudson commissioned microsoft transitional serif design influenced eric gill ’ perpetua design development typeface began 2003 released 2006 constantia part cleartype font collection suite fonts various designers released windows vista start letter c reflect designed work well microsoft ’ cleartype text rendering system text rendering engine designed make text clearer read lcd monitors fonts suite calibri cambria candara consolas corbel constantia designed either print on-screen uses numerals text figures default seen sample image font also includes lining figures alternate style reviewing website typographica raph levien described likely “ everyone ’ favourite face suite ... highly readable roman font departing slightly classical model still manages fresh new takes inspiration perpetua ... triangular serifs bring mind chisel font enough calligraphic flavor recall palatino. ” among features design includes small capitals alternative spacing punctuation caps text numbers enclosed circles superscript subscript glyphs transitional serif design design features moderate contrast thick thin strokes nearly-vertical axis render well cleartype letters q slightly squared-off distributed microsoft excel viewer microsoft powerpoint viewer microsoft office compatibility pack microsoft windows open xml file format converter mac use operating systems gnu/linux cross-platform use web use available freeware explaining name hudson wrote “ ’ remember possible names came ended rejected international trademark searches ... ’ singing psalms vespers noticed word constantia hey thought starts c ” writing 2011 hudson commented “ actually ’ like name constantia much every time see sea birds dock ’ waiting ferry wish ’ thought call cormorant ”
[ 2593, 4130, 9539, 7973, 8422, 1098, 4138, 2221, 4141, 1487, 6797, 3538, 4148, 8374, 9654, 4127 ]
None
4,147
2
Boxee_Box:boxee box boxee box d-link officially d-link boxee box dsm-380 linux-based set-top device media extender first began shipping 33 countries worldwide 10 november 2010 designed easily bring internet television video television via boxee software comes pre-installed boxee media center software hardware based intel ce4110 system-on-a-chip platform intel atom cpu powervr sgx535 integrated graphics processor ram nand flash memory dm-380 features hdmi port version 1.3 optical digital audio s/pdif rca connector analog stereo audio two usb ports sd card slot wired 100base-t ethernet built-in 2.4 ghz 802.11n wifi live tv dongle started shipping february 2012 enables users watch digital ota clear qam cable television channels epg boxee box also ships small two-sided rf remote control four-way d-pad navigation full qwerty keypad standard remote also sold separately usb receiver d-link boxee box remote dsm-22 used boxee installed computer one use remote without owning d-link boxee box look case remote prototypes boxee box designed san francisco-based astro studios designer xbox 360 microsoft zune 16 october 2012 boxee team announced intend discontinue distribution releasing additional major updates
[ 1700, 1674, 6058, 5612, 6380, 6797, 2383, 1776, 3664, 7602, 1107, 7983, 823, 4219, 8124 ]
None
4,148
2
Corbel_(typeface):corbel typeface corbel humanist sans-serif typeface designed jeremy tankard microsoft released 2005 part cleartype font collection suite fonts various designers released windows vista start letter c reflect designed work well microsoft cleartype text rendering system text rendering engine designed make text clearer read lcd monitors fonts group calibri cambria candara consolas constantia blurb use corbel described designed give uncluttered clean appearance screen letter forms open soft flowing curves legible clear small sizes larger sizes detailing style shapes apparent italic style true italic influences serif fonts calligraphy many letters gaining tail pointing right many aspects design similar calibri candara also humanist sans-serif designs like slightly condensed average font designer raph levien reviewing typographica described similar frutiger tankard described aims family design “ wanted move away round i-dot sans fonts 've seen lot recently less cuddly assertive wanted italic expressive sloped roman corbel default renders numbers text figures old style lowercase numerals preferred integrating figures running text uncommon choice sans-serif faces especially designed display screen several cleartype fonts also make default option lining figures suggested using opentype stylistic alternates menu text figures also found microsoft serif georgia typeface distributed microsoft excel viewer microsoft powerpoint viewer microsoft office compatibility pack microsoft windows open xml file format converter mac use operating systems gnu/linux cross-platform use web use available freeware licensed sold ascender
[ 2593, 4130, 9539, 7973, 8422, 1098, 4138, 2221, 4141, 1487, 6797, 3538, 4146, 8374, 9654, 4127 ]
Test
4,149
7
List_of_cluster_management_software:list cluster management software list software cluster management
[ 11041, 6615, 1507, 8194, 6597, 11428, 4011, 4463, 6480, 2834, 3927, 3323, 2910 ]
None
4,150
2
Z-DOS:z-dos z-dos discontinued oem version microsoft ms-dos specifically adapted run hardware zenith z-100 personal computer z-100 used 8086-family microprocessor intel 8088 otherwise completely different internal architecture ibm pc time microsoft ms-dos n't specifically geared specific hardware platform could tailored run system long used 8086-compatible microprocessor situation completely like popular cp/m systems time typically used 8080-compatible 8080 8085 z80 among others microprocessor order achieve ms-dos like cp/m relied platform-specific dos- bios written target machine hardware-independent dos kernel could run beside ibm oem version ms-dos released pc dos dozens oem versions ms-dos geared specific non-ibm-compatible oem hardware—among zenith z-dos later almost 100 ibm-compatible clones became norm ms-dos became generic version could run generic version ms-dos however could run older non-ibm-compatible machines like z-100
[ 5067, 1515, 8301, 9166, 6129, 499, 9363, 4409 ]
Test
4,151
2
GEORGE_(operating_system):george operating system george name given series operating systems released international computers tabulators ict 1960s ict 1900 series computers included george 1 george 2 george 3 george 4 initially 1900 series machines like ferranti-packard 6000 based ran simple operating system known executive allowed system operator load run programs teletype model 33 asr based system console december 1964 ict set operating systems branch develop new operating system 1906/7 branch initially staffed people released end work omp operating system ferranti orion initial design new system named george george e. felton head basic programming division based ideas orion spooling system atlas computer public claimed george stood general organisational environment contemporary sources say backronym july 1965 team ict present seminar npl describing ctss operating system developed mit project mac decided ict would need provide multi-access facilities known ict mop multiple online processing november 1965 h. p. goodman head operating systems branch attended fall joint computer conference las vegas plans multics initially described multics features discussed influenced future development george notably tree structured filestore towards end 1965 ict marketing requested simpler operating system made available quickly especially smaller members range decided two smaller systems known george 1 george 2 released rapidly larger operating system renamed george 3 george 1 simple batch processing system job descriptions read cards paper tape controlled loading running programs either loaded cards paper tape magnetic tape job control language allowed definition peripherals files used handling exception conditions job description would checked errors job run george used trusted program facilities provided executive run user programs george 2 added concept line peripheral handling spooling several different modules running parallel allowed overlapping input processing output operations installation large enough multiple copies central module could run allowing multiple jobs processed parallel george 2 job control language allowed use stored macros conditional facilities george 2 provided file system system user programs relied facilities provided executive files disk accessed unique 12 character names security erase bit provided minimop could run simultaneously george 2 machine provide on-line time-sharing facilities somewhat artificial example batch george 2 real application job would probably use stored macro much simpler example written longhand effort show features jcl george 3 main version operating system series larger machines 1900 series initially released 1906/7 eventually made available models 1902t contrast george 1 2 ran user-mode programs executive george 3 full operating system leaving low-level peripheral interrupt handling cut-down version executive george 3 implemented small memory-resident part collection chapters overlays loaded removed memory needed chapters strictly location-independent allowing best use memory internally george used cooperative multitasking context switches could take place chapter change call one chapter another specified places code user-level code run using preemptive multitasking context switches forced i/o operations clock ticks george written special assembler gin george input richer conditional compilation macro facilities standard plan assembler macros heavily used code reduce effort programming large system assembly language later versions macro features gin used add structured programming features code writing system estimated taken 75 programmer-years effort george 3 mixed batch online system jobs could run cards tape manner george 2 interactively mop multiple online processing terminals either simple teletype model 33 asr terminals block mode vdu terminals job control language terminals batch jobs included conditional operations macro operations contrast unix systems job control language part operating system rather user level shell process job could one program loaded memory time one job could start jobs run concurrently system resources site policy would permit system would swap user programs memory waiting input output activities required memory run george 3 provided tree structured file store inspired part multics every user system home directory many sub directories needed users home directory could accessed directly example directory user john could referred john full path example john computer science department home directory might manager.users.compsci.john access control lists used security user could permit deny user group users access files directories file data storage two-level files could either currently disk system low disk space could automatically relegated magnetic tape attempt made access currently line file job would suspended operators requested load appropriate tape tape made available file would brought back disk job resumed starting 1904a paging unit available larger 1900 processors george 4 written take advantage george 4 remained compatible george 3 common alternate george 3 4 machine filestore running george 3 day small interactive workloads george 4 night large memory intensive jobs george 4 introduced concept sparse program program addressing space larger allocated memory read-only pure data code regions new versions consolidator linker compilers provided use facilities source code george 3 4 conditional compilation facilities gin assembler used select version system compiled 1900 paging feature emulated 2900 series machines used later george installations george 4 fell use george 3 simple examples george use job modelled george 2 job like job somewhat artificial real use work would done pre-stored macro command job would read card paper tape reader minor changes removal first jb command could stored file run interactive mop terminal user input shown lower case output george upper case george distributed form allowed site modify large parts system compilation system started interrupted end dumped magnetic tape gin compiler allowed compilation continued point user site possibly modifying code already compiled versions george 3 release 8 provided binary form modifications needed system made binary patches simplify process george chapters included empty mend area end starting release 8 source george distributed binary magnetic tape microfiche system source level patches known mendits used modify system existing chapter could completely replaced new modified chapter george user group set mend exchange scheme share interesting modifications george modifications distributed freely others available fee icl produced new version george would sometimes include modifications produced users last released version 8.67 patches mend exchange scheme included standard george source switched conditional compilation turned part standard process tailoring george site george well documented internally series looseleaf folders distributed initial version plus amendments eventually original pages replaced new copy manuals consisted box empty looseleaf folders pile amendments first amendment list contributors technical reason amendment described keep everyone happy modified version george 3 supplied university manchester regional computer centre umrcc linked george 3 cdc cyber machine george supplied offline i/o job queueing functions online support supplied icl cyber hardware software cyber support team worked office name cybermen door release icl new range 2900 series vme operating system george became obsolete however due legacy investment software george icl released options run 1900 series software including george 2900 series machines initially direct machine environment dme later concurrent machine environment cme allowed simultaneous running 1900 2900 code system new versions george 3 continued released 2900 last version 8.67 released 1983 2005 least one site russia still running george 3 dme november 2014 george 3 run reconditioned icl 2966 national museum computing david holdsworth delwyn holroyd obtained copies george 3 issue tapes last live site uk british steel corporation decommissioned wrote emulator 1900 hardware executive allows running george microsoft windows linux part project computer conservation society emulator includes emulation executive java emulation icl7903 communications processor making possible run mop sessions telnetting case port 2023 tests emulator show george 3 y2k compliant
[ 2179, 6664, 3594, 6797, 10257, 6675, 406, 7325, 5293, 7983, 5936, 8879, 4151, 823, 1849, 7483, 11075, 8262, 1611, 3916, 5455, 5840, 477, 5730, 5363, 5492, 6772, 9587, 7032 ]
Validation
4,152
3
Klax_(video_game):klax video game klax 1990 puzzle video game designed dave akers mark stephen pierce object line colored blocks rows similar colors make disappear object columns similar atari games originally released coin-op follow-up tetris tangled legal dispute time released summer 1990 also known last game released atari 2600 console discontinued early 1992 klax features conveyor belt top screen constantly rolls toward playing area delivering steady supply blocks player controls small device sits interface conveyor belt playing area moved left right catch blocks deposit either playing area hold 25 blocks 5x5 arrangement push back conveyor belt device hold five blocks uncaught block considered drop flashing block used wildcard colour playing area blocks eliminated arranging three color continuous line known klax line may horizontal vertical diagonal multiple grouping e.g. one vertical horizontal counts multiple klaxes klaxes four same-colored blocks two klaxes five same-colored blocks three klaxes goal reached bonus points awarded remaining blocks conveyor belt device empty spaces bin also levels certain point total required points excess required amount counted scoring bonus points klax consists 100 levels grouped blocks five beginning game fifth level levels divisible five except levels 95 100 player choose skip five ten levels skipping levels gives bonus points higher drop allowance game ends player either exhausts drop allowance fills playing area finishes level 100 akers programmed klax weeks using amigabasic ported line-by-line c. 1990 interview said wanted produce something playable compact relatively quick develop influences tetris tic-tac-toe chose name sound tiles make rolling across screen atari games released klax february 1990 soon called major arcade hit quickly released several home versions tengen brand akers created nintendo entertainment system genesis editions 16-bit conversions featured improved graphics klax received parents choice foundation seal approval 1990 best mind game 1991 european computer leisure awards dennis lynch chicago tribune named klax best cartridge 1990 midway games gained rights klax upon purchasing atari games 1996 title re-released retro compilations modern consoles 1999 press release called midway tic-tac tile puzzle game mike mika working game boy color version game placed hidden wedding proposal inside took girlfriend three years uncover proposal mike mika also placed hidden snake-like game well mini-adventure game within game easter eggs arcade version klax saw ports contemporary home computers video game systems 1990s including atari lynx amstrad gx4000 even atari 2600 final official atari-licensed release exclusively europe klax first game versions three 1990s leading consoles nintendo entertainment system genesis turbografx-16 klax included arcade party pak playstation game also reissued midway arcade treasures 2003 compilation nintendo gamecube playstation 2 xbox pc also appeared lego dimensions release famicom tsūshin awarded pc engine version game 30 40 game ranked 26th best game time amiga power 1991 2012 author named kieren hawken described klax one coveted video games time capsule review lynx version start clayton walnum commented start playing klax maniac uzi wo n't able tear away graphics clean vivid music darn near good enough dance digitized sound effects speech astonishing small unit julian rignall reviewed atari lynx version cvg magazine january 1991 quoting game simple addictive giving rating 93 100
[ 3233, 8484, 7269, 10855, 10316, 1776, 9951, 4856, 986, 9627, 2045, 95 ]
Validation
4,153
2
PelicanHPC:pelicanhpc pelicanhpc operating system based debian live provides rapid means setting high performance computer cluster pelicanhpc formerly known parallelknoppix
[ 8837, 7435, 10127, 2321, 5397, 4887, 10394, 673, 3745, 10530, 9253, 10149, 11305, 7854, 7983, 2738, 4790, 439, 56, 59, 7483, 3903, 4673, 2375, 4039, 330, 8907, 1110, 9693, 2914, 485, 3685, 9064, 4841, 6890, 7913, 7020, 10860, 7534, 2671, ...
Test
4,154
4
Redo_Backup_and_Recovery:redo backup recovery redo backup recovery free backup disaster recovery software runs bootable linux cd image presently ubuntu 12.04 lts features gui front end partclone command line utility capable bare-metal backup recovery disk partitions use external hard drives network shares addition backup software disk includes additional supporting programs
[ 7905, 6280, 1801, 492, 7087, 7983, 6514, 823, 8254, 1150 ]
Test
4,155
1
Component-oriented_database:component-oriented database component-oriented database codb way data administration programming dbms using paradigm component-orientation paradigm component-orientation co development object-orientation oo programming data modeling leading toward extreme possibilities reuse model type classes aggregate cells called components execute role similar function structured programming way processing information contemporary relational database model component-orientation mixes set features predecessor models understanding simpler thinking visual component application deployed executable bytecode otherwise turned linked icon inside another application icon one clicks implements certain tasks concepts extended non-visual components database activities component visual aggragate classes sense oo linked ones adapters oo model conception data code programming code mixed cohesive body difficulties conceiving codb co programming separate one although enigma important conceptual epistemological area practical data processing n't importance question usage mapping models large scale used software like mappings called ordbms crdb component-relational database separation data code still well defined programming activity co often taken place large-scale used oo languages like c++ java mapping adaptation designing paradigm supored uml data modeling data administration database administration mapping adaptation alike ordbms paradigm adapted paradigm component-based models known component-relational database crdb main advantage component-oriented thinking seen early chapters optimization reusability work going far away uses oo models co paradigm allows use ready use applications modules new bigger projects necessary regard technical features achieved traditional oo models although idea component came naturally oo thinking basis support notions oo like encapsulation inheritance polymorphism necessarily leads idea reusing applications modules new works co thinking also assures components fully tested real application thus model paroxism reuse well feature understanability end users corollary app- comp way realizing works even using software present oo paradigm many specific consequences world data-oriented activities analogous way whole models composed classes treated part component new comprehensive model
[ 2688, 5632, 8201, 9108, 9631, 1697, 5677, 9397, 11574, 9147, 7868, 11324, 11457, 6085, 9286, 2512, 7767, 7650, 8291, 9828, 10471, 6383, 1146, 6395, 2556 ]
Test
4,156
3
Hybrid-core_computing:hybrid-core computing hybrid-core computing technique extending commodity instruction set architecture e.g x86 application-specific instructions accelerate application performance form heterogeneous computing wherein asymmetric computational units coexist commodity processor hybrid-core processing differs general heterogeneous computing computational units share common logical address space executable composed single instruction stream—in essence contemporary coprocessor instruction set hybrid-core computing system contains instructions dispatched either host instruction set application-specific hardware typically hybrid-core computing best deployed predominance computational cycles spent identifiable kernels often seen high-performance computing applications acceleration especially pronounced kernel ’ logic maps poorly sequence commodity processor instructions and/or maps well application-specific hardware hybrid-core computing used accelerate applications beyond currently physically possible off-the-shelf processors lower power cooling costs data center reducing computational footprint i.e. circumvent obstacles power/density challenges faced today commodity processors
[ 499, 6268, 5358, 6415 ]
Validation
4,157
4
Optenet:optenet optenet global security company provides customers multi-tenant secure web gateway e-mail infrastructure solution primarily carriers managed security service providers mssps large enterprises optenet private company spin-off university navarra engineering faculty san sebastian research centre san sebastian spain provides customers multi-tenant secure web gateway e-mail infrastructure solution primarily carriers managed security service providers mssps large enterprises want create service offerings clients product optenet websecure recently awarded five stars sc magazine ’ web content management group test defining 'solid web security solution optenet named cool vendor gartner innovative multi-tenant technology 2011 gartner report cool vendors communications service provider infrastructure 2011 authored akshay sharma deborah kish
[]
Test
4,158
5
Semaphore_Flag_Signaling_System:semaphore flag signaling system computer networking semaphore flag signaling system sfss humorous proposal carry internet protocol ip traffic semaphores semaphore flag signaling system initially described rfc 4824 april fools rfc issued internet engineering task force edited j. hofmueller et al released april fool day 2007 one several april 1 rfcs reference implementation ip sfs done authors rfc within project talking fish email transmitted using smtp semaphore flag signals
[ 3592, 3218, 11413, 3742, 10924, 6319, 562, 6456, 4797, 3006, 64, 7364, 2887, 5469, 5470, 5472, 10341, 10344, 11112, 5102, 8432, 6651 ]
None
4,159
4
Optiv_(cybersecurity_company):optiv cybersecurity company optiv security inc. optiv privately owned information security company based denver colorado november 5 2014 security firms accuvant fishnet security announced would join forces create new company merger would create roughly 1.5 billion information security giant solutions covering nearly every aspect cyberdefense merger completed february 2 2015 company announced previously announced transaction closed new company owned primarily blackstone group private equity firm acquired majority stake accuvant march 2014 april 21 2015 accuvant fishnet security announced plans launch new combined corporate name brand begin conducting business optiv security summer 2015 black hat usa 2015 conference two companies announced completed merger subsequently conducting business optiv security company also launched new brand conference february 1 2017 optiv announced acquired global investment firm kkr mid-2018 optiv moved headquarters newly constructed 40-story 1144 fifteenth tower downtown denver considered primary tenant building
[ 2275, 5373 ]
Test
4,160
9
UBASIC:ubasic ubasic freeware public domain software without source code basic interpreter written yuji kida rikkyo university japan specialized mathematical computing ubasic ready-to-run language need set another advanced language common problem multi-digit math languages runs dos dos box dos shell microsoft windows etc specialized number theory primality testing factoring large integers 2600 digits implementation basic makes easy read programs without extensive study basic language structure syntax close ordinary algebra help files articles lessons beginners ubasic built-in on-line editor several aids debugging show cross references calling lines lines containing variable lists variables/arrays renumber lines change variable names append additional programs trace single step time milliseconds help determine fastest way highly repetitive sections redefine function keys either provide easy one-keypress function prevent standard function accidentally used n't shell dos execute dos command convert single-byte character set double-byte character set much use host computer would likely need aware operating system documents may added modified ubhelp.hlp primality testing aprt-cle 884 digits best run ubasic version 8.8f later 500 digits said take 5 hours pp-200 150 digits takes 16 minutes 486-100 2¼ minutes k6 233 250 digits takes 13½ minutes k6 233 recent machines 10 times faster aprt-cle often algorithm choice testing primality integers within range factoring programs ecmx quite fast find factors number digits low-20s fairly easily mid-20s somewhat less easily upper-20s lower chance success found 30-digit factor finding factors elliptic curve method always chancy larger factors greater number curves tested greater chances success number needed average one sometimes get lucky unlucky increases rapidly size factors always best use fastest machine available ecmx uses accepted standards limits stop working one curve switch next preliminary primality testing finding small factors powers interpreted allows modifying programs restarting using goto middle run even multi-day without losing accumulated data stopping recommended unless program saving data safely somewhere users forgot write way save data quitting perhaps expect find trying prove anything might lose valuable data need something else time freeze current program file later melt long lower memory configuration ubasic line numbers use indentation control structure subroutines user functions passed parameters local variables parameters passed value name user functions subroutines may passed parameters limited labels various options conditional functions users indent much needed much structure wanted spaghetti code mistake consider ubasic modern might inferred reader articles confuse indentation structure n't favor line numbers line numbers allows easy jumping intermediate point routine sometimes save duplicating lines ubasic version 8 high-precision real complex arithmetic 2600 digits prior versions adds exact rational arithmetic arithmetic single-variable polynomials complex rational modulo p coefficients well string handling limited list handling abilities also context-sensitive on-line documentation read ubhelp.doc information file uses ascii printed paper document 2005 help file many errors ten-year project rewrite/correct nearly ready publication probably late summer 2005 new help file new extension '.hlp eventually package name u3d748f* list updates available many changes remain unreported version 8.8 different precision 8.74 still commands documentation new command version 8.8c polyconv converts polynomials modulus=0 modulus=prime formatting specifications warning never test anything important might running suspended somewhere else lockups may expected particularly keyscan see freeze roll melt similar warning ubasic several types arrays logical operators bit operators 4 standard loop structures combined operators call machine language routines increased speed ecmx must know assembly language even understand instructions able write tsr debug enough ubasic used process almost kind data example .wav files process text files convert tabs spaces spaces tabs programs generate tabs actually choke early 2005 internet search turned versions 8.74 32 8.74 16 8.71 4000 16 9.0ze 9.0zc 9.0e 8.8f 32 8.8f 16 8.8f c 8.7e 32 8.7e 16 8.30 32 8.30 16 7.25 32 7.25 16 8.8a 32 8,8a 16 8.8a c 8.8c 32 8.8c 16 8.8c c 8.8e 32 8.8e 16 8.8e c 12 versions 52 known numbers many directly identified 16 32 refer number bits multiplication engine 4000 refers special versions go 4000 digits users may need one generate first 792 bernoulli numbers double index 1584 latest version get 540/1080 c cga machines versions italics recommended users would need 8.8f already using version later 8.74 especially using version later 8.7e strongly advised switch latest version 8.8f programs fancy display example written 8.74 may work 8.8f without considerable rewriting latest versions strip carriage returns/line feeds ascii files programs ubh even one 8.8f need added lines strip program written one version used another version without checking certain programs nfs run experimental version 9.** ppmpx36e version multi-polynomial quadratic sieve needs 8.8f windows versions ubasic came defective ubconst7.dat file check one supplied 8.8f identical switch obtaining latest version ubasic see external links sections many internet math pages language/packages sites following short simple program partition count function although n't many fancier structures real program invented article modern fast athlon calculate partition counts p 0 p 1000 ½ second contrast ½ century first time save result file uncomment line 40 remove leading apostrophe working continued fractions number terms limited available accuracy size term approximate formula 2 decimal fraction digit accuracy term times base ten logarithm term way work safely twice parallel initial input one dithered final several digits least 1 word two calculations give identical terms stop previous term ubasic calculate partition function p 1330521 8.74 p 1361911 4000 digit versions get many essential features consists following
[ 3718, 7691, 1805, 6797, 9997, 786, 11412, 22, 3736, 3481, 9881, 2843, 797, 3233, 11683, 5925, 8101, 4136, 10666, 8494, 303, 7343, 7983, 11315, 315, 7355, 7486, 7870, 4674, 10750, 712, 847, 1879, 92, 11229, 2915, 9188, 5733, 11243, 2541, ...
Validation
4,161
2
Swsusp:swsusp swsusp software suspend kernel feature/program part power management framework linux kernel default suspend framework kernel 3.8 swsusp helps drive system low power state called suspend actively used providing ability return state suspend called resume restore 3.8 swsusp provides following options suspend details swsusp refer kernel documentation documentation/power/swsusp.txt enable swsusp following selected kernel configuration /dev/resume_partition needs replaced actual swap partition used suspending otherwise resume=/dev/resume_partition given parameter system bootup actual suspend done may check suspend options available cat /sys/power/state depending kernel config show something similar standby mem disk options available disk viewed cat /sys/power/disk depending kernel config show something similar platform shutdown reboot swsusp lacks compression graphical progress indication provided uswsusp
[ 3082, 5139, 10780, 10785, 6180, 3109, 8242, 9266, 6213, 8268, 5222, 10856, 4207, 4734, 7812, 4238, 10382, 2195, 2711, 9882, 1694, 2723, 10933, 5815, 5822, 1736, 2762, 8909, 8410, 10971, 8928, 1761, 2278, 233, 10482, 2294, 8439, 2809, 4360, ...
Validation
4,162
2
Desktop_Cleanup_Wizard:desktop cleanup wizard desktop cleanup wizard component included microsoft windows xp operating system aims reduce clutter user desktop environment moving unused shortcuts separate directory called unused desktop shortcuts run shows list shortcuts user select shortcuts move unused desktop shortcuts directory desktop cleanup wizard works scheduled task runs day wizard run 60 days wizard displayed user desktop cleanup wizard also accessible desktop context menu arrange icons sub-menu desktop cleanup wizard scheduled task enabled disabled desktop items configuration screen available desktop tab display properties dialog box windows xp successor windows vista include desktop cleanup wizard windows 7 function integrated system maintenance wizard troubleshooting control panel
[ 8080, 5225, 6797, 7983 ]
Test
4,163
4
Spoofing_attack:spoofing attack context information security especially network security spoofing attack situation person program successfully masquerades another falsifying data gain illegitimate advantage many protocols tcp/ip suite provide mechanisms authenticating source destination message thus vulnerable spoofing attacks extra precautions taken applications verify identity sending receiving host ip spoofing arp spoofing particular may used leverage man-in-the-middle attacks hosts computer network spoofing attacks take advantage tcp/ip suite protocols may mitigated use firewalls capable deep packet inspection taking measures verify identity sender recipient message websites especially pornographic paysites allow access materials certain approved login- pages enforced checking referrer header http request referrer header however changed known referrer spoofing ref-tar spoofing allowing users gain unauthorized access materials spoofing also refer copyright holders placing distorted unlistenable versions works file-sharing networks public telephone networks often provide caller id information includes caller number sometimes caller ’ name call however technologies especially voice ip voip networks allow callers forge caller id information present false names numbers gateways networks allow spoofing public networks forward false information since spoofed calls originate countries laws receiver country may apply caller limits laws effectiveness use spoofed caller id information scam sender information shown e-mails codice_1 field spoofed easily technique commonly used spammers hide origin e-mails leads problems misdirected bounces i.e e-mail spam backscatter e-mail address spoofing done quite way writing forged return address using snail mail long letter fits protocol i.e stamp postal code smtp protocol send message done using mail server telnet geolocation spoofing occurs user applies technologies make appear located somewhere actually located common geolocation spoofing use virtual private network vpn dns proxy order user appear located different country state territory actually located according study globalwebindex 49 global vpn users utilize vpns primarily access territorially restricted entertainment content type geolocation spoofing also referred geo-piracy since user illicitly accessing copyrighted materials via geolocation spoofing technology another example geolocation spoofing occurred online poker player california used geolocation spoofing techniques play online poker new jersey contravention california new jersey state law forensic geolocation evidence proved geolocation spoofing player forfeited 90,000 winnings gps spoofing attack attempts deceive gps receiver broadcasting incorrect gps signals structured resemble set normal gps signals rebroadcasting genuine signals captured elsewhere different time spoofed signals may modified way cause receiver estimate position somewhere actually located different time determined attacker one common form gps spoofing attack commonly termed carry-off attack begins broadcasting signals synchronized genuine signals observed target receiver power counterfeit signals gradually increased drawn away genuine signals suggested capture lockheed rq-170 drone aircraft northeastern iran december 2011 result attack gps spoofing attacks predicted discussed gps community previously known example malicious spoofing attack yet confirmed proof-of-concept attack successfully performed june 2013 luxury yacht white rose drachs misdirected spoofed gps signals group aerospace engineering students cockrell school engineering university texas austin students aboard yacht allowing spoofing equipment gradually overpower signal strengths actual gps constellation satellites altering course yacht june 2017 approximately twenty ships black sea complained gps anomalies showing vessels transpositioned miles actual location professor todd humphreys believed likely spoofing attack gps anomalies around putin palace moscow kremlin led researchers believe russian authorities use gps spoofing wherever vladimir putin located affecting maritime traffic since advent software defined radio gps simulator applications made available general public made gps spoofing much accessible meaning performed limited expense modicum technical knowledge different ways prevent gps spoofing department homeland security collaboration national cybersecurity communications integration center nccic national coordinating center communications ncc released paper lists methods prevent type spoofing important recommended use installation operation strategies development opportunities described herein significantly enhance ability gnss receivers associated equipment defend range interference jamming spoofing attacks
[ 513, 2947, 7044, 262, 138, 8202, 10378, 13, 8333, 3473, 4863, 5373, 794, 11170, 8998, 3495, 10790, 939, 11052, 6013, 1070, 10417, 9909, 953, 5433, 62, 7102, 2240, 4032, 6466, 9024, 7364, 10309, 2558, 9160, 4689, 4945, 8667, 4956, 7644, ...
Test
4,164
3
180_(video_game):180 video game 180 darts video game released zx spectrum commodore 64 amstrad cpc atari 8-bit family msx player competes 501 darts darts players waiting championship tournament normal darts rules applying subtracting score 501 zero whilst finishing double beginning quarter finals player must win best three match advance tournament win another match semi final stage advance final face world champion jammy jim final match however player needs win one leg win tournament players also compete another human player play round clock throwing darts around dartboard 20 1 within time limit total eight computer-controlled opponents game start match computer randomly selects opponent though jammy jim played final opponents del boy desmond sure shot sidney devious dave limp wrist larry beer belly bill mega mick tactical tel jammy jim time release ratings game favourable spectrum version got 72 rating crash magazine labelled best darts game ever commodore 64 version received 70 rating zzap magazine amstrad version got rating 67 amstrad action game reviewed sinclair user rated game 5 5 stating darts ought boring tedious 180 made funny exciting impressive closet hit game reviewed sinclair rated game 9 10 stating presentation 180 veer toward macho crafty cockney bristow school darts rather gentleman john lowe otherwise little quibble winner across board game reviewed ace stating definitive computer darts game must play arrows micro one get
[ 10931, 9006 ]
None
4,165
4
Rogue_security_software:rogue security software rogue security software form malicious software internet fraud misleads users believing virus computer pay money fake malware removal tool actually introduces malware computer form scareware manipulates users fear form ransomware rogue security software serious security threat desktop computing since 2008 two earliest examples gain infamy addestroyer virtualbouncer often bundled back 2004 rogue security software mainly relies social engineering fraud defeat security built modern operating system browser software install onto victims computers website may example display fictitious warning dialog stating someone machine infected computer virus encourage manipulation install purchase scareware belief purchasing genuine antivirus software trojan horse component users misled installing trojan may disguised rogue security software however propagate onto users computers drive-by downloads exploit security vulnerabilities web browsers pdf viewers email clients install without manual interaction recently malware distributors utilizing seo poisoning techniques pushing infected urls top search engine results recent news events people looking articles events search engine may encounter results upon clicked instead redirected series sites arriving landing page says machine infected pushes download trial rogue program 2010 study google found 11,000 domains hosting fake anti-virus software accounting 50 malware delivered via internet advertising cold-calling also become vector distribution type malware callers often claiming microsoft support another legitimate organization black hat search engine optimization seo technique used trick search engines displaying malicious urls search results malicious webpages filled popular keywords order achieve higher ranking search results end user searches web one infected webpages returned usually popular keywords services google trends used generate webpages via php scripts placed compromised website php scripts monitor search engine crawlers feed specially crafted webpages listed search results user searches keyword images clicks malicious link redirected rogue security software payload websites usually employ third-party services advertising webpages one advertising services compromised may end inadvertently infecting websites using service advertising rogue security software spam messages include malicious attachments links binaries drive-by download sites another common mechanism distributing rogue security software spam emails often sent content associated typical day-to-day activities parcel deliveries taxation documents designed entice users click links run attachments users succumb kinds social engineering tricks quickly infected either directly via attachment indirectly via malicious website known drive-by download usually drive-by download attacks malware installed victim machine without interaction awareness occurs simply visiting website desktop pop-ups pop-under longer regular feature operating systems computer attacked popups appears even user active computer definite red flag installed rogue security software may attempt entice user purchasing service additional software developers rogue security software may also entice people purchasing product claiming give portion sales charitable cause rogue green antivirus example claims donate 2 environmental care program sale made rogue security software overlaps function scareware also sanction ftc increasing effectiveness anti-malware tools since 2006 made difficult spyware adware distribution networks—already complex begin with—to operate profitably malware vendors turned instead simpler profitable business model rogue security software targeted directly users desktop computers rogue security software often distributed highly lucrative affiliate networks affiliates supplied trojan kits software paid fee every successful installation commission resulting purchases affiliates become responsible setting infection vectors distribution infrastructure software investigation security researchers antivirus xp 2008 rogue security software found affiliate network members grossing commissions upwards usd150,000 10 days tens thousands successful installations law enforcement legislation countries slow react appearance rogue security software even though simply uses new technical means carry mainly old well-established kinds crimes contrast several private initiatives providing discussion forums lists dangerous products founded soon appearance first rogue security software reputable vendors kaspersky also began provide lists rogue security software 2005 anti-spyware coalition founded coalition anti-spyware software companies academics consumer groups many private initiatives first less informal discussions general internet forums started even entirely carried individual people perhaps famous extensive one spyware warrior list rogue/suspect antispyware products websites eric howes however updated since may 2007 website recommends checking following websites new rogue anti-spyware programs however really new simply re-branded clones knockoffs rogue applications around years december 2008 us district court maryland—at request ftc—issued restraining order innovative marketing inc kiev-based firm producing marketing rogue security software products winfixer winantivirus drivecleaner errorsafe xp antivirus company us-based web host bytehosting internet hosting services llc assets frozen barred using domain names associated products advertisement false representation law enforcement also exerted pressure banks shut merchant gateways involved processing rogue security software purchases cases high volume credit card chargebacks generated purchases also prompted processors take action rogue security software vendors
[ 3072, 5636, 10245, 10756, 9227, 9233, 9242, 9761, 9256, 9771, 46, 10297, 3643, 7739, 9791, 1088, 9287, 107, 10872, 5245, 6786, 5764, 7304, 9356, 10898, 4245, 10392, 1690, 3739, 5281, 2213, 681, 8387, 4314, 224, 4344, 3320, 4863, 1279, 333...
None
4,166
8
NetDynamics_Application_Server:netdynamics application server netdynamics application server early java-based integrated software platform product developed netdynamics silicon valley start-up company founded 1995 zack rinat ofer ben-shachar unlike early application server competitors netdynamics chose java development language platform java became dominant development language web-based applications netdynamics experienced significant revenue growth 1997 1998 however product soon encountered problems due relative immaturity java rush release new product versions rapidly changing marketplace believing new jdbc api immature netdynamics created proprietary database development api based product rogue wave software netdynamics inc. acquired sun microsystems july 1998 application server software together netscape application server basis sun iplanet application server offering netdynamics initially competed bluestone application server based c programming language kiva application server mid-1998 new competitor weblogic inc. released java application server compliant jdbc another emerging standard javabeans weblogic application server eventually marketplace explosive growth application server business caught attention larger information technology companies 1998 early application server start-up companies acquired hewlett-packard purchased bluestone sun microsystems acquired netdynamics netscape communications corporation bought kiva weblogic acquired bea systems weblogic continues survive product oracle corporation acquired bea 2008 product renamed oracle weblogic
[ 9665, 5384, 5612, 5677, 7983, 4189, 4222 ]
Test
4,167
8
Conversion_funnel:conversion funnel conversion funnel phrase used e-commerce describe journey consumer takes internet advertising search system navigating e-commerce website finally converting sale metaphor funnel used describe way users guided goal fewer navigation options step using metaphor advertising efforts aimed upper funnel middle funnel lower funnel potential customers typically large number customers search product/service register page view referring page linked e-commerce site banner ad ad network conventional link small proportion seeing advertisement link actually click link metric used describe ratio click-through rate ctr represents top level funnel typical banner advertising click-through rates 0.02 late 2010 decreased past three years click-through rates highly sensitive small changes link text link size link position many others effects interact cumulatively process understanding creative material brings highest click-through rate known ad optimization link clicked visitor referring page enters e-commerce site small proportion visitors typically proceed product pages creating constriction metaphorical funnel step visitor takes reduces number visitors typically 30 –80 per page adding product shopping cart registering filling contact details payment reduce numbers step-by-step cumulatively along funnel steps fewer visitors get becoming paying customers reason sites similar pricing products hugely different conversion rates visitors customers therefore greatly differing profits
[ 8914, 11578, 3782, 5150 ]
Test
4,168
4
Cyber_Threat_Intelligence_Integration_Center:cyber threat intelligence integration center cyber threat intelligence integration center ctiic new united states federal government agency fusion center existing agencies private sector real-time use cyber attacks ctiic created due blocked efforts congress stymied liability privacy concerns citizens ctiic formally announced lisa monaco february 10 2015 wilson center agency within office director national intelligence tonya ugoretz br january 7 2016 march 13 2019 erin joe march 13 2019 present
[ 3759, 7887, 3495 ]
Test
4,169
1
Postcode_Plants_Database:postcode plants database postcode plants database uk resource identifying locally native plants species based postcode hosted natural history museum london used determine plant conservation schemes also information relationships plants associated animals
[]
Test
4,170
6
Archive_bit:archive bit archive bit file attribute used cp/m microsoft operating systems os/2 amigaos used indicate whether file backed archived windows os/2 file created modified archive bit set i.e turned file backed archive bit cleared i.e turned thus meaning archive bit file archived cp/m meaning inverted creating modifying file clears archive bit bit set file backed incremental backup task may use archive bit distinguish files already backed select new modified files backup backup software may provide option full backup clearing archive bits – back files regardless archive bit status clear archive bit files processed backup allows creation initial full backup supplemented incremental backups future operating system never clears archive bit unless explicitly told user even user explicitly tells operating system copy file purpose archiving archive bit still cleared specific command clearing setting bit must executed ms-dos well nearly versions windows archive bit status viewed changed attrib command-line utility viewing properties file windows shell windows explorer archive bit status also viewed changed getfileattributes getfileattributesex setfileattributes windows apis archive bit set cleared attributes property vbscript jscript file clear archive bit moved one place file system another archive bit reverts set typically computer system never backed manner clears archive bits files computer archive bits set applications make use archive bits without user request archive bit file attribute part file contents file remain unchanged status archive bit changes relying archive bit backing files unreliable multiple backup programs setting clearing archive bit volume another possibility use timestamp last change file directory typically technique used unix-like operating systems
[ 9025, 9762, 11683, 5158, 3366, 5225, 6797, 8301, 9166, 9840, 4051, 5492, 10711, 4409, 603 ]
Test
4,171
7
Aptana:aptana aptana inc. company makes web application development tools use variety programming languages javascript ruby php python aptana main products include aptana studio aptana cloud aptana jaxer aptana studio open-source integrated development environment ide building web applications based eclipse supports javascript html dom css code-completion outlining javascript debugging error warning notifications integrated documentation additional plugins allow aptana studio support ruby rails php python perl adobe air apple iphone nokia wrt web runtime aptana studio available standalone windows mac os x linux plugin eclipse aptana studio 3 provides following support php application development 2.0 version aptana provide php plugin transferred development efforts pdt project aptana version 1.5 provided support developing php applications via add-on php plugin included aptana studio supports ruby rails development using radrails open source plugin ruby rails framework includes aptana studio provides support python form pydev plugin provides following advantages aptana announced previously commercial pydev extensions open sourced aptana ide provides considerable support adobe air nokia web runtime provides support developing rich mobile apps nokia s60 series phones includes 30 models tens millions units use around world nokia wrt plug-in aptana studio provides features enable creation editing testing deployment wrt widgets within aptana studio wrt widgets small task-focused web applications installed run way s60 applications wrt widgets allow websites web services optimised use s60 devices easy develop use wrt widgets ideal driving traffic website s60 devices aptana studio comes following javascript libraries added updated desired code assist similar completing code statements presenting pop-up either applies built-in functions/methods already coded — latter use requires documenting functions/methods scriptdoc documentation dialect similar used javadoc code assist feature includes information browser support javascript methods/properties html elements css properties support uploading downloading synchronization using ftp sftp pro community editions support integrated javascript debugging firefox internet explorer supported pro edition aptana studio available open source community edition previously available features paid-for pro edition merged community edition features pro part standard community edition studio thus aptana ceased exist multiple edition ide aptana uses dual licensing model model users may choose use aptana ide free software/open source gnu general public license commonly known gpl aptana public license known apl gpl license aptana ide available free charge long redistribution aptana ide adheres terms gpl license users may download software free modify integrate distribute aptana also offers simplified apl license organizations n't need redistribute aptana studio derivatives outside company aptana currently led paul colton founder ceo uri sarid cto/vp engineering kevin hakman director evangelism staff headcount surpassed 25 september 1 2008 aptana active participant openajax alliance hakman serving director ide working group aptana acquired appcelerator inc. january 7 2011 employees aptana absorbed mountain view campus appcelerator work scheduled continue release aptana 3.0 appcelerator webcast made users aware intention integrate mobile application framework aptana studio planned beta within q1 2011 emphasis visual workflow indicated products continued support continue existing aptana products appcelerator put jaxer github aptana jaxer made obsolete node.js open-source ajax web server building rich web pages applications using unified ajax model wherein client-side server-side code written javascript jaxer server-side engine based mozilla gecko browser engine used firefox mozilla engine allows jaxer provide server-side dom page may manipulated server-side processing using techniques familiar client-side programmers jaxer server-side javascript apis enable database access file system access network communications user sessions functions typical web application servers jaxer also provides access java objects via open source dwr project jaxer github aptana jaxer provides page-processing environment based mozilla engine provides gecko-based dom spidermonkey javascript engine allow pages rendered manipulated server sent browser jaxer also provides ajax model performing asynchronous requests server client server apis allow requests made simply calling server-side javascript functions client behind scenes jaxer provides logic required manage request retrieve response server useful web scraping jaxer standalone web server works another server apache jetty tomcat jaxer provides server-side dom api processing pages served web server delivering results browser jaxer may integrated aptana studio via optional plugin open source gpl available windows mac os x linux/solaris november 2009 aptana significantly scaled back development support jaxer aptana representative noted n't sufficient adoption make money earning proposition aptana cloud connect aptana web hosting application management service cloud connect provides infrastructure required host applications developed using technologies supported aptana studio primarily based apache support general web/ajax php ruby rails jaxer cloud connect also supports java-based web applications may deployed managed using cloud service applications hosted cloud connect may developed offline deployed managed directly using cloud management features included aptana studio cloud connect service also provides team management hosted source control using subversion remote editing/preview application synchronization local staging production environments
[ 1034, 6154, 9245, 5677, 84, 6231, 603, 11357, 2658, 7785, 3583, 7293, 1668, 6791, 6797, 8854, 1687, 10910, 3761, 7346, 11446, 7355, 190, 5311, 7871, 6338, 7364, 4822, 8923, 225, 7396, 10478, 10991, 11503, 4853, 6910, 259, 1802, 10507, 437...
None
4,172
3
HyperSPARC:hypersparc hypersparc code-named pinnacle microprocessor implements sparc version 8 instruction set architecture isa developed ross technology cypress semiconductor hypersparc introduced 1993 competed sun microsystems supersparc raju vegesna microarchitect hypersparc sun microsystem primary competitor mid-1990s fujitsu acquired ross cypress hypersparc considered important new owner sparc64 developed hal computer systems also fujitsu subsidiary view shared analysts hypersparc two-way superscalar microprocessor four execution units integer unit floating-point unit load/store unit branch unit hypersparc on-die 8 kb instruction cache two instructions fetched per cycle decoded decoder could decode new instructions previously decoded instructions issued execution units integer register file contained 136 registers providing eight register windows feature defined sparc isa two read ports integer unit four-stage pipeline two stages added pipeline would equal non-floating-point pipelines integer multiply divide instructions added v8 version sparc architecture 18- 37-cycle latency respectively stalled pipeline completed microprocessor supported multiprocessing mbus systems hypersparc consists 1.2 million transistors fabricated cypress 0.65 µm two-layer metal complementary metal–oxide–semiconductor cmos process later iterations hypersparc transistors due new features ported newer processes fabricated fujitsu except last iteration fabricated nec hypersparc multi-chip design packaged ceramic multi-chip module mcm pin grid array pga hypersparc used cypress sparcset chipset introduced late july 1992 developed santa clara california start-up nimbus technologies inc. cypress fabricated design sparcset also compatible sparc microprocessors
[ 9665, 11426, 8355, 9955, 3175, 5358, 1776, 9137, 7770, 630, 1399, 10837, 11129, 1818, 6815 ]
Test
4,173
2
Microsoft_Windows_library_files:microsoft windows library files microsoft windows operating system supports form shared libraries known dynamic-link libraries code libraries used multiple processes one copy loaded memory article provides overview core libraries included every modern windows installation top windows applications built hal.dll kernel-mode library file used user-mode program ntdll.dll used programs dependency win32 libraries used programs windows hardware abstraction layer hal implemented hal.dll hal implements number functions implemented different ways different hardware platforms context refers mostly chipset components operating system call functions way platforms without regard actual implementation example responding interrupt quite different machine advanced programmable interrupt controller apic one without hal provides single function purpose works kinds interrupts various chipsets components need concerned differences hal loaded kernel address space runs kernel mode routines hal called directly applications user mode apis correspond directly hal routines instead hal provides services primarily windows executive kernel kernel mode device drivers although drivers hardware contained files commonly file type .sys core drivers compiled hal.dll kernel mode device drivers devices buses pci pci express directly call routines hal access i/o ports registers devices drivers use hal routines different platforms may require different implementations operations hal implements operations appropriately platform driver executable file used platforms using cpu architecture driver source file portable across architectures x86 systems several different hal files installation media windows installation procedure determines ones appropriate current platform copies hard drive renaming hal.dll necessary among criteria selection presence acpi-compatible bios presence apic whether multiple processors present enabled multiple cores multi-core cpu even logical processors implemented hyperthreading cpu count processors purpose x86-64 itanium platforms one possible hal.dll cpu architecture ntdll.dll exports windows native api native api interface used user-mode components operating system must run without support win32 api subsystems api implemented ntdll.dll upper edge ntoskrnl.exe variants majority exported symbols within libraries prefixed nt example ntdisplaystring native apis also used implement many kernel apis base apis exported kernel32.dll large majority windows applications call ntdll.dll directly applications linked directly library said use native subsystem primary reason existence perform tasks must run early system startup sequence win32 subsystem available obvious important example creation win32 subsystem process csrss.exe csrss.exe process exists win32 processes may created therefore process creates smss.exe session manager must use native subsystem csrss.exe application despite .exe file extension native applications executed user program win32 subsystems example autochk.exe binary runs chkdsk system initialization blue screen prominent examples services implement various subsystems csrss.exe unlike win32 applications native applications instantiate within kernel runtime code ntoskrnl.exe must different entry point ntprocessstartup rather w win maincrtstartup found win32 application obtain command-line arguments via pointer in-memory structure manage memory using rtl heap api win32 heap apis wrappers around—no real difference return execution call ntterminateprocess opposed exitprocess common library linked native applications nt.lib contains startup code native applications similar c runtime provides startup code win32 apps though api undocumented native applications built using windows driver development kit many antivirus software utility software vendors incorporate native applications within products usually perform boot-time task carried userspace libraries section implement various subsets win32 api kernel32.dll exposes applications win32 base apis memory management input/output i/o operations process thread creation synchronization functions many implemented within kernel32.dll calling corresponding functions native api exposed ntdll.dll gdi32.dll exports graphics device interface gdi functions perform primitive drawing functions output video displays printers used example xp version paint applications call gdi functions directly perform low-level drawing line rectangle ellipse text output font management similar functions initially gdi supported 16 256 color ega/vga display cards monochrome printers functionality expanded years includes support things like truetype fonts alpha channels multiple monitors user32.dll implements windows user component creates manipulates standard elements windows user interface desktop windows menus thus enables programs implement graphical user interface gui matches windows look feel programs call functions windows user perform operations creating managing windows receiving window messages mostly user input mouse keyboard events also notifications operating system displaying text window displaying message boxes many functions user32.dll call upon gdi functions exported gdi32.dll actual rendering various elements user interface types programs also call gdi functions directly perform lower-level drawing operations within window previously created via user32 functions comctl32.dll implements wide variety standard windows controls file open save save dialogs progress bars list views calls functions user32.dll gdi32.dll create manage windows ui elements place various graphic elements within collect user input comdlg32.dll common dialog box library implements wide variety windows dialog boxes intended perform microsoft deems 'common application tasks starting release windows vista microsoft considers open save dialog boxes provided library deprecated replaced 'common item dialog api ws2_32.dll implements winsock api provides tcp/ip networking functions provides partial broken compatibility network apis wsock.dll wsock32.dll older versions win3.11 win95 compatibility advapi32.dll provides security calls functions manipulating windows registry netapi32.dll provides functions querying managing network interfaces ole32.dll provides component object model well object linking embedding shscrap.dll part object linking embedding ole mechanism implements support shell scrap files automatically created drag selected content ole-capable application explorer window desktop also use object packager create dragged another ole-capable application functionality removed windows vista therefore later versions improve security rid operating system generally unused functionality scrap .shs files used viruses contain wide variety files including executable code file extension shown even hide file extensions known file types disabled functionality restored copying registry entries dll windows xp system winmm.dll provides access original winmm audio api imm32 responsible invoking interacting input method editor msvcrt.dll c standard library visual c++ msvc compiler version 4.2 6.0 provides programs compiled versions msvc standard c library functions include string manipulation memory allocation c-style input/output calls others msvcp*.dll corresponding c++ library shipped windows versions since windows 95 osr2 use windows components earlier versions shipped crtdll.dll library instead older versions windows programs linked msvcrt.dll expected install compatible copy system32 folder contributed dll hell many installers failed check library version installed version replacing versions msvc 4.0 7.0 13.0 used differently named dlls version msvcr20.dll msvcr70.dll msvcr71.dll msvcp110.dll etc. applications required install appropriate version microsoft offers visual c++ redistributable packages purpose though windows typically comes one version already installed version 14.0 c/c++ runtime moved new dll ucrtbase.dll however c/c++ programs using ucrtbase.dll forced link another new dll vcruntime whose name continues change version msvc e.g vcruntime140.dll source code runtime libraries included visual c++ reference debugging e.g codice_1 runtime library used programs written visual c++ compilers e.g mingw compilers runtime libraries programs written c visual basic.net c++/cli .net languages require .net framework many libraries one mscorlib.dll multilanguage standard common object runtime library formerly microsoft common object runtime library so-called assemblies e.g system.windows.forms.dll
[ 11270, 6664, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 2605, 5165, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4174, 9808, 4178, 10839, 603, 9819, 1632, 3170, 622, 9839, 4210, 7796, 1656, 6265, 5754, 4731, 7290, 10879, 8...
None
4,174
2
Windows_Installer:windows installer windows installer previously known microsoft installer codename darwin software component application programming interface api microsoft windows used installation maintenance removal software installation information optionally files packaged installation packages loosely relational databases structured com structured storages commonly known msi files default filename extensions windows installer contains significant changes predecessor setup api new features include gui framework automatic generation uninstallation sequence windows installer positioned alternative stand-alone executable installer frameworks older versions installshield nsis introduction windows store microsoft encouraged third parties use windows installer basis installation frameworks synchronize correctly installers keep internal database installed products consistent important features rollback versioning depend consistent internal database reliable operation furthermore windows installer facilitates principle least privilege performing software installations proxy unprivileged users package describes installation one full products universally identified guid product made components grouped features windows installer handle dependencies products single installed working program set programs product product identified unique guid productcode property providing authoritative identity throughout world guid combination version number productversion property allows release management product files registry keys package includes package logic metadata relates package executes running example changing exe file product may require productcode productversion changed release management however merely changing adding launch condition product remaining exactly previous version would still require packagecode change release management msi file feature hierarchical group components feature may contain number components sub-features smaller packages consist single feature complex installers may display custom setup dialog box user select features install remove package author defines product features word processor example might place program core file one feature program help files optional spelling checker stationery modules additional features component basic unit product component treated windows installer unit installer install part component components contain program files folders com components registry keys shortcuts user directly interact components components identified globally guids thus component shared among several features package multiple packages ideally use merge modules key path specific file registry key odbc data source package author specifies critical given component file common type key path term key file commonly used component contain one key path component explicit key path component destination folder taken key path msi-based program launched windows installer checks existence key paths mismatch current system state value specified msi package e.g. key file missing related feature re-installed process known self-healing self-repair two components use key path user interface phase typically queries target system displays installation wizard enables user change various options affect installation however user interface sequence make changes system following reasons user clicks install button typical msi installation wizard installation proceeds execute phase software components actually installed execute phase makes system changes display user interface elements execute phase happens two steps installation operations transactional words operation windows installer performs generates equivalent undo operation would revert change made system case script action fails deferred execution operation cancelled user actions performed point rolled back restoring system original state standard windows installer actions automatically write information rollback script package authors create custom actions change target system also create corresponding rollback actions well uninstall actions uninstallation-rollback actions design feature applied correctly mechanism also roll back failed uninstall application good working state windows installer advertise product rather actually install product appear installed user actually installed run first time triggering entry point means start menu shortcut opening document product configured handle invoking advertised com class package advertised administrator using group policy deployment mechanism running msiexec executable /jm per-machine advertisement /ju per-user advertisement switch msi packages authored installshield may prevent use native msi features user must administrator privileges complete advertised installation similar advertising installs feature soon user tries use administrative installation creates uncompressed source image product typically used installing running application network location administrative installation typical installation create shortcuts register com servers create add remove programs entry often administrative installation enables user install product way features run uncompressed installation source administrative installations also useful creating windows installer patch requires uncompressed images earlier current versions product order compute binary file differences administrative installation performed running msiexec executable /a switch developer installer package may write code serve purpose delivered dll exe vbscript javascript executed installation sequences including user clicks button user interface installexecutesequence custom actions typically validate product license keys initialize complex services developers normally provide inverse custom actions use uninstall msiexec provides way break loading specified custom action dll invoking action windows installer package may contain another package installed time ideally provided .msm file component may also separate executable program unpacked installer package installexecutesequence run immediately file optionally deleted end installexecutesequence ideal using older installers .msm file component called microsoft merge module utilized single integrate common components contains images tables relevant information regarding common components ready-made merge modules supplied visual studio downloaded alternative sources windows installer 4.0 shipped windows vista incorporates capabilities take advantage user account control feature application install without elevated privileges msi package marked thus allowing install without prompting user administrator credentials windows installer also works conjunction restart manager installing updating application system component full user interface mode user displayed list affected applications shut restarted files updated installer actions running silent mode perform application restarts automatically system services tray applications also restarted manner creating installer package new application trivial necessary specify files must installed registry keys non-standard operations done using custom actions typically developed dlls number commercial freeware products assist creating msi packages including visual studio vs 2010 installshield wix varying degrees user interface behavior may configured use less common situations unattended installation prepared installer package compiled reading instructions files developer local machine creating .msi file user interface dialog boxes presented start installation changed configured setup engineer developing new installer limited language buttons text fields labels arranged sequence dialogue boxes installer package capable running without ui called unattended installation microsoft provides set internal consistency evaluators ice used detect potential problems msi database ice rules combined cub files stripped-down msi files containing custom actions test target msi database contents validation warnings errors ice validation performed platform sdk tools orca msival2 validation tools ship various authoring environments example ice rules addressing ice validation warnings errors important step release process october 2018 microsoft released msix packaging tool successor msi
[ 10243, 11270, 2568, 5643, 4624, 6674, 1043, 9234, 537, 8729, 540, 3102, 1055, 6686, 9762, 2083, 8227, 8740, 1577, 3114, 10281, 2095, 4143, 9263, 9780, 2101, 6709, 8246, 10812, 3648, 10817, 9286, 10310, 1098, 3659, 7754, 4173, 10317, 10828, ...
None
4,175
3
Compaq_Presario_1700:compaq presario 1700 compaq presario 1700 notebook pc first manufactured compaq 1999 notable intel processors 8 mb 8 mib mobility rage m1 graphics chip relatively large screen coupled thin light casing allowed balance power portability especially given quoted 3 hour battery life made notebook especially popular business users inclusion ati rage m1 graphics chip allowed 1700 compete closely high-end notebooks higher price ranges heightened attraction business market system could comfortably run high-demand applications relative ease lightweight portable form
[ 6765, 799 ]
Validation
4,176
7
Veeva_Systems:veeva systems veeva systems inc. cloud-computing company focused pharmaceutical life sciences industry applications headquartered pleasanton california founded 2007 peter gassner matt wallach works software service global life science industry company went public 2013 march 28 2018 market capitalization usd 10 billion 2015 veeva acquired zinc ahead content management software company
[ 4194, 467 ]
Validation
4,177
2
Luis_Villa:luis villa luis villa american attorney programmer worked deputy general counsel senior director community engagement wikimedia foundation previously attorney mozilla worked revision mozilla public license mpl continued work next job greenberg traurig part team defending google oracle claims concerning android prior graduating columbia law school 2009 employee ximian acquired novell 2003 spent year senior geek residence harvard berkman center internet society working stopbadware.org elected four times board gnome foundation editor-in-chief columbia science technology law review blogs regularly director open source initiative april 2012 march 2015
[ 1026, 11394, 2955, 5644, 6413, 4367, 8848, 657, 9872, 1939, 3859, 2581, 3478, 10255, 6808, 10642, 7450, 1822, 6302, 7584, 802, 5410, 6691, 6947, 6694, 8354, 8104, 5931, 8364, 8621, 9908, 1717, 823, 2109, 11069, 10687, 3649, 708, 10822, 30...
None
4,178
2
Windows_Display_Driver_Model:windows display driver model windows display driver model wddm graphic driver architecture video card drivers running microsoft windows versions beginning windows vista replacement previous windows 2000 windows xp display driver model xddm/xpdm aimed enabling better performance graphics new graphics functionality stability display drivers windows vista windows 7 choose either adhere wddm xddm removal xddm windows 8 however wddm became option wddm provides functionality required render desktop applications using desktop window manager compositing window manager running top direct3d also supports new dxgi interfaces required basic device management creation wddm specification requires least direct3d 9-capable video card display driver must implement device driver interfaces direct3d 9ex runtime order run legacy direct3d applications may optionally implement runtime interfaces direct3d 10 higher wddm drivers enable new areas functionality uniformly provided earlier display driver models include context graphics virtualization means individual processes user mode see memory adjacent processes even means insertion forged commands command stream wddm drivers allow video memory virtualized video data paged video memory system ram case video memory available turns insufficient store video data textures currently unused data moved system ram disk swapped data needed fetched back virtualization could supported previous driver models xp driver model extent responsibility driver instead handled runtime level runtime handles scheduling concurrent graphics contexts list commands put queue execution gpu preempted runtime critical task arrives begun execution differs native threads cpu one task interrupted therefore take longer necessary make computer appear less responsive hybrid scheduling algorithm native light threads cooperation threads would achieve seamless parallelism important note scheduling new concept previously responsibility individual driver developers wddm attempts unify experience across different vendors controlling execution gpu tasks direct3d graphics surface memory area contains information textured meshes used rendering 2d 3d scene wddm allows direct3d surfaces shared across processes thus application incorporate mesh created another application scene rendering sharing textures processes wddm difficult would required copying data video memory system memory back video memory new device wddm driver hangs encounters fault graphics stack restart driver graphics hardware fault intercepted necessary driver reset drivers windows xp free deal hardware faults saw fit either reporting user attempting recover silently wddm driver hardware faults cause driver reset user notified popup unifies behavior across vendors previous drivers fully implemented kernel mode whereas wddm implemented partly user mode user mode area fails unrecoverable error cause application quit unexpectedly instead producing blue screen error would previous driver models wddm also allows graphics hardware reset users update drivers without requiring reboot new driver model requires graphics hardware shader model 2.0 support least since fixed function pipeline translated 2.0 shaders however according microsoft 2009 1–2 percent hardware running windows vista used xddm rest already wddm capable also requires hardware features consequently sm 2.0-supporting hardware intel gma 900 fails wddm certification one limitations wddm driver model version 1.0 support multiple drivers multi-adapter multi-monitor setup multi-monitor system one graphics adapter powering monitors adaptors must use wddm driver one driver used windows disable one wddm 1.1 limitation wddm 1.0/1.1 allow modes previously handled driver spanning mode stretching desktop across two monitors although dual view still available one chief scenarios windows display driver model enables desktop window manager since desktop application windows managed dwm direct3d applications number open windows directly affects amount video memory required limit number open windows video memory available may prove insufficient necessitating virtualization window contents dwm composes final desktop generated different processes cross-process surface sharing necessary also directx applications running alongside dwm dwm-managed desktop must able access gpu shared manner necessitating scheduling though true microsoft implementation composited desktop windows vista hand composited desktop need theoretically require new display driver model work expected successful implementations composited desktops done windows vista platforms quartz compiz windowfx approach microsoft attempted try make sure wddm unified experience across different gpus multiple vendors standardizing features performance software features missing driver models could made immaterial extensions less restrictive simply different driver model place windows vista introduced wddm 1.0 new display driver architecture designed better performing reliable support new technologies including hdcp hybrid sleep combines hibernation sleep mode functionality enhanced stability event power failure also requires wddm windows 7 supports major additions wddm known wddm 1.1 details new version unveiled winhec 2008 new features include hardware acceleration gdi direct2d/directwrite operations helps reduce memory footprint windows 7 dwm compositing engine longer needs keep system memory copy surfaces used gdi/gdi+ windows vista dxgi 1.1 direct3d 11 direct2d directwrite made available windows vista platform update however gdi/gdi+ vista continues rely software rendering desktop window manager continues use direct3d 9ex wddm 1.1 drivers backward compatible wddm 1.0 specification 1.0 1.1 drivers used windows vista without platform update windows 8 includes wddm 1.2 dxgi 1.2 new features first previewed build 2011 conference include performance improvements well support stereoscopic 3d rendering video playback major features include preemptive multitasking gpu finer granularity dma buffer primitive triangle pixel instruction-level reduced memory footprint improved resource sharing faster timeout detection recovery 16-bit color surface formats 565 5551 4444 mandatory windows 8 direct3d 11 video supports yuv 4:4:4/4:2:2/4:2:0/4:1:1 video formats 8 10 16-bit precision well 4 8-bit palettized formats wddm 1.2 supports display-only render-only wddm drivers microsoft basic display driver warp-based microsoft basic render driver replaced kernel-mode vga driver wddm 1.0/1.1 allows rudimentary task scheduling using batch queue granularity improvements multitasking well fast context switching support virtual memory initially expected versions tentatively named wddm 2.0 wddm 2.1 announced winhec 2006 windows 8.1 includes wddm 1.3 dxgi 1.3 new additions include ability trim dxgi adapter memory usage multi-plane overlays overlapping swap chains swap chain scaling select backbuffer subregion swap chain lower-latency swap chain presentation driver feature additions include wireless displays miracast yuv format ranges cross-adapter resources gpu engine enumeration capabilities graphics kernel performance improvements windows 10 includes wddm 2.0 designed dramatically reduce workload kernel-mode driver gpus support virtual memory addressing allow multithreading parallelism user-mode driver result lower cpu utilization windows 10 also includes dxgi 1.4 direct3d 12 api announced build 2014 requires wddm 2.0 new api away automatic resource-management pipeline-management tasks allow developers take full low-level control adapter memory rendering states display driver model windows 8.1 windows phone converged unified model windows 10 new memory model implemented gives gpu per-process virtual address space direct addressing video memory still supported wddmv2 graphics hardware requires considered legacy case ihvs expected develop new hardware supports virtual addressing significant changes made ddi enable new memory model windows 10 anniversary update version 1607 includes wddm 2.1 supports shader model 6.0 mandatory feature levels 12_0 12_1 dxgi 1.5 supports hdr10 10-bit high dynamic range wide gamut format defined itu-t rec 2100/rec.2020 variable refresh rates windows 10 creators update version 1703 includes wddm 2.2 tailored virtual augmented mixed reality stereoscopic rendering windows mixed reality platform dxgi 1.6 windows 10 fall creators update version 1709 includes wddm 2.3 following list new features windows display driver development windows 10 version 1709 windows 10 april 2018 update version 1803 includes wddm 2.4 following updates display driver development windows 10 version 1803 since introduction windows 10 april 2018 update due changes wddm became possible use dual graphics laptops example allows run programs games powerful video card display image via built-in graphics directly internal pci-e external bus without connect monitor powerful video card also act solution problem vga video output video card present motherboard windows 10 october 2018 update version 1809 includes wddm 2.5 updates display driver development windows 10 version 1809 include following windows 10 may 2019 update version 1903 includes wddm 2.6 super-wet ink feature revolves around front-buffer rendering ihv drivers support creation “ displayable ” textures formats modes supported hardware allocating texture app requested along “ shadow ” texture format/layout displayed copying two present-time “ shadow ” may necessarily texture normal way think may compression data additionally may required exist may optimization instead runtime evolve understand aspects displayable surfaces whether shadow must exist display particular vidpnsource/plane whether optimal shadow exist transfer contents application surface shadow surface runtime explicit operation opposed implicit within present request setting mode dynamically flipping original shadow surfaces scanout may begin shortly vblank scans vertically top bottom image completes shortly next vblank always case depending timing pixel clock layout data texture especially actually compression available new ddis added separate understand transformations occur prior scanout order possible enable front-buffer rendering variable rate shading coarse pixel shading mechanism enable allocation rendering performance/power varying rates across rendered images previous model order use msaa multi-sample anti-aliasing reduce geometric aliasing amount reduce geometric aliasing needs known up-front target allocated amount reduce geometric aliasing ’ changed target allocated wddm 2.6 new model extends msaa opposite coarse pixel direction adding new concept coarse shading shading performed frequency coarser pixel group pixels shaded single unit result broadcast samples group coarse shading api allows apps specify number pixels belong shaded group coarse pixel size varied render target allocated different portions screen different draw passes different course shading rates multiple-tier implementation available two user-queryable caps tiers 1 2 coarse shading available single-sampled msaa resources msaa resources shading performed per-coarse-pixel per-sample usual however tiers 1 2 msaa resources coarse sampling used shade frequency per-pixel per-sample tier 1 shading rate specified per-draw-basis nothing granular shading rate applies uniformly drawn independently lies within render target tier 2 shading rate specified per-draw-basis tier 1 also specified combination per-draw-basis semantic per-provoking-vertex screenspace image shading rates three sources combined using set combiners screen space image tile size 16x16 smaller shading rate requested app guaranteed delivered exactly precision temporal reconstruction filters sv_shadingrate ps input supported per-provoking vertex rate also referred per-primitive rate valid one viewport used sv_viewportindex written per-provoking vertex rate also referred per-primitive rate used one viewport supportspervertexshadingratewithmultipleviewports cap marked true additionally case used sv_viewportindex written collect diagnostic info allows os collect private data drivers graphics adapters consist rendering display functions new feature requirement wddm 2.6 new ddi allow os collect information time driver loaded currently os uses dxgkddicollectdebuginfo function implemented miniport query driver private data tdr timeout detection recovery related cases new ddi used collect data variety reasons os call ddi diagnostic needed providing type information requested driver collect private information important investigate issue submit os dxgkddicollectdebuginfo eventually deprecated replaced dxgkddicollectdiagnosticinfo background processing allows user mode drivers express desired threading behavior runtime control/monitor user mode drivers would spin background threads assign threads low priority possible rely nt scheduler ensure threads ’ disrupt critical-path threads generally success apis allow apps adjust amount background processing appropriate workloads perform work driver hot update reduces server downtime much possible os component needs updated driver hot patch used apply security patch kernel mode driver case driver asked save adapter memory adapter stopped driver unloaded new driver loaded adapter started
[ 10243, 5643, 4624, 10769, 9234, 1043, 537, 540, 3102, 1055, 9762, 2083, 8227, 3109, 8740, 1577, 10281, 4143, 9263, 11316, 1077, 2101, 8246, 10812, 3648, 7236, 1098, 7754, 10828, 4173, 4174, 9808, 9813, 10839, 603, 9819, 2145, 3170, 8296, ...
Validation
4,179
3
Socket_6:socket 6 socket 6 486-generation cpu socket slightly modified version common socket 3 used motherboards intel designed new standard near end 80486 market life motherboards produced used especially socket 3 standard already sufficient
[ 5901, 4246, 2455, 3992, 8855, 11417, 3995, 4252, 6175, 7714, 10019, 4523, 2604, 2350, 6192, 9649, 4537, 2874, 7105, 4805, 7110, 8394, 3403, 4427, 3798, 4185, 7002, 9945, 11484, 9570, 10468, 613, 8552, 1260, 4717, 10225, 371, 9592, 8442 ]
None
4,180
2
IPad_(2017):ipad 2017 ipad officially fifth-generation ipad 9.7-inch tablet computer designed developed marketed apple inc. announcement march 21 2017 conflicting naming conventions spawned number different names including seventh-generation ipad ipad 2017 retains screen size ipad air line tablets powerful ipad air 2 even overall dimensions weight similar original ipad air unlike ipad air 2 generation ipad fully laminated display lacks anti-reflective coating unlike ipad pro smart connector features dual-speaker system ipad received mixed reviews significantly praised performance reviewers asserting model noticeably faster older ipad models also received positive reviews price battery life criticized however lacking laminated anti-reflective screen lack support apple pencil attachable keyboards smart connector introductory price united states lowest ever ipad media noting lower price might effort encourage wider adoption tablet education sector well businesses needing inexpensive tablets undemanding uses march 27 2018 apple announced successor 2018 ipad also marked discontinuation ipad ipad announced apple march 21 2017 press release confusion around naming referred ipad marketing called fifth-generation ipad official statements specifications sheets title previously taken 2013 ipad air sources refer seventh-generation ipad including ipad air ipad air 2 fifth- sixth-generation ipads respectively also referred ipad 2017 matt kapko cio wrote apple introductory pricing 329 united states ipad 70 price reduction versus ipad air 2 appeared designed fend encroachment google chromebook laptops education sector foster wider adoption customer-facing terminals kapko also wrote device designed appeal businesses require inexpensive tablets undemanding use including kiosks checkout terminals hospitality screens time original release ipad shipped ios 10 version apple mobile operating system new units sold come new ios 11 operating system instead included touch id fingerprint sensor allows user unlock device well approve purchases app store itunes store ibooks store touch id apple pay let user purchase items websites within apps ipad 9.7-inch 25cm screen compared ipad air 2 processor updated apple a8x a9 embedded apple m9 motion co-processor ipad 2 gigabytes ram 7.5mm thick thickness ipad air compared 6.1mm ipad air 2 unlike ipad models available ipad display fully laminated anti-reflective coating however ipad brighter screen ipad air 2 25 brighter according apple available 32 128 gigabyte storage options contrasting ipad pro lineup ipad features two speakers opposed four smart connector support flash back offered silver gold space grey colors despite use apple a9 processor accompanying m9 motion co-processor introduced iphone 6s 2015 ipad feature support always-on hey siri voice input feature advertised made possible low-power processing then-new chips use hey siri limited ipad connected power product teardown ifixit showed design ipad nearly identical ipad air except differences addition touch id lack physical mute switch microphone holes smaller single row speaker holes dieter bohn verge wrote thin fast tablet praised screen good despite fancy true tone display ipad pro things made screen ipad air 2 nice lamination anti-reflectivity criticized lack support attachable keyboards apple pencil praising a9 processor significantly faster older ipads though noting n't necessarily significantly faster ipad air 2 fast ipad pro also disliked ipad features two speakers opposed four ipad pro summarizing overall review fundamentally trying tell ipad trust ipads decent tablets basic level quality speed functionality get one need one n't stress 're missing n't sascha segan pc magazine wrote apple ipad affordable ever noted little reason existing ipad owners upgrade new ipad price stabs stake heart many competing android tablets although criticizing non-laminated display little washed predecessor claimed could n't see measurable difference nominal degradation quality n't really matter everyday use segan also praised performance compared prior ipad models also praised improved wi-fi performance writing quite impressive double wi-fi speeds new ipad air 2 jeff benjamin 9to5mac wrote sure lacks gorgeous laminated anti-reflective display ipad air 2 sure ’ svelte either thickness weight ’ denying 2017 ipad a9 dual core processor tow good value described tablet solid buy upgraders new users igor bonifacic mobilesyrup also praised performance well number ipad apps available criticized camera outdated keyboard/pencil incompatibility summarization reading 2017 ipad exciting tablet ’ supposed exciting ... apple ’ latest tablet iterative update designed appeal specific subset consumers bonifacic also called tablet perfect first-time tablet buyers chris velazco engadget praised battery life describing one best ipads 've tested also criticized lack anti-reflection display calling another cost-saving measure wish apple reconsidered
[ 10755, 9732, 1549, 5647, 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 6186, 4139, 6700, 7211, 1074, 8754, 9784, 8253, 576, 1090, 8783, 10838, 1623, 3672, 10840, 9312, 3681, 9826, 8806, 3691, 2673, 6258, 10357, 6264, 4220, 7292, ...
Test
4,181
3
Xak_II:_Rising_of_the_Redmoon:xak ii rising redmoon xak ii rising redmoon fantasy role-playing video game developed published japanese software developer microcabin direct sequel xak game released japan due msx scene arose europe predominately netherlands region msx versions xak received fan translations enhanced remake later released nec pc-engine together first game series xak ii telenet japan development team riot xak ii direct sequel first game series features high fantasy setting xak gods division world xak world men oceanity world faeries xexis world demons referenced xak depicted game introduction adventure main hero xak series latok kart exploring vast region situated around single central village banuwa xak protagonist latok kart fought defeated demon zemu badu one badu minions escaped black-robed man known necromancer three years later necromancer able contact one allies demon world xexis fearsome demon called zamu gospel following prophecy foretold ancient extremely powerful sorcerer name amadok necromancer three demons referred demonlords attempting complete dark ritual revive zamu gospel world xak player controls latok nineteen years age rumour whereabouts latok father dork surfaced around village banuwa latok faerie companion pixie travel village investigate soon run gospel minions latok playable character game faerie pixie accompanies throughout game comments latok actions controllable player however notable non-player characters latok pixie meet include xak ii follows structure predecessor game proceeds player finding way labyrinthine maps defeating opposing monsters way map puzzles solved keys npcs objects found gain entrance room boss dwells defeating boss player proceed towards next map structure repeats various sub-quests involving npcs present obligatory combat real-time player character walks around game maps well monster characters character attack defense rating player latok swing sword pressing action key monster character near enough sustain damage monsters damage latok touching hitting projectiles combat system requires manual dexterity especially boss fights—bosses generally several times larger latok msx2 xak ii displayed screen 256x212 display resolution game uses scrolling display map scrolls away player character reaches distance screen side 1/3 total display due larger amount memory available 256x212 display compared 512x212 one game scrolling markedly smoother xak game music supports internal psg sound system well optional msx-music style heard microcabin productions msx psg channels used main melody sound effects msx-music channels used supporting instruments prominence psg less marked first game
[ 10339, 10534, 145, 10931, 6011 ]
Validation
4,182
2
Allegro_(software):allegro software allegro software library video game development functionality library includes support basic 2d graphics image manipulation text output audio output midi music input timers well additional routines fixed-point floating-point matrix arithmetic unicode strings file system access file manipulation data files 3d graphics library written c programming language designed used c c++ objective-c bindings available python lua scheme go languages allegro comes extensive documentation many examples allegro supports windows macos unix-like systems android ios abstracting application programming interfaces apis one portable interface previous versions 4.4 supported windows macos dos beos various unix-like systems without x window system also independent port allegro amigaos 4 morphos released terms zlib license allegro free open source software initially standing atari low-level game routines allegro originally created atari st early 1990s however hargreaves abandoned atari version realized platform dying reimplemented work borland c++ djgpp compilers 1995 support borland c++ dropped version 2.0 djgpp supported compiler djgpp dos compiler games used allegro therefore used dos around 1998 allegro branched several versions port windows winallegro created also time unix port allegro xwinallegro created various ports brought together allegro 3.9 wip versions allegro 4.0 first stable version allegro support multiple platforms current development focused allegro 5 branch complete redesign api much library internal operation effort made make api consistent multi-thread safe default library hardware accelerated using opengl directx rendering backends appropriate many addons existed separate projects allegro 4 interface seamlessly allegro proper bundled default installation allegro 5 event driven allegro provides following graphic functions community allegro users contributed several library extensions handle things like scrolling tile maps import export various file formats e.g png gif jpeg images mpeg video ogg mp3 s3m xm music ttf fonts allegro 4.x used conjunction opengl using library allegrogl extends allegro functionality opengl therefore hardware allegro 5 natively supports opengl
[ 8454, 2826, 3210, 6797, 5397, 3734, 5914, 1435, 4777, 11306, 5165, 7983, 11700, 2368, 2769, 9434, 5083, 9691, 10083, 10470, 8554, 10480, 6900, 2293, 1916, 2045, 2943 ]
None
4,183
1
Database_testing:database testing database testing usually consists layered process including user interface ui layer business layer data access layer database ui layer deals interface design database business layer includes databases supporting business strategies databases collection interconnected files server storing information may deal type data i.e databases may heterogeneous result many kinds implementation integration errors may occur large database systems negatively affect system performance reliability consistency security thus important test order obtain database system satisfies acid properties atomicity consistency isolation durability database management system one critical layers data access layer deals databases directly communication process database testing mainly takes place layer involves testing strategies quality control quality assurance product databases testing different layers frequently used maintain consistency database systems commonly seen following examples figure indicates areas testing involved different database testing methods black-box testing white-box testing black-box testing involves testing interfaces integration database includes help techniques functionality database tested thoroughly pros cons black box testing include test case generation black box testing fairly simple generation completely independent software development done early stage development consequence programmer better knowledge design database application uses less time debugging cost development black box test cases lower development white box test cases major drawback black box testing unknown much program tested also certain errors detected white-box testing mainly deals internal structure database specification details hidden user main advantage white box testing database testing coding error detected internal bugs database eliminated limitation white box testing sql statements covered generating test cases database testing semantics sql statement need reflected test cases purpose technique called white box database application technique whodate used shown figure sql statements independently converted gpl statements followed traditional white box testing generate test cases include sql semantics set fixture describes initial state database entering testing setting fixtures database behavior tested defined test cases depending outcome test cases either modified kept tear stage either results terminating testing continuing test cases successful database testing following workflow executed single test commonly executed
[ 10048, 9569, 7080, 1801, 2413, 10413, 11571, 2901, 11030, 3768, 3004 ]
Test
4,184
2
Directory_Utility:directory utility directory utility utility included macos previously mac os x operating system configure connections directory services os x 10.6 10.9 directory utility /system/library/coreservices/ accessed gui via accounts system preferences panel clicking 'join next network account server clicking 'open directory utility os x 10.10 directory utility moved /system/library/coreservices/applications prior mac os x 10.5 tool named directory access
[ 4615, 5647, 1042, 6700, 4657, 1074, 576, 9802, 5713, 3670, 2141, 4702, 2149, 8303, 6771, 2676, 9343, 3719, 10888, 11402, 8852, 1686, 7318, 3228, 2207, 1699, 168, 5292, 8877, 1710, 3766, 2232, 9912, 9406, 1729, 6849, 713, 9418, 3790, 9430,...
None
4,185
3
Socket_8:socket 8 socket 8 cpu socket used exclusively intel pentium pro pentium ii overdrive computer processors intel discontinued socket 8 favor slot 1 introduction pentium ii slot 2 release pentium ii xeon 1999 socket 8 unique rectangular socket 387 pins supports fsb speeds ranging 60 66 mhz voltage 3.1 3.3v support pentium pro pentium ii overdrive cpus socket 8 also unique pin arrangement pattern one part socket pins pga grid part uses spga grid
[ 3588, 5901, 5523, 4246, 2455, 3992, 8855, 11417, 3995, 4252, 6175, 7714, 10019, 4523, 2604, 2350, 6192, 9649, 4537, 2874, 7744, 7105, 4805, 7110, 8394, 3403, 4427, 4179, 3798, 9945, 7002, 11484, 9570, 10468, 613, 8552, 1260, 4717, 1776, 1...
None