node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
4,186 | 9 | List_of_applications_using_Lua:list applications using lua lua programming language lightweight multi-paradigm language designed primarily embedded systems clients list applications use lua purpose extensibility video game development lua widely used scripting language game programmers perhaps due perceived easiness embed fast execution short learning curve 2003 poll conducted gamedev.net showed lua popular scripting language game programming 12 january 2012 lua announced winner front line award 2011 magazine game developer category programming tools among websites popular website using lua pornhub according wappalyzer applications using lua include | [
5764,
9353,
9354,
4111,
9616,
3486,
10271,
6436,
3237,
4777,
5291,
2098,
2739,
6834,
7347,
9780,
10565,
966,
842,
338,
10964,
7515,
2652,
865,
5096,
1257,
5612,
2810
] | None |
4,187 | 1 | Data_hub:data hub data hub collection data multiple sources organized distribution sharing often subsetting sharing generally data distribution form hub spoke architecture data hub differs data warehouse generally unintegrated often different grains differs operational data store data hub need limited operational data data hub differs data lake homogenizing data possibly serving data multiple desired formats rather simply storing one place adding value data de-duplication quality security standardized set query services data lake tends store data one place availability allow/require consumer process add value data data hubs ideally go-to place data within enterprise many point-to-point connections callers data suppliers need made data hub organization negotiate deliverables schedules various data enclave teams rather organizational free-for-all different teams try get new services features many teams includes integration project management systems account management systems.. | [
2548
] | None |
4,188 | 3 | Movidius:movidius movidius company based san mateo california designs specialised low-power processor chips computer vision company acquired intel september 2016 movidius co-founded dublin 2005 sean mitchell david moloney 2006 2016 raised nearly 90 million capital funding may 2013 company appointed remi el-ouazzane ceo january 2016 company announced partnership google movidius active google project tango project movidius announced planned acquisition intel september 2016 company myriad 2 chip always-on manycore vision processing unit function power-constrained devices fathom usb stick containing myriad 2 processor allowing vision accelerator added devices using arm processors including pcs drones robots iot devices video surveillance tasks identifying people objects run 80 150 gflops little 1w power intel myriad x vpu vision processing unit third generation advanced vpu movidius intel company intel myriad x vpu first class feature neural compute engine—a dedicated hardware accelerator deep neural network deep-learning inferences neural compute engine conjunction 16 shave cores ultra-high throughput intelligent memory fabric makes myriad x strong option on-device deep neural networks computer vision applications intel myriad x vpu received additional upgrades imaging vision engines including additional programmable shave cores upgraded expanded vision accelerators new native 4k image processor pipeline support 8 hd sensors connecting directly vpu myriad 2 myriad x vpu programmable via myriad development kit mdk includes necessary development tools frameworks apis implement custom vision imaging deep neural network workloads chip intel movidius neural compute stick ncs tiny fanless deep-learning device used learn ai programming edge ncs powered low-power high-performance intel movidius vision processing unit found millions smart security cameras gesture-controlled drones industrial machine vision equipment supported frameworks tensorflow caffe 14 november 2018 company announced latest version ncs marketed neural compute stick 2 ai devcon event beijing google clips camera uses myriad 2 vpu | [
3585,
6818,
9964,
3117,
6415,
7699
] | Test |
4,189 | 8 | Netscape_Application_Server:netscape application server netscape application server integrated software platform developing running transaction-oriented business applications web developed originally kiva software netscape acquired 1997 netscape sun microsystems formed sun-netscape alliance 1999 netscape application server chosen basis iplanet application server offering netdynamics application server acquired sun 1998 | [
9665,
8994,
10722,
4166,
6791,
488,
494,
4728,
7455
] | Test |
4,190 | 7 | Elements_CRM_iOS:elements crm ios elements crm ios mac customer relationship management mac crm solution built ntractive apple business using apple devices offered cloud computing subscription-based service elements crm ios universal mobile app iphone ipad elements crm ios add-on elements crm desktop app ipad crm version elements crm ios looks works feels like desktop app iphone crm app limited version important functions desktop app architecture overall development elements crm product line begun 2003 company founder justin bartak first product elements sbm launched october 2007 july 2009 product name changed elements crm ntractive privately held software development company based grand forks north dakota markets business software small medium-sized companies established 2006 company sole product elements crm customer relationship management application aimed small businesses use mac os x computers ipads iphones elements crm cloud based app employs unique site-specific browser merge os x desktop web application functionality product first introduced public keynote address apple 2007 world wide developer conference official launch elements sbm product ’ original name 1.0 took place macworld/iworld 2009 product renamed elements crm 2.0 release awarded honor apple staff pick july 2009 mac customer relationship management mac crm approach managing company ’ interaction current future customers apple inc desktop computers ios devices mac crm solutions web-based applications use web browser interaction instead mac crm combination cloud based app built apple programming language objective-c swift programming language mac crms involve using apple devices technology organize automate synchronize sales marketing customer service technical support | [
4194,
9732,
2950,
10470,
6539,
1300,
7292,
6046
] | None |
4,191 | 3 | Digital_Packet_Video_Link:digital packet video link digital packet video link dpvl video standard released vesa 2004 unlike previous technologies order save bandwidth portions screen modified sent means link dpvl also introduces metadata video attributes support dpvl standard aimed mobile wireless hardware | [
9056,
11631
] | Validation |
4,192 | 2 | Gobuntu:gobuntu gobuntu short-lived official derivative ubuntu operating system conceived provide distribution consisting entirely free software ubuntu incorporates free software installer option gobuntu project rendered redundant early 2008 result canonical made decision officially end gobuntu project version 8.04 march 2009 announced gobuntu 8.04.1 final release gobuntu project merged back mainline ubuntu need separate distribution mark shuttleworth first mentioned idea creating ubuntu derivative named gnubuntu consisting entirely free software 24 november 2005 due richard stallman disapproval name project later renamed ubuntu-libre stallman previously endorsed distribution based ubuntu called gnewsense criticized ubuntu using proprietary non-free software successive distributions notably ubuntu 7.04 introducing ubuntu 7.10 mark shuttleworth said would gobuntu officially announced mark shuttleworth 10 july 2007 daily builds gobuntu 7.10 began publicly released initial version gobuntu 7.10 released 18 october 2007 text-only installer next release long-term release codenamed hardy heron also made available alternate installation image release 7.10 initially met criticism free software advocates included mozilla firefox firefox considered 100 free software includes mozilla foundation copyrighted icons mozilla licence icons states ... may reproduced without permission debate developer list problem quickly addressed canonical applications non-free logos replaced follow-up gobuntu release hardy heron firefox replaced epiphany free logos drivers firmware binary blobs removed gobuntu would run fewer computers ubuntu canonical stated time release 7.10 13 june 2008 ubuntu community manager jono bacon announced gobuntu project would end release gobuntu 8.04 shuttleworth explained project ended release version 8.04.1 gobuntu versions intended released twice year coinciding ubuntu releases gobuntu uses version numbers code names ubuntu using year month release version number first gobuntu release example 7.10 indicating october 2007 gobuntu releases also given code names using adjective animal first letter e.g gutsy gibbon respective ubuntu code names commonly gobuntu releases referred developers users adjective portion code name example gutsy gibbon often called gutsy | [
546,
9253,
11305,
56,
59,
4673,
3654,
1101,
1107,
1110,
10851,
3685,
9320,
9324,
10860,
2671,
3189,
5755,
11388,
8837,
10394,
673,
3745,
3245,
7854,
2738,
4790,
8907,
8909,
10971,
5343,
4841,
6890,
7913,
5356,
7920,
5363,
9971,
9461,
6393... | None |
4,193 | 7 | Cooperative_storage_cloud:cooperative storage cloud cooperative storage cloud decentralized model networked online storage data stored multiple computers nodes hosted participants cooperating cloud cooperative scheme viable total storage contributed aggregate must least equal amount storage needed end users however nodes may contribute less storage may contribute may reward models compensate nodes contributing unlike traditional storage cloud cooperative directly employ dedicated servers actual storage data thereby eliminating need significant dedicated hardware investment node cooperative runs specialized software communicates centralized control orchestration server thereby allowing node consume contribute storage space cloud centralized control orchestration server requires several orders magnitude less resources storage computing power bandwidth operate relative overall capacity cooperative files hosted cloud fragmented encrypted leaving local machine distributed randomly using load balancing geo-distribution algorithm nodes cooperative users add additional layer security reduce storage space compressing encrypting files copied cloud order maintain data integrity high availability across relatively unreliable set computers wide area network like internet source node add level redundancy data block allows system recreate entire block even nodes temporarily unavailable due loss network connectivity machine powered hardware failure storage bandwidth efficient forms redundancy use erasure coding techniques like reed-solomon simple less cpu intensive expensive form redundancy duplicate copies due bandwidth hardware constraints nodes may able contribute much space consume cloud hand nodes large storage space limited bandwidth constraints may contribute consume thereby cooperative stay balance university california oceanstore project mit chord non-commercial example june 1 2016 minebox gmbh announced forthcoming minebox networked attached storage device nas utilize sia network persist backups users minebox also able rent free disk space via sia partly centralized system operated symform inc. startup company based seattle symform generated kept keys used encrypt decrypt since also decided server host parts file users trust symform share party misuse information symform discontinued service july 31 2016 | [
8640,
4194,
1801,
3629,
1908,
728,
2395,
5373,
8446
] | Validation |
4,194 | 7 | Cloud_computing:cloud computing cloud computing on-demand availability computer system resources especially data storage computing power without direct active management user term generally used describe data centers available many users internet large clouds predominant today often functions distributed multiple locations central servers connection user relatively close may designated edge server clouds may limited single organization enterprise clouds available many organizations public cloud cloud computing relies sharing resources achieve coherence economies scale advocates public hybrid clouds note cloud computing allows companies avoid minimize up-front infrastructure costs proponents also claim cloud computing allows enterprises get applications running faster improved manageability less maintenance enables teams rapidly adjust resources meet fluctuating unpredictable demand cloud providers typically use pay-as-you-go model lead unexpected operating expenses administrators familiarized cloud-pricing models availability high-capacity networks low-cost computers storage devices well widespread adoption hardware virtualization service-oriented architecture autonomic utility computing led growth cloud computing 2019 linux used type operating systems used including microsoft offerings thus described dominant cloud computing popularized amazon.com releasing elastic compute cloud product 2006 references phrase cloud computing appeared early 1996 first known mention compaq internal document cloud symbol used represent networks computing equipment original arpanet early 1977 csnet 1981—both predecessors internet word cloud used metaphor internet standardized cloud-like shape used denote network telephony schematics simplification implication specifics end points network connected relevant purposes understanding diagram term cloud used refer platforms distributed computing early 1993 apple spin-off general magic used describing paired telescript personalink technologies wired april 1994 feature bill andy excellent adventure ii andy hertzfeld commented telescript general magic distributed programming language 1960s initial concepts time-sharing became popularized via rje remote job entry terminology mostly associated large vendors ibm dec. full-time-sharing solutions available early 1970s platforms multics ge hardware cambridge ctss earliest unix ports dec hardware yet data center model users submitted jobs operators run ibm mainframes overwhelmingly predominant 1990s telecommunications companies previously offered primarily dedicated point-to-point data circuits began offering virtual private network vpn services comparable quality service lower cost switching traffic saw fit balance server use could use overall network bandwidth effectively began use cloud symbol denote demarcation point provider responsible users responsible cloud computing extended boundary cover servers well network infrastructure computers became diffused scientists technologists explored ways make large-scale computing power available users time-sharing experimented algorithms optimize infrastructure platform applications prioritize cpus increase efficiency end users use cloud metaphor virtualized services dates least general magic 1994 used describe universe places mobile agents telescript environment could go described andy hertzfeld use cloud metaphor credited general magic communications employee david hoffman based long-standing use networking telecom addition use general magic also used promoting associated personalink services cloud computing existence since 2000 august 2006 amazon created subsidiary amazon web services introduced elastic compute cloud ec2 april 2008 google released google app engine beta early 2008 nasa opennebula enhanced reservoir european commission-funded project became first open-source software deploying private hybrid clouds federation clouds mid-2008 gartner saw opportunity cloud computing shape relationship among consumers services use services sell observed organizations switching company-owned hardware software assets per-use service-based models projected shift computing ... result dramatic growth products areas significant reductions areas 2008 u.s. national science foundation began cluster exploratory program fund academic research using google-ibm cluster technology analyze massive amounts data february 2010 microsoft released microsoft azure announced october 2008 july 2010 rackspace hosting nasa jointly launched open-source cloud-software initiative known openstack openstack project intended help organizations offering cloud-computing services running standard hardware early code came nasa nebula platform well rackspace cloud files platform open source offering along open-source solutions cloudstack ganeti opennebula attracted attention several key communities several studies aim comparing open sources offerings based set criteria march 1 2011 ibm announced ibm smartcloud framework support smarter planet among various components smarter computing foundation cloud computing critical part june 7 2012 oracle announced oracle cloud cloud offering poised first provide users access integrated set solutions including applications saas platform paas infrastructure iaas layers may 2012 google compute engine released preview rolled general availability december 2013 2019 revealed linux used microsoft azure dominant elsewhere goal cloud computing allow users take benefit technologies without need deep knowledge expertise one cloud aims cut costs helps users focus core business instead impeded obstacles main enabling technology cloud computing virtualization virtualization software separates physical computing device one virtual devices easily used managed perform computing tasks operating system–level virtualization essentially creating scalable system multiple independent computing devices idle computing resources allocated used efficiently virtualization provides agility required speed operations reduces cost increasing infrastructure utilization autonomic computing automates process user provision resources on-demand minimizing user involvement automation speeds process reduces labor costs reduces possibility human errors cloud computing uses concepts utility computing provide metrics services used cloud computing attempts address qos quality service reliability problems grid computing models cloud computing shares characteristics cloud computing exhibits following key characteristics national institute standards technology definition cloud computing identifies five essential characteristics though service-oriented architecture advocates everything service acronyms eaas xaas simply aas cloud-computing providers offer services according different models three standard models per nist infrastructure service iaas platform service paas software service saas models offer increasing abstraction thus often portrayed layers stack infrastructure- platform- software-as-a-service need related example one provide saas implemented physical machines bare metal without using underlying paas iaas layers conversely one run program iaas access directly without wrapping saas infrastructure service iaas refers online services provide high-level apis used dereference various low-level details underlying network infrastructure like physical computing resources location data partitioning scaling security backup etc hypervisor runs virtual machines guests pools hypervisors within cloud operational system support large numbers virtual machines ability scale services according customers varying requirements linux containers run isolated partitions single linux kernel running directly physical hardware linux cgroups namespaces underlying linux kernel technologies used isolate secure manage containers containerisation offers higher performance virtualization hypervisor overhead also container capacity auto-scales dynamically computing load eliminates problem over-provisioning enables usage-based billing iaas clouds often offer additional resources virtual-machine disk-image library raw block storage file object storage firewalls load balancers ip addresses virtual local area networks vlans software bundles nist definition cloud computing describes iaas consumer able deploy run arbitrary software include operating systems applications consumer manage control underlying cloud infrastructure control operating systems storage deployed applications possibly limited control select networking components e.g. host firewalls iaas-cloud providers supply resources on-demand large pools equipment installed data centers wide-area connectivity customers use either internet carrier clouds dedicated virtual private networks deploy applications cloud users install operating-system images application software cloud infrastructure model cloud user patches maintains operating systems application software cloud providers typically bill iaas services utility computing basis cost reflects amount resources allocated consumed nist definition cloud computing defines platform service paas vendors offer development environment application developers provider typically develops toolkit standards development channels distribution payment paas models cloud providers deliver computing platform typically including operating system programming-language execution environment database web server application developers develop run software cloud platform instead directly buying managing underlying hardware software layers paas underlying computer storage resources scale automatically match application demand cloud user allocate resources manually integration data management providers also use specialized applications paas delivery models data examples include ipaas integration platform service dpaas data platform service ipaas enables customers develop execute govern integration flows ipaas integration model customers drive development deployment integrations without installing managing hardware middleware dpaas delivers integration—and data-management—products fully managed service dpaas model paas provider customer manages development execution programs building data applications customer dpaas users access data data-visualization tools platform service paas consumers manage control underlying cloud infrastructure including network servers operating systems storage control deployed applications possibly configuration settings application-hosting environment nist definition cloud computing defines software service software service saas model users gain access application software databases cloud providers manage infrastructure platforms run applications saas sometimes referred on-demand software usually priced pay-per-use basis using subscription fee saas model cloud providers install operate application software cloud cloud users access software cloud clients cloud users manage cloud infrastructure platform application runs eliminates need install run application cloud user computers simplifies maintenance support cloud applications differ applications scalability—which achieved cloning tasks onto multiple virtual machines run-time meet changing work demand load balancers distribute work set virtual machines process transparent cloud user sees single access-point accommodate large number cloud users cloud applications multitenant meaning machine may serve one cloud-user organization pricing model saas applications typically monthly yearly flat fee per user prices become scalable adjustable users added removed point proponents claim saas gives business potential reduce operational costs outsourcing hardware software maintenance support cloud provider enables business reallocate operations costs away hardware/software spending personnel expenses towards meeting goals addition applications hosted centrally updates released without need users install new software one drawback saas comes storing users data cloud provider server result could unauthorized access data mobile backend service model also known backend service baas web app mobile app developers provided way link applications cloud storage cloud computing services application programming interfaces apis exposed applications custom software development kits sdks services include user management push notifications integration social networking services relatively recent model cloud computing baas startups dating 2011 later trends indicate services gaining significant mainstream traction enterprise consumers serverless computing cloud computing code execution model cloud provider fully manages starting stopping virtual machines necessary serve requests requests billed abstract measure resources required satisfy request rather per virtual machine per hour despite name actually involve running code without servers serverless computing named business person owns system purchase rent provision servers virtual machines back-end code run function service faas service-hosted remote procedure call leverages serverless computing enable deployment individual functions cloud run response events faas included broader term serverless computing terms may also used interchangeably private cloud cloud infrastructure operated solely single organization whether managed internally third party hosted either internally externally undertaking private cloud project requires significant engagement virtualize business environment requires organization reevaluate decisions existing resources improve business every step project raises security issues must addressed prevent serious vulnerabilities self-run data centers generally capital intensive significant physical footprint requiring allocations space hardware environmental controls assets refreshed periodically resulting additional capital expenditures attracted criticism users still buy build manage thus benefit less hands-on management essentially lacking economic model makes cloud computing intriguing concept cloud called public cloud services rendered network open public use public cloud services may free technically may little difference public private cloud architecture however security consideration may substantially different services applications storage resources made available service provider public audience communication effected non-trusted network generally public cloud service providers like amazon web services aws ibm oracle microsoft google operate infrastructure data center access generally via internet aws oracle microsoft google also offer direct connect services called aws direct connect oracle fastconnect azure expressroute cloud interconnect respectively connections require customers purchase lease private connection peering point offered cloud provider hybrid cloud composition public cloud private environment private cloud on-premise resources remain distinct entities bound together offering benefits multiple deployment models hybrid cloud also mean ability connect collocation managed and/or dedicated services cloud resources gartner defines hybrid cloud service cloud computing service composed combination private public community cloud services different service providers hybrid cloud service crosses isolation provider boundaries ca n't simply put one category private public community cloud service allows one extend either capacity capability cloud service aggregation integration customization another cloud service varied use cases hybrid cloud composition exist example organization may store sensitive client data house private cloud application interconnect application business intelligence application provided public cloud software service example hybrid cloud extends capabilities enterprise deliver specific business service addition externally available public cloud services hybrid cloud adoption depends number factors data security compliance requirements level control needed data applications organization uses another example hybrid cloud one organizations use public cloud computing resources meet temporary capacity needs met private cloud capability enables hybrid clouds employ cloud bursting scaling across clouds cloud bursting application deployment model application runs private cloud data center bursts public cloud demand computing capacity increases primary advantage cloud bursting hybrid cloud model organization pays extra compute resources needed cloud bursting enables data centers create in-house infrastructure supports average workloads use cloud resources public private clouds spikes processing demands specialized model hybrid cloud built atop heterogeneous hardware called cross-platform hybrid cloud cross-platform hybrid cloud usually powered different cpu architectures example x86-64 arm underneath users transparently deploy scale applications without knowledge cloud hardware diversity kind cloud emerges rise arm-based system-on-chip server-class computing community cloud shares infrastructure several organizations specific community common concerns security compliance jurisdiction etc whether managed internally third-party either hosted internally externally costs spread fewer users public cloud private cloud cost savings potential cloud computing realized cloud computing platform assembled distributed set machines different locations connected single network hub service possible distinguish two types distributed clouds public-resource computing volunteer cloud multicloud use multiple cloud computing services single heterogeneous architecture reduce reliance single vendors increase flexibility choice mitigate disasters etc differs hybrid cloud refers multiple cloud services rather multiple deployment modes public private legacy issues transferring large amounts data cloud well data security data cloud initially hampered adoption cloud big data much data originates cloud advent bare-metal servers cloud become solution use cases including business analytics geospatial analysis hpc cloud refers use cloud computing services infrastructure execute high-performance computing hpc applications applications consume considerable amount computing power memory traditionally executed clusters computers 2016 handful companies including r-hpc amazon web services univa silicon graphics international sabalcore gomput penguin computing offered high performance computing cloud penguin demand pod cloud one first non-virtualized remote hpc services offered pay-as-you-go basis penguin computing launched hpc cloud 2016 alternative amazon ec2 elastic compute cloud uses virtualized computing nodes cloud architecture systems architecture software systems involved delivery cloud computing typically involves multiple cloud components communicating loose coupling mechanism messaging queue elastic provision implies intelligence use tight loose coupling applied mechanisms others cloud engineering application engineering disciplines cloud computing brings systematic approach high-level concerns commercialization standardization governance conceiving developing operating maintaining cloud computing systems multidisciplinary method encompassing contributions diverse areas systems software web performance information technology engineering security platform risk quality engineering cloud computing poses privacy concerns service provider access data cloud time could accidentally deliberately alter delete information many cloud providers share information third parties necessary purposes law order without warrant permitted privacy policies users must agree start using cloud services solutions privacy include policy legislation well end users choices data stored users encrypt data processed stored within cloud prevent unauthorized access identity management systems also provide practical solutions privacy concerns cloud computing systems distinguish authorized unauthorized users determine amount data accessible entity systems work creating describing identities recording activities getting rid unused identities according cloud security alliance top three threats cloud insecure interfaces api data loss leakage hardware failure —which accounted 29 25 10 cloud security outages respectively together form shared technology vulnerabilities cloud provider platform shared different users may possibility information belonging different customers resides data server additionally eugene schultz chief technology officer emagined security said hackers spending substantial time effort looking ways penetrate cloud real achilles heels cloud infrastructure making big holes bad guys get data hundreds thousands companies stored large cloud servers hackers theoretically gain control huge stores information single attack—a process called hyperjacking examples include dropbox security breach icloud 2014 leak dropbox breached october 2014 7 million users passwords stolen hackers effort get monetary value bitcoins btc passwords able read private data well data indexed search engines making information public problem legal ownership data user stores data cloud cloud provider profit many terms service agreements silent question ownership physical control computer equipment private cloud secure equipment site someone else control public cloud delivers great incentive public cloud computing service providers prioritize building maintaining strong management secure services small businesses n't expertise security could find secure use public cloud risk end users understand issues involved signing cloud service persons sometimes n't read many pages terms service agreement click accept without reading important cloud computing becoming popular required services work example intelligent personal assistant apple siri google fundamentally private cloud seen secure higher levels control owner however public cloud seen flexible requires less time money investment user according bruce schneier downside limited customization options cloud computing cheaper economics scale and—like outsourced task—you tend get get restaurant limited menu cheaper personal chef cook anything want fewer options much cheaper price feature bug also suggests cloud provider might meet legal needs businesses need weigh benefits cloud computing risks cloud computing control back end infrastructure limited cloud vendor cloud providers often decide management policies moderates cloud users able deployment cloud users also limited control management applications data services includes data caps placed cloud users cloud vendor allocating certain amount bandwidth customer often shared among cloud users privacy confidentiality big concerns activities instance sworn translators working stipulations nda might face problems regarding sensitive data encrypted cloud computing beneficial many enterprises lowers costs allows focus competence instead matters infrastructure nevertheless cloud computing proven limitations disadvantages especially smaller business operations particularly regarding security downtime technical outages inevitable occur sometimes cloud service providers csps become overwhelmed process serving clients may result temporary business suspension since technology systems rely internet individual able access applications server data cloud outage cloud computing still subject research driving factor evolution cloud computing chief technology officers seeking minimize risk internal outages mitigate complexity housing network computing hardware in-house major cloud technology companies invest billions dollars per year cloud research development example 2011 microsoft committed 90 percent 9.6 billion r budget cloud research investment bank centaur partners late 2015 forecasted saas revenue would grow 13.5 billion 2011 32.8 billion 2016 issue carrying investigations cloud storage devices physically accessed generated number changes way digital evidence located collected new process models developed formalize collection scenarios existing digital forensics tools employed access cloud storage networked drives although slow process generating large amount internet traffic alternative approach deploy tool processes cloud organizations using office 365 'e5 subscription option use microsoft built-in ediscovery resources although provide functionality typically required forensic process | [
10242,
10247,
6153,
4107,
10265,
10270,
39,
6184,
6185,
42,
2090,
4142,
8255,
10303,
2113,
8269,
4176,
2140,
94,
4190,
4193,
10338,
8291,
10341,
6246,
8295,
4205,
110,
6255,
2160,
2170,
8316,
127,
4236,
10382,
154,
8346,
8353,
2210,
6307,... | Test |
4,195 | 7 | Grid_Security_Infrastructure:grid security infrastructure grid security infrastructure gsi formerly called globus security infrastructure specification secret tamper-proof delegatable communication software grid computing environment secure authenticatable communication enabled using asymmetric encryption authentication performed using digital signature technology see digital signatures explanation works secure authentication allows resources lock data access authentication introduces problem often service retrieve data resource independent user order must supplied appropriate privileges gsi allows creation delegated privileges new key created marked delegated signed user possible service act behalf user fetch data resource communications may secured using combination methods | [
8674,
5956,
1862,
1607,
11353,
4863
] | Test |
4,196 | 9 | Pattern_directed_invocation_programming_language:pattern directed invocation programming language computer science pattern-directed invocation programming languages programming languages procedures invoked indirectly specifying pattern set procedures opposed specifying one directly name pointer url etc. conventional programming languages initiated planner featured high level plans invoked patterns assertions goals include logic programming languages prolog special case ether pattern-directed invocation language introduced scientific community metaphor pattern-directed invocation commonly used practical alternative first-order theorem proving automated theorem proving primary method implementing blackboard system automated reasoning general database facts la prolog augmented set procedures called demons demon automatically invoked whenever term matching demon pattern added database pattern-directed invocation related rule-based programming | [
8421
] | Test |
4,197 | 7 | SAP_Anywhere:sap anywhere sap anywhere front office software package sap se sap small medium sized enterprises smbs 10 500 employees early 2018 sap decided sunset product focus smb market established sap business one sap business bydesign erp solutions sap anywhere includes several front office applications intended help retail wholesale businesses market sell products services multiple sales channels including in-store direct sales online system facilitates effective customer relationship management allowing business owners review direct marketing inventory direct customer experiences using single system mobile devices according research firm international data corporation idc many small businesses struggle date processes fail optimise online business tools e-commerce increasing factor maintaining relationships customers sap anywhere intended allow small businesses take advantage digital revolution increase customer reach e-commerce business-to-business b2b business-to-consumer b2c channels president global channels general business sap rodolpho cardenuto said 2016 “ 79 million small midsize companies worldwide lifeblood economy sap anywhere primarily used smbs 20 clients falling outside smb category sap anywhere launched sap china telecom 20 october 2015 mainland china sap german multinational software corporation headquartered walldorf baden-württemberg germany founded 1972 sap focuses creating enterprise software 2014 sap created new division focus smb small-medium business customers smb solutions group smb software preceding sap anywhere includes china telecom established 2000 largest fixed-line service provider people ’ republic china third largest mobile telecommunication provider china developing sap anywhere sap utilised telecommunications infrastructure china telecom developed product customised chinese market smbs represent two thirds businesses china initial plans release focused building strong customer base china expanding markets due competitive pressure sap released sap anywhere english-speaking market earlier planned uk availability announced march 2016 us availability announced may 2016 canadian pilot currently planned 2016 sap anywhere cloud based saas software service delivered sap public cloud amazon cloud us market sap anywhere accessed mobile devices desktops includes applications sap anywhere uses sap hana enables data captured mined real time allowing accurate inventory sales order management across multiple channels sap anywhere integrates constant contact mailchimp payment gateways like paypal stripe sap anywhere uses secure transactions secure sockets layer ssl protection well sap anywhere integrated delivery company ups sap anywhere allows businesses utilise google productivity collaboration tools interact customers google apps integration internal back office enterprise resource planning applications like hr finance also available | [
1765,
4363,
5677,
467,
5210,
4604
] | Test |
4,198 | 4 | Cross-site_scripting:cross-site scripting cross-site scripting xss type computer security vulnerability typically found web applications xss enables attackers inject client-side scripts web pages viewed users cross-site scripting vulnerability may used attackers bypass access controls same-origin policy cross-site scripting carried websites accounted roughly 84 security vulnerabilities documented symantec 2007 2017 xss still considered major threat vector xss effects vary range petty nuisance significant security risk depending sensitivity data handled vulnerable site nature security mitigation implemented site owner network security web depends variety mechanisms including underlying concept trust known same-origin policy essentially states content one site nowiki https //mybank.example1.com /nowiki granted permission access resources like cookies etc web browser content url 1 uri scheme 2 host name 3 port number share permissions content urls three attributes different granted permissions separately cross-site scripting attacks use known vulnerabilities web-based applications servers plug-in systems rely exploiting one attackers fold malicious content content delivered compromised site resulting combined content arrives client-side web browser delivered trusted source thus operates permissions granted system finding ways injecting malicious scripts web pages attacker gain elevated access-privileges sensitive page content session cookies variety information maintained browser behalf user cross-site scripting attacks case code injection microsoft security-engineers introduced term cross-site scripting january 2000 expression cross-site scripting originally referred act loading attacked third-party web application unrelated attack-site manner executes fragment javascript prepared attacker security context targeted domain taking advantage reflected non-persistent xss vulnerability definition gradually expanded encompass modes code injection including persistent non-javascript vectors including activex java vbscript flash even html scripts causing confusion newcomers field information security xss vulnerabilities reported exploited since 1990s prominent sites affected past include social-networking sites twitter facebook myspace youtube orkut cross-site scripting flaws since surpassed buffer overflows become common publicly reported security vulnerability researchers 2007 estimating many 68 websites likely open xss attacks single standardized classification cross-site scripting flaws experts distinguish least two primary flavors xss flaws non-persistent persistent sources divide two groups traditional caused server-side code flaws dom-based client-side code non-persistent reflected cross-site scripting vulnerability far basic type web vulnerability holes show data provided web client commonly http query parameters e.g html form submission used immediately server-side scripts parse display page results user without properly sanitizing content html documents flat serial structure mixes control statements formatting actual content non-validated user-supplied data included resulting page without proper html encoding may lead markup injection classic example potential vector site search engine one searches string search string typically redisplayed verbatim result page indicate searched response properly escape reject html control characters cross-site scripting flaw ensue reflected attack typically delivered via email neutral web site bait innocent-looking url pointing trusted site containing xss vector trusted site vulnerable vector clicking link cause victim browser execute injected script persistent stored xss vulnerability devastating variant cross-site scripting flaw occurs data provided attacker saved server permanently displayed normal pages returned users course regular browsing without proper html escaping classic example online message boards users allowed post html formatted messages users read example suppose dating website members scan profiles members see look interesting privacy reasons site hides everybody real name email kept secret server time member real name email browser member signed ca n't see anyone else suppose mallory attacker joins site wants figure real names people sees site writes script designed run users browsers visit profile script sends quick message server collects information question describe ideal first date mallory gives short answer appear normal text end answer script steal names emails script enclosed inside script element wo n't shown screen suppose bob member dating site reaches mallory profile answer first date question script run automatically browser steals copy bob real name email directly machine persistent xss vulnerabilities significant types attacker malicious script rendered automatically without need individually target victims lure third-party website particularly case social networking sites code would designed self-propagate across accounts creating type client-side worm methods injection vary great deal cases attacker may even need directly interact web functionality exploit hole data received web application via email system logs im etc controlled attacker could become injection vector historically xss vulnerabilities first found applications performed data processing server side user input including xss vector would sent server sent back user web page need improved user experience resulted popularity applications majority presentation logic maybe written javascript working client-side pulled data on-demand server using ajax javascript code also processing user input rendering web page content new sub-class reflected xss attacks started appear called dom-based cross-site scripting dom-based xss attack malicious data touch web server rather reflected javascript code fully client side example dom-based xss vulnerability bug found 2011 number jquery plugins prevention strategies dom-based xss attacks include similar measures traditional xss prevention strategies implemented javascript code contained web pages i.e input validation escaping javascript frameworks built-in countermeasures types attack — example angular.js self-xss form xss vulnerability relies social engineering order trick victim executing malicious javascript code browser although technically true xss vulnerability due fact relies socially engineering user executing code rather flaw affected website allowing attacker still poses risks regular xss vulnerability properly executed mutated xss happens attacker injects something seemingly safe rewritten modified browser parsing markup makes extremely hard detect sanitize within websites application logic example rebalancing unclosed quotation marks even adding quotation marks unquoted parameters parameters css font-family attackers intending exploit cross-site scripting vulnerabilities must approach class vulnerability differently class specific attack vector described names technical terms taken alice-and-bob cast characters commonly used computer security browser exploitation framework could used attack web site user local environment several things could done mitigate attack bob website software stripped script tag done something make sure n't work security bug fact n't contextual output encoding/escaping could used primary defense mechanism stop xss attacks several escaping schemes used depending untrusted string needs placed within html document including html entity encoding javascript escaping css escaping url percent encoding web applications need accept rich data use escaping largely eliminate risk xss attacks fairly straightforward manner although widely recommended performing html entity encoding five xml significant characters always sufficient prevent many forms xss attacks encoding often difficult security encoding libraries usually easier use web template systems understand structure html produces automatically pick appropriate encoder many operators particular web applications e.g forums webmail allow users utilize limited subset html markup accepting html input users say b /b large output encoding lt b gt lt /b gt large suffice since user input needs rendered html browser shows large instead b /b large stopping xss attack accepting html input users much complex situation untrusted html input must run html sanitization engine ensure contain xss code also noted many validations rely parsing blacklisting specific risk html tags following script link iframe several issues approach example sometimes seemingly harmless tags left utilized correctly still result xss see example img src= javascript alert 1 another popular method strip user input however also bypassed payload concealed obfuscation see link extreme example besides content filtering imperfect methods cross-site scripting mitigation also commonly used one example use additional security controls handling cookie-based user authentication many web applications rely session cookies authentication individual http requests client-side scripts generally access cookies simple xss exploits steal cookies mitigate particular threat though xss problem general many web applications tie session cookies ip address user originally logged permit ip use cookie effective situations attacker cookie obviously breaks situations attacker behind nated ip address web proxy victim victim changing mobile ip another mitigation present internet explorer since version 6 firefox since version 2.0.0.5 safari since version 4 opera since version 9.5 google chrome httponly flag allows web server set cookie unavailable client-side scripts beneficial feature neither fully prevent cookie theft prevent attacks within browser web 2.0 ajax developers require use javascript web applications written allow operation without need client-side scripts allows users choose disable scripting browsers using application way even potentially malicious client-side scripts could inserted unescaped page users would susceptible xss attacks browsers browser plugins configured disable client-side scripts per-domain basis approach limited value scripting allowed default since blocks bad sites user knows bad late functionality blocks scripting external inclusions default allows user enable per-domain basis effective possible long time internet explorer since version 4 setting called security zones opera since version 9 using site specific preferences solution firefox gecko-based browsers open source noscript add-on addition ability enable scripts per-domain basis provides xss protection even scripts enabled significant problem blocking scripts websites default substantial reduction functionality responsiveness client-side scripting much faster server-side scripting need connect remote server page frame need reloaded another problem script blocking many users understand know properly secure browsers yet another drawback many sites work without client-side scripting forcing users disable protection site opening systems vulnerabilities firefox noscript extension enables users allow scripts selectively given page disallowing others page example scripts example.com could allowed scripts advertisingagency.com attempting run page could disallowed content-security-policy csp allows html documents opt-into disabling scripts leaving others enabled browser checks script policy deciding whether run long policy allows trustworthy scripts disallows dynamic code loading browser run programs untrusted authors regardless html document structure shifts security burden policy authors studies cast doubt efficacy host whitelist based policies.in total find 94.68 policies attempt limit script execution ineffective 99.34 hosts csp use policies offer benefit xss.modern csp policies allow using nonces mark scripts html document safe run instead keeping policy entirely separate page content long trusted nonces appear trustworthy scripts browser run programs untrusted authors large application providers report successfully deployed nonce-based policies popularity client-side frameworks changed attackers craft xss.script gadgets legitimate javascript fragments within application ’ legitimate code base … demonstrate gadgets omnipresent almost modern javascript frameworks present empirical study showing prevalence script gadgets productive code result assume mitigation techniques web applications written today bypassed.trusted types changes web apis check values trademarked trusted long programs trademark trustworthy values attacker controls javascript string value cause xss trusted types designed auditable blue teams another defense approach use automated tools remove xss malicious code web pages tools use static analysis and/or pattern matching methods identify malicious codes potentially secure using methods like escaping cookie set samesite=strict parameter stripped cross-origin requests set samesite=lax stripped non- safe cross-origin requests requests get options trace read-only semantics feature implemented google chrome since version 63 firefox since version 60 universal cross-site scripting uxss universal xss attack vulnerabilities browser browser plugins exploited rather vulnerabilities websites case xss attacks attacks commonly used anonymous along ddos compromise control network several classes vulnerabilities attack techniques related xss cross-zone scripting exploits zone concepts certain browsers usually executes code greater privilege http header injection used create cross-site scripting conditions due escaping problems http protocol level addition enabling attacks http response splitting cross-site request forgery csrf/xsrf almost opposite xss rather exploiting user trust site attacker malicious page exploits site trust client software submitting requests site believes represent conscious intentional actions authenticated users xss vulnerabilities even applications running domain allow attackers bypass csrf prevention efforts covert redirection takes advantage third-party clients susceptible xss open redirect attacks normal phishing attempts easy spot malicious page url usually couple letters real site difference covert redirection attacker could use real website instead corrupting site malicious login pop-up dialogue box lastly sql injection exploits vulnerability database layer application user input incorrectly filtered sql statements executed application specific xsss affect given version web browser tend unique consequently possible use xss fingerprint browser vendor version user | [
5636,
8200,
11,
1547,
7708,
5677,
2611,
3643,
7739,
9293,
1108,
87,
1111,
3700,
4725,
119,
7304,
8846,
7324,
161,
10412,
2737,
7871,
5827,
3785,
7373,
10492,
5373,
774,
1802,
1803,
8978,
1812,
6423,
5404,
7965,
8990,
10015,
10026,
5934,
... | None |
4,199 | 7 | Oracle_Fusion_Applications:oracle fusion applications oracle fusion applications ofa enterprise resource planning software applications oracle corporation applications distributed across various product families including financial management human capital management customer relationship management supply chain management procurement governance project portfolio oracle fusion applications announced shortly oracle 18 billion usd acquisition spree peoplesoft jd edwards siebel systems 2005 oracle fusion applications envisioned pitched enterprise resource planning suite—a combination features functionalities taken oracle e-business suite jd edwards peoplesoft siebel product lines suite built top oracle fusion middleware technology stack layers implement oracle fusion architecture leverages capabilities service-oriented architecture oracle fusion applications launched september 2010 released one year later openworld 2011 | [
6419,
10553,
4107,
1612
] | Test |
4,200 | 7 | RethinkDB:rethinkdb rethinkdb free open-source distributed document-oriented database originally created company name database stores json documents dynamic schemas designed facilitate pushing real-time updates query results applications initially seed funded combinator june 2009 company announced october 2016 unable build sustainable business products would future entirely open-sourced without commercial support cncf cloud native computing foundation purchased rights rethinkdb source code contributed linux foundation rethinkdb founded 2009 open-sourced version 1.2 2012 2015 rethinkdb released version 2.0 announcing production-ready october 5 2016 company announced shutting transitioning members engineering team stripe would longer offer production support february 6 2017 cloud native computing foundation purchased rights source code relicensed apache license 2.0 rethinkdb uses reql query language internal embedded domain-specific language officially available ruby python java javascript including node.js support table joins groupings aggregations functions also unofficial community-supported drivers languages including c clojure erlang go haskell lua php according db-engines ranking february 2016 46th popular database distinguishing feature rethinkdb first class support real-time change feeds change query returns cursor allows blocking non-blocking requests keep track potentially infinite stream real-time changes due seeming stagnation rethinkdb forked members community may 17 2018 new project called rebirthdb also hosted github project later merged back original repository | [
3876,
8644,
3462,
5031,
9828,
4777,
8554,
4011,
9926,
5677,
7983,
5397,
11221,
823,
6359,
1435,
9245
] | Test |
4,201 | 9 | Per_Brinch_Hansen:per brinch hansen per brinch hansen november 13 1938 – july 31 2007 danish-american computer scientist known work operating systems concurrent programming parallel distributed computing per brinch hansen born frederiksberg enclave surrounded copenhagen denmark father worked civil engineer becoming leading expert soil mechanics later accepting professorship technical university denmark mother elsebeth brinch hansen née ring daughter danish composer oluf ring worked hairdresser marrying brinch hansen attended st. jørgens gymnasium studied electrical engineering technical university denmark sought area pursue still pioneering phase belief subject taught probably already late make fundamental contributions seven-week student internship ibm hursley laboratory england decided dedicate career computers initially focused computer construction reading book ibm project stretch described computer organization programmer point view refocused interest toward becoming computer architect completing master degree electronic engineering 1963 brinch hansen landed job regnecentralen research institution working compiler group led peter naur jørn jensen first significant project writing parser cobol compiler siemens 3003 computer subsequently wrote file system used execution compiled cobol programs later observing 1966 brinch hansen moved henning isaksson hardware group regnecentralen company shareholders together peter kraft defined architecture instruction set regnecentralen third computer rc 4000 using algol 60 hardware definition language produce formal specification inexperienced multiprogramming used copy cooperating sequential processes edsger dijkstra sent understand process synchronization using semaphores implemented specialized rc 4000 real-time monitor use managing fertilizer plant peter kraft then-teenaged charles simonyi wrote p-code interpreter data logging task programs compiled p-code summer 1967 brinch hansen left regnecentralen hardware group become head rc 4000 software development led team including jørn jensen peter kraft søren lauesen defining general-purpose rc 4000 multiprogramming system goal avoid developing custom real-time control operating system every rc 4000 installation support batch processing time-sharing well resulting system complete operating system small kernel providing mechanisms upon operating systems different purposes could built spring 1969 well-documented reliable version rc 4000 multiprogramming system running late 1970 brinch hansen moved pittsburgh accepting invitation alan perlis visit department computer science carnegie mellon university research associate wrote first systematic textbook operating system principles time 1971 summer school marktoberdorf symposium belfast brinch hansen tony hoare dijkstra began discuss ideas evolved monitor concept spring 1972 reading class concept invented ole-johan dahl kristen nygaard simula 67 brinch hansen completed text chapter resource protection proposed first monitor notation using shared classes 1973 operating system principles published becoming first comprehensive textbook operating systems july 1972 brinch hansen joined faculty caltech associate professor computer science began work defining programming language concurrent processes monitors april 1974 distributed technical report concurrent pascal concurrent pascal compiler pdp 11/45 written brinch hansen doctoral student al hartmann released january 1975 subsequently brinch hansen began writing model operating systems concurrent pascal evaluate language may 1975 completed solo single-user operating system development concurrent pascal programs next rewrote original rc 4000 real-time scheduler concurrent pascal taking three days write three hours machine time systematically test caltech computer science department shifted focus toward computer engineering away programming brinch hansen decided leave rather seek tenure 1976 brinch hansen chose usc next post family could remain altadena home joining faculty tenured full professor first chair newly created computer science department led efforts identify attract top-notch faculty build first rate department 1980 usc computer science department ranked national research council one top ten us usc brinch hansen wrote second book architecture concurrent programs based work developing operating systems concurrent pascal published 1977 first book concurrent programming 1978 brinch hansen became first computer scientist awarded doctor technices degree highest academic distinction within engineering technological science denmark work documented architecture concurrent programs later 1978 brinch hansen published distributed processes language concept proposing use remote procedure calls synchronize processes running across microcomputer network also 1978 l. j. sevins steve goings mostek visited brinch hansen usc outlined low-cost multiprocessor architecture mostek began project implement multiprocessor brinch hansen working consultant brinch hansen developed new concurrent programming language edison project rc 4000 project edison also used formal specification language hardware mostek got initial 4-node multiprocessor working brinch hansen wrote portable edison compiler pdp 11/55 shortly united technologies acquired mostek cancelled project 1982 brinch hansen moved edison system ibm pc published third book programming personal computer 1982 brinch hansen named first henry salvatori professor computer science usc 1984 feeling homesick denmark fourteen years abroad brinch hansen left usc joined faculty university copenhagen professor datalogy 1985 elected fellow ieee later 1985 fourth book brinch hansen pascal compilers used compiler course published designing multicomputer operating system danish company gn elmi brinch hansen concluded needed new language time leveraging message passing paradigm hoare csp resulting language joyce removed major limitation csp introducing parallel recursion brinch hansen developed portable implementation ibm pc finding neither family felt home denmark brinch hansen decided return us discovered immigration status required quickly brinch hansen contacted john reynolds syracuse university 1987 joined faculty distinguished professor working student rangachari anand joyce moved encore multimax 320 multiprocessor su northeast parallel architectures center recognizing scaling limitations multiprocessors however brinch hansen sought suitable multicomputer work acquiring meiko computing surface 1989 began experimenting scientific applications developing parallel programs householder reduction n-body simulation learning exercises surprised find programs nearly identical control structures concluding fit all-pairs paradigm focused exploring reusable parallel algorithm structures termed programming paradigms generic programs later popularly known design patterns 1995 brinch hansen fifth book studies computational science parallel programming paradigms published programs rewritten superpascal fully implemented publication language created parallel algorithms later years brinch hansen published retrospective important papers search simplicity 1996 text course programming non-majors programming everyone java 1999 retrospective evolution operating systems classic operating systems batch processing distributed systems 2001 retrospective evolution concurrent programming origin concurrent programming semaphores remote procedure calls 2002 self-published 2004 memoir programmer story life computer pioneer website 2002 brinch hansen awarded ieee computer pioneer award pioneering development operating systems concurrent programming exemplified work rc 4000 multiprogramming system monitors concurrent pascal july 31 2007 brinch hansen died shortly diagnosed terminal cancer brinch hansen met wife milena née hrastar class trip yugoslavia 1962 married 1965 two children daughter mette son thomas career spanning five decades brinch hansen made seminal contributions areas operating systems concurrent computing parallel distributed computing influential shaping development fields advancing ad hoc techniques systematic engineering disciplines impact work amplified relentless search simplicity insistence clarity writing rewriting papers many times publishing becoming one best explainers business commitment testing concepts working systems – brinch hansen implemented distributed working systems new concepts developed noting rc 4000 multiprogramming system introduced now-standard concept operating system kernel separation policy mechanism operating system design modern microkernel architectures trace roots extensible nucleus architecture rc 4000 improving microkernel performance major theme operating system research three decades rc 4000 brinch hansen text operating system principles first comprehensive textbook operating systems eventually published six languages english japanese german czech polish serbo-croatian remained print decades years rc 4000 system described become outdated 1990 nearly two decades initial publication p.j plauger reviewed saying 2005 acm members voted operating system principles top 25 classic book survey choose out-of-print classic books add acm digital library operating system principles ranked 15th survey appearing 8.8 ballots available acm digital library using concurrent pascal brinch hansen demonstrated feasible fully implement operating systems high level languages reduced development effort one two orders magnitude furthermore entire operating systems could published understood entirety brinch hansen precisely architecture concurrent programs leading roy maddux harlan mills declare part two book indeed remarkable entire operating system visible every line program open scrutiny hidden mystery studying extensive examples reader feels could tackle similar jobs could change system never seen operating system shown detail manner amenable modification brinch hansen hoare developed monitor concept brinch hansen published first monitor notation adopting class concept simula 67 invented queueing mechanism hoare refined rules process resumption brinch hansen created first implementation monitors concurrent pascal dozen additional monitor-based languages created 1990 simone modula csp/k ccnpascal ply pascal plus mesa sb-mod concurrent euclid pascalc concurrent c emerald real-time euclid pascal-fc turing plus predula concurrent pascal first concurrent programming language first language developed specifically concurrent programming importantly first language demonstrate possible incorporate secure high-level facilities concurrency system could guarantee processes access disjoint sets variables interfere time dependent ways hoare described outstanding example best academic research area source portable code concurrent pascal solo operating system distributed least 75 companies 100 universities 21 countries resulting widespread adoption porting adaptation industry academia greg andrews observed concurrent pascal monitors greatly influenced subsequent concurrent language proposals brinch hansen architecture concurrent programs first book concurrent programming eventually published three languages english japanese german dozen years publication p. j. plauger observed sure improvements made past dozen years better synchronization algorithms fancier necessarily better languages concurrency control wo n't find better overview concurrent programming book least n't found one 2005 acm members voted architecture concurrent programs top 25 classic book ranking 18th survey appearing 8 ballots available acm digital library remote procedure calls used modern operating systems trace roots back rc 4000 multiprogramming system used request-response communication protocol process synchronization 1978 paper distributed processes brinch hansen proposed language distributed computing based external requests consisting procedure calls processes later became known operating system context remote procedure call later brinch hansen developed two languages extending hoare csp message-passing paradigm parallel recursion showed efficiently implement | [
10246,
9224,
7187,
1952,
9762,
7983,
2482,
6652,
11075,
1350,
8262,
2248,
3529,
10568,
9932,
3159,
1883,
2012,
7775,
9441,
9315,
11242,
2283,
9714,
5363,
3323,
2556,
11262
] | None |
4,202 | 5 | PME_Aggregation_Function:pme aggregation function pme aggregation function paf computer networking mechanism defined clause 61 ieee 802.3 standard allows one physical medium entities pmes combined together form single logical ethernet link paf located physical coding sublayer pcs media access control mac -phy rate matching function transmission convergence tc sublayer interfaces pmes across λ-interface mac-phy rate matching function using abstract interface paf optional function defined 2007 two ieee 802.3 interfaces 2base-tl 10pass-ts ethernet first mile efm copper physical layers pme aggregation function following characteristics paf transmit function works fragmenting incoming ethernet frames number fragments limited size range 64 512 bytes sequential fragmentation header prepended fragment indicating fragment start-of-packet end-of-packet middle packet frame check sequence fcs appended fragment transmitted next available active pme aggregated group following diagram illustrates paf fragmentation paf receive function reassembles original frames received fragments buffered per-mac fragment buffer algorithm uses fragmentation header make sure reassembled frames order pme aggregation function first defined ieee 802.3ah 2004 original loop aggregation proposal submitted klaus fosmark defunct first mile systems 2001 later referenced itu-t g.998.2 ethernet-based multi-pair bonding ansi equivalent nipp-nai t1.427.02 paf algorithm fragmentation header similar mlppp works layer 3 ip paf asymmetric protocol i.e information required reassembly contained fragmentation header sent fragment allowing great flexibility transmitter receiver implementations requires overhead consuming 5 bandwidth estimation 2base-tl protocol including 64b/65b encapsulation paf optimized ethernet traffic inverse multiplexing atm ima another aggregation protocol unlike paf uses fixed size cells sending across multiple links round-robin fashion ima optimized atm extreme cases short ethernet frames may add much 40 overhead due aal5 encapsulation itu-t g.998.3 multi-pair bonding using time-division inverse multiplexing specification a.k.a g.bond/tdim defines symmetric aggregation protocol sides point-to-point link exchange information aggregation need separate header g.bond/tdim optimized time-division multiplexing packet traffic less 3 overhead estimation ethernet traffic including generic framing procedure gfp encapsulation | [
7815,
6670,
7478,
5270,
2998,
8989
] | Test |
4,203 | 3 | Intel_82288:intel 82288 intel 82288 bus controller designed intel 80286 chip supplied 20-pin dip package replaces 8288 used earlier processors | [
2874,
548,
6453
] | Test |
4,204 | 3 | Cannon_Lake_(microarchitecture):cannon lake microarchitecture cannon lake formerly skymont intel codename 10-nanometer die shrink kaby lake microarchitecture die shrink cannon lake new process intel process-architecture-optimization execution plan next step semiconductor fabrication cannon lake cpus first mainstream cpus include avx-512 instruction set prior cannon lake launch intel launched another 14 nm process refinement codename coffee lake successor cannon lake microarchitecture ice lake represents architecture phase intel process-architecture-optimization model cannon lake initially expected released 2015/2016 release pushed back 2018 intel demonstrated laptop unknown cannon lake cpu ces 2017 announced cannon lake based products would available 2018 earliest ces 2018 intel announced started shipping mobile cannon lake cpus end 2017 would ramp production 2018 april 26 2018 report first-quarter 2018 financial results intel stated currently shipping low-volume 10 nm product expects 10 nm volume production shift 2019 july 2018 intel announced volume production cannon lake would delayed yet late q2 2019 first laptop featuring cannon lake cpu namely intel core i3-8121u dual core cpu hyperthreading turbo boost without integrated gpu released may 2018 limited quantities august 16 2018 intel announced two new models nucs would use 10nm cannon lake-u i3-8121u cpu models later became readily available retail late november 2018 | [
3459,
5380,
2821,
3973,
8325,
9095,
5386,
9611,
4108,
9741,
398,
5649,
7313,
5523,
6804,
8851,
4886,
9111,
3352,
9500,
5883,
2088,
10669,
9391,
10675,
4276,
1461,
10548,
2237,
5309,
8125,
8126,
833,
6339,
5444,
9541,
1998,
2638,
977,
2514... | None |
4,205 | 2 | Yield_(multithreading):yield multithreading computer science yield action occurs computer program multithreading forcing processor relinquish control current running thread sending end running queue scheduling priority different programming languages implement yielding various ways coroutines fine-grained concurrency primitive may required yield explicitly may enable specifying another function take control coroutines explicitly yield allow cooperative multitasking | [
785,
7699,
7963,
6815,
5798,
9126,
6184,
2345,
4909,
5677,
2045,
7218,
8501,
5948,
4286,
2113,
8514,
5956,
8262,
4423,
1480,
1866,
8523,
4308,
344,
2264,
731,
2140,
11487,
4194,
5090,
7142,
5872,
7802,
508,
3197,
8447
] | Test |
4,206 | 4 | Focal_Point_Data_Risk:focal point data risk focal point data risk llc commonly known focal point risk management consulting firm based tampa fl focal point formed january 2017 result merger sunera aptec llc anrc llc company provides range cybersecurity risk management cybersecurity workforce development enterprise technology implementation services 2017 focal point named former cisco executive brian marlier chief executive officer focal point publishes annual cyber balance sheet report covering board-level cyber issues focal point originally founded sunera april 2005 former kpmg partners executives sunera focused original service offerings controls testing vulnerability assessments internal audit sarbanes-oxley compliance 2014 sunera acquired cyber risk management company formed norwest equity partners halyard capital partners sunera cyber risk management acquired anrc cyber security training provider 2014 aptec llc identity access management solutions integrator 2015 february 6 2015 florida governor rick scott announced expansion company ’ tampa headquarters expansion brought 41 new jobs 2015 2018 | [
6834,
2558,
11567
] | None |
4,207 | 3 | TuxOnIce:tuxonice tuxonice formerly known suspend2 implementation suspend-to-disk hibernate feature available patches 2.6 linux kernel 2.5 kernel era pavel machek forked original out-of-tree version swsusp approximately beta 10 got merged vanilla kernel development continued swsusp/suspend2/tuxonice line tuxonice includes support smp highmem preemption major advantages swsusp tuxonice originally called 'suspend2 beta releases time pavel forked code base 1.0 release 2.0 release name 'suspend2 developed contraction 'software suspend 2.x efforts made time merge tuxonice vanilla kernel opposed pavel primarily seems pavel believes much suspend-to-disk process run userspace see uswsusp nigel cunningham thinks code belongs kernel nigel stated desire frustration getting tuxonice specific features merged back mainline currently actively pursuing | [
3082,
5139,
10780,
10785,
6180,
3109,
8242,
9266,
4161,
6213,
8268,
5222,
10856,
3197,
4734,
7812,
4238,
10382,
2195,
2711,
9882,
1694,
2723,
10933,
5815,
5822,
1736,
2762,
8909,
8410,
10971,
8928,
1761,
2278,
233,
10482,
2294,
8439,
2809,
... | Test |
4,208 | 3 | Andy_and_Bill's_law:andy bill law andy bill law statement regarding relationship hardware software upgrades law originates humorous one-liner told 1990s computing conferences andy giveth bill taketh away phrase riff upon business strategies former intel ceo andy grove former ceo microsoft bill gates intel microsoft entered lucrative partnership 1980s 1990s standard chipsets microsoft windows intel brand despite profit intel gained deal grove felt gates n't making full use powerful capabilities intel chips fact refusing upgrade software achieve optimum hardware performance grove frustration dominance microsoft software intel hardware became public spawned humorous catchphrase later andy bill law new software always push ahead hardware get credit performance computer | [
2273,
6801,
2525,
6797
] | None |
4,209 | 1 | International_Thylacine_Specimen_Database:international thylacine specimen database international thylacine specimen database itsd culmination four-year research project catalogue digitally photograph known surviving specimen material thylacine thylacinus cynocephalus tasmanian tiger held within museum university private collections itsd first published electronic resource series three cd-roms april 2005 updated july 2006 completely revised may 2009 released single dvd totalling 3.68 gb data images itsd designed free access academic tool promote facilitate undergraduate postgraduate research species accessed offices curators heads department universities museums hold thylacine material alternatively libraries several major zoological societies itsd lists available catalogue data individual specimen e.g holding institution catalogue identification number sex date acquisition specimen type source locality collector field number old additional catalogue numbers purchase exchange information finally additional remarks pertaining specimen support data component significantly enhance educational worth high-resolution digital images specimens included itsd specimen image bank forms largest single photographic resource kind anywhere world primary justification including digital images specimen material within itsd comprises skins skeletons skulls taxidermy mounts wet specimens wet specimens whole animals organs body parts preserved either alcohol formalin specimens thylacine spread extensively around globe search locate specimens outset international search involving total 106 museum university private collections 23 countries master copy itsd held zoological society london mirror copies held within university tasmania hobart australian national wildlife collection canberra queen victoria museum art gallery launceston master mirror copies kept constantly revised updated new information comes light zoological society chosen hold master copy itsd historic association thylacine bulk early scientific papers species published within proceedings society zoo regent park exhibited thylacines zoo outside australia year royal zoological society new south wales hosts whitley awards awards tribute gilbert whitley eminent australian ichthyologist presented outstanding publications contain significant amount new information relating fauna australasian region september 2005 international thylacine specimen database awarded whitley award best zoological database first time history awards whitley citation presented database | [] | Test |
4,210 | 2 | AppLocker:applocker applocker application whitelisting technology introduced microsoft windows 7 operating system allows restricting programs users execute based program path publisher hash enterprise configured via group policy windows applocker allows administrators control executable files denied allowed execute applocker administrators able create rules based file names publishers file location allow certain files execute unlike earlier software restriction policies originally available windows xp windows server 2003 applocker rules apply individuals groups policies used group users different enforcement levels example users added 'audit policy allow administrators see rule violations moving user higher enforcement level several generic techniques bypassing applocker | [
11270,
5643,
4624,
537,
540,
3102,
9762,
8227,
8740,
1577,
10281,
2101,
10812,
3648,
582,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
9819,
8798,
3170,
622,
9839,
7796,
1656,
6265,
7290,
4731,
10879,
8841,
651,
6797,
219... | None |
4,211 | 3 | Espresso_(microprocessor):espresso microprocessor espresso codename 32-bit central processing unit cpu used nintendo wii u video game console designed ibm produced using 45 nm silicon-on-insulator process espresso chip resides together gpu amd mcm manufactured renesas revealed e3 2011 june 2011 released november 2012 ibm nintendo revealed espresso processor powerpc-based microprocessor three cores single chip reduce power consumption increase speed cpu graphics processor placed single substrate multi-chip module mcm reduce complexity increase communication speed chips reduce power consumption reduce cost space required two chips assembled complete mcm renesas japan espresso manufactured ibm 300 mm plant east fishkill new york using 45 nm soi-technology embedded dram edram caches unverified nintendo hackers teardowns unofficial informants since revealed information espresso name size speed microarchitecture seems quite similar predecessors broadway gekko i.e powerpc 750 based enhanced larger faster caches multiprocessor support rumors wii u cpu derived ibm high-end power7 server processor proved false presumably order cut costs espresso shares technology power7 edram general instruction set similarities superficial similarities following specifications officially confirmed either nintendo ibm obtained reverse engineering hacker hector martin goes alias marcan | [
6914,
7170,
4868,
10501,
3846,
4743,
6663,
5642,
1548,
1933,
398,
6926,
3472,
4881,
659,
7065,
1563,
1309,
6815,
10784,
10658,
3493,
6949,
6311,
4136,
1321,
8102,
9391,
10543,
4017,
5297,
8120,
6715,
9020,
1725,
10173,
1983,
1985,
10180,
... | None |
4,212 | 4 | IOActive:ioactive ioactive independent computer security company active several areas known reporting high severity security vulnerabilities variety products ioactive offices seattle london dubai madrid | [
5636,
11,
688,
851,
2484,
918,
2558
] | Test |
4,213 | 8 | P3P:p3p platform privacy preferences project p3p obsolete protocol allowing websites declare intended use information collect web browser users designed give users control personal information browsing p3p developed world wide web consortium w3c officially recommended april 16 2002 development ceased shortly thereafter implementations p3p microsoft internet explorer edge major browsers support p3p microsoft ended support windows 10 onwards microsoft internet explorer edge windows 10 longer support p3p president truste stated p3p implemented widely due difficulty lack value world wide web became genuine medium sell products services electronic commerce websites tried collect information people purchased merchandise companies used controversial practices tracker cookies ascertain users demographic information buying habits using information provide specifically targeted advertisements users saw invasion privacy would sometimes turn http cookies use proxy servers keep personal information secure p3p designed give users precise control kind information allow release according w3c main goal p3p “ increase user trust confidence web technical empowerment. ” p3p machine-readable language helps express website ’ data management practices p3p manages information privacy policies website uses p3p set set policies allows state intended uses personal information may gathered site visitors user decides use p3p set set policies state personal information allow seen sites visit user visits site p3p compare personal information user willing release information server wants get – two match p3p inform user ask he/she willing proceed site risk giving personal information example user may store browser preferences information browsing habits collected policy website states cookie used purpose browser automatically rejects cookie main content privacy policy following privacy policy retrieved xml file included compact form http header location xml policy file applies given document p3p allows specify codice_1 caching dummy /w3c/p3p.xml file could use feature microsoft internet explorer edge mainstream web browsers supported p3p browsers implemented due perceived lack value provides ie provides ability display p3p privacy policies compare p3p policy browser settings decide whether allow cookies particular site however p3p functionality internet explorer extends cookie blocking alert user entire web site violates active privacy preferences microsoft considers feature deprecated browsers totally removed p3p support windows 10 mozilla supported p3p features years p3p related source code removed 2007 privacy finder service also created carnegie mellon usable privacy security laboratory publicly available p3p-enabled search engine user enter search term along stated privacy preferences presented list search results ordered based whether sites comply preferences works crawling web maintaining p3p cache every site ever appears search query cache updated every 24 hours every policy guaranteed relatively date service also allows users quickly determine site comply preferences well allowing view dynamically generated natural language privacy policy based p3p data advantageous simply reading original natural language privacy policy web site many privacy policies written legalese extremely convoluted additionally case user visit web site read privacy policy p3p allows browsers understand privacy policies simplified organized manner rather searching throughout entire website setting privacy settings certain level user enables p3p automatically block cookies user might want computer additionally w3c explains p3p allow browsers transfer user data services ultimately promoting online sharing community additionally p3p toolbox developed internet education foundation recommends anyone concerned increasing users ’ trust privacy consider implementing p3p p3p toolbox site explains companies taken individuals data order promote new products services furthermore recent years companies taken individuals information created profiles market without individual consent moreover data misused consumers pay price become worrisome issues junk mail identity theft forms discrimination therefore implementing p3p protocol good beneficial internet browsers moreover since increase browsers users risk running privacy problems internet education foundation points “ p3p developed help steer force technology step toward automatic communication data management practices individual privacy preferences. ” electronic privacy information center epic critical p3p believes p3p makes difficult users protect privacy 2002 assessed p3p referred technology “ pretty poor policy ” according epic p3p software complex difficult average person understand many internet users unfamiliar use default p3p software computers install additional p3p software another concern websites obligated use p3p neither internet users moreover epic website claims p3ps protocol would become burdensome browser beneficial efficient intended key problem occurs use p3p lack enforcement thus promises made users p3p go unfulfilled though using p3p company/website makes promise privacy use gathered data site ’ users real legal ramifications company decides use information functions currently actual laws passed united states data protection though ideally companies honest use customers personal information binding reason company must actually adhere rules says comply though using p3p technically qualifies contract lack federal regulation downplays need companies abide agreement use p3p puts place unenforceable promises also prolongs adoption federal laws would actually inhibit access ability use private information government step attempt protect internet users federal laws information accessed specific regulations user information used companies ’ maintain leeway use information please despite may actually tell users 2002 epic employee chris hoofnagle argued p3p displacing chances government regulation privacy critics p3p also argue non-compliant sites excluded according study done cylab privacy interest group carnegie mellon university 15 top 5,000 websites incorporate p3p therefore many sites ’ include code practice high privacy standards accessible users use p3p online privacy guide epic also talks development implementation p3p cause monopoly private information since tends major companies implement p3p websites major companies tending gather information seeing privacy policies compare privacy preferences users epic website says incredible complexity p3p combined way popular browsers likely implement protocol would seem preclude privacy-protective technology epic continues state rather p3p may actually strengthen monopoly position personal information u.s. data marketers enjoy failure immediate adoption related idea notice choice approach ’ comply fair information practices according chairman ftc privacy laws key today ’ society order protect consumer providing much personal information others ’ benefit believe limit collection use consumer ’ personal data online currently sites required united states laws comply privacy policies publish therefore p3p causes controversy consumers concerned release personal information able rely p3p ’ protocol protect privacy michael kaply ibm reported saying following mozilla foundation considering removal p3p support browser-line 2004 ah memories ibm wrote original p3p implementation netscape proceeded write companies wasted immense amounts time everyone thought crappy proposal begin remove live leer pr manager opera software explained 2001 deliberate lack p3p support browser moment n't sure whether p3p best solution p3p among specifications considering support future issues well p3p protect privacy reason decided wait resolved p3p user agents option available internet users want ensure privacy several main alternatives p3p include using web browsers privacy mode anonymous e-mailers anonymous proxy servers main alternative p3p may technologies instead stronger laws regulate kind information internet users collected retained websites example europe data protection directive provides individuals certain set principles personal information collected person rights protecting personal data act allows individuals control type information collected various principles included within act rule individual right retrieve data collected time certain conditions moreover individual personal information kept longer necessary personal information released others unless individual gives consent currently united states federal law protecting privacy personal information shared online however sectoral laws federal state level offer protection certain types information collected individuals example fair credit reporting act fcra 1970 makes legal consumer reporting agencies disclose personal information three specified circumstances credit employment insurance evaluation government grant license “ legitimate business need ” involves consumer list sectoral privacy laws united states viewed consumer privacy guide website many groups working future p3p make easier people use groups transparent accountable datamining initiative tami group mit ’ computer science artificial intelligence laboratory goal tami create technical legal policy foundations transparency accountability large-scale aggregation tami hopes help people manage privacy risks world technology constantly changing policy aware web paw scalable mechanism exchange rules proofs unlimited access control web “ creates system policy aware infrastructure using systematic web rules language theorem prover ” | [
2818,
11650,
8070,
7943,
8080,
5907,
8086,
7965,
10910,
7455,
4768,
8735,
10791,
3521,
7878,
119,
1368,
8281,
8923,
479,
6629,
4326,
10611,
4725,
502,
6775,
2296,
10486,
124
] | Test |
4,214 | 7 | Commotion_Wireless:commotion wireless commotion wireless open-source wireless mesh network electronic communication project developed open technology institute development included 2 million grant united states department state 2011 use mobile ad hoc network manet concomitant arab spring preliminarily deployed detroit late 2012 launched generally march 2013 project called internet suitcase commotion 1.0 first non-beta release launched december 30 2013 commotion relies several open source projects olsr openwrt openbts serval project ubiquiti tp-link mikrotik | [
610,
10451
] | Test |
4,215 | 8 | Lamebook:lamebook lamebook blog re-posts 'everything lame funny social networking site facebook users send screenshots unusual amusing facebook posts re-posted site every weekday jonathan standefer matthew genitempo graphic designers austin texas launched web site april 2009 facebook parody site two acquaintances baylor university yet became friends graduated 2005 started lamebook little meeting months got popular able quit jobs offices full time said genitempo graduated 2007 degree graphic design brought lot different design opportunities us last names faces blurred pixellated upon upload avoid invasion privacy content removed request lamebook also discourages users trying contact people seen posts sites lamebook would existence without concept oversharing overshare word year 2008 webster new world® college dictionary defined much information either intentionally accidentally revealed editors webster new world explain new word old phenomenon made much easier emergence modern technology ease combined wide reach many social networking sites allow users made oversharing quite common occurrence today according huffington post online oversharers 32 say experienced poster ’ remorse regretted posting certain information lamebook cocreator jonathan standefer quoted saying people overshare internet favorite ones used mushy ones fights funniest like fighting drunk one friends everyone else room views lamebook forum people vent inappropriate cringe-worthy things inevitably seen facebook glamour magazine described facebook personal confession booth air dirty laundry sitting behind computer screen people often forget everyone else room facebook anything posted outside private message seen many people one communicated leads kinds content people submit lamebook couple fights inappropriate pictures embarrassing statuses etc march 2010 facebook contacted lamebook alleging website infringed diluted facebook trademark requested lamebook cease desist using lamebook mark change name look website 4 november 2010 lamebook filed legal action facebook seeking declaration website infringe rights facebook protection parody first amendment response 11 november facebook sued lamebook trademark infringement claiming site parody provide critique comment facebook 22 november 2010 facebook confirmed deleted lamebook fan page blocked 'like function lamebook powered facebook blocked facebook users able type word lamebook facebook facebook cto bret taylor later conceded mistake part process dealing routine trademark violation issue regarding links posted facebook blocked mentions phrase “ lamebook ” facebook committed promoting free expression facebook apologize mistake case working fix process led happening conor civins one lamebook lawyers said lamebook parody website supposed social commentary protected free speech lamebook website litigation process banner asking viewers support efforts facebook read really love running lamebook aside laughs represents opportunity work incredibly fun project buddies makes lot people happy still allows us make rent end month … problem facebook ’ get joke ’ decided pick little guys small business owners seem match multi-billion dollar behemoth one website ’ going without fight dispute came end facebook efforts relocate litigation process austin texas palo alto california denied texas federal judge joint statement released 25 august 2011 companies proclaimed pleased arrive agreement protects facebook brand trademark allows lamebook continued operation parties satisfied users likely confused thus forth lamebook permitted continue name yet must add disclaimer website reads unofficial parody affiliated associated endorsed approved facebook lamebook also allowed seek trademark protection name lamebook best worst facebook expected released chronicle books 2012 | [
735
] | Train |
4,216 | 3 | Star_Force:star force released north america video ware arcades mega force vertically scrolling shooter released 1984 tehkan game player pilots starship called final star shooting various enemies destroying enemy structures points unlike later vertical scrolling shooters like toaplan twin cobra final star two levels weapon power secondary weapons like missiles and/or bombs stage game named letter greek alphabet certain versions game additional level called infinity represented infinity symbol occurs omega game repeats indefinitely nes version defeating omega target player see black screen tecmo logo announcing future release sequel super star force infinity target becomes available game repeats level boss without increasing difficulty star force ported published 1985 hudson soft msx home computer family computer famicom japan north american version nintendo entertainment system nes published 1987 tecmo although nes version hudson port released famicom japan tecmo made alterations graphics music control increased difficulty game also despite u.s. arcade version titled mega force tecmo decided release nes version original name star force star force also ported sg-1000 sega x68000 dempa shinbunsha mobile phones tecmo 1995 along two nes shooters famicom version star force remade hudson soft minimal upgrades super famicom part japan-only release caravan shooting collection version also included hudson compilation nes shooters 2006 hudson best collection vol 5 original arcade version later added compilation titled tecmo classic arcade released xbox 2009 arcade version made available download wii virtual console 500 wii points one four initial offerings virtual console arcade category wii shop channel three gaplus mappy tower druaga namco | [
9093,
7079,
9006,
1776,
10931,
599,
5753
] | Test |
4,217 | 3 | Broadwell_(microarchitecture):broadwell microarchitecture broadwell intel codename 14 nanometer die shrink haswell microarchitecture tick intel tick–tock principle next step semiconductor fabrication like previous tick-tock iterations broadwell completely replace full range cpus previous microarchitecture haswell low-end desktop cpus based broadwell processors based broadwell microarchitecture marketed 5th-generation core i3 i5 i7 processors moniker however used marketing broadwell-based celeron pentium xeon chips microarchitecture also introduced core processor branding broadwell h c variants used conjunction intel 9 series chipsets z97 h97 hm97 addition retaining backward compatibility intel 8 series chipsets broadwell launched three major variants broadwell introduces instruction set architecture extensions broadwell intel quick sync video hardware video decoder adds vp8 hardware decoding encoding support adds vp9 hevc 10-bit decoding support integrated gpu hevc decode achieved combination fixed function video decoder shaders also two independent bit stream decoder bsd rings process video commands gt3 gpus allows one bsd ring process decoding bsd ring process encoding time broadwell integrated gpu supports windows direct3d 11.2 opengl 4.4 opengl 4.5 linux opencl 2.0 however marketed direct3d-12-ready broadwell-e introduced intel turbo boost max technology 3.0 september 10 2013 intel showcased broadwell 14 nm processor demonstration idf intel ceo brian krzanich claimed chip would allow systems provide 30 percent improvement power use haswell chips released mid-2013 krzanich also claimed chips would ship end 2013 however shipment delayed due low yields intel 14 nm process october 21 2013 leaked intel roadmap indicated late 2014 early 2015 release k-series broadwell lga 1150 platform parallel previously announced haswell refresh would coincide release intel 9-series chipset would required broadwell processors due change power specifications lga 1150 socket reuters quoted intel ceo promising broadwell-based pcs would shelves holiday season probably back-to-school shopping mobile cpus expected q4 2014 high-performance quad-core cpus 2015 mobile cpus would benefit reduced energy consumption die shrink intel told cnet specialized broadwell-based products would q4 2014 broader availability including mobile cpus would happen 2015. broadwell cpus available intel hardware partners sample quantities intel expected release 17 broadwell u series family microprocessors ces 2015 also according leak posted vr-zone broadwell-e chips would available 2016 intel unveiled formally 14 nm manufacturing process indicated mobile variants process would known core products additionally core products announced shipping end 2014 desktop variants shipping shortly broadwell intel focused mainly laptops miniature desktops all-in-one systems left traditional desktop users new socketed cpu options beyond fourth-generation haswell first arrived 2013 even though company finally introduced two broadwell desktop chips summer 2015 launched high-end sixth-generation skylake cpus shortly thereafter september 2015 kirk skaugen senior vice president general manager intel client computing group admitted skipping desktops broadwell poor decision end-of-life windows xp 2014 lack new desktop chips intel given desktop pc users good reasons upgrade 2015 intel launched first three broadwell-based processors belong low-tdp core family core 5y10 core 5y10a core 5y70 first laptop broadwell intel core 5y70 cpu lenovo yoga 3 pro launched four broadwell based cpus launched belonging core family increasing number launched broadwell cpus seven 17 additional broadwell laptop cpus launched celeron pentium core i3 i5 i7 series intel officially launched 14 nm broadwell-ep xeon e5 v4 cpus intel officially launched 14 nm broadwell-e core i7 69xx/68xx processor family | [
3459,
5380,
3973,
8325,
9092,
9095,
5386,
9611,
4108,
9741,
398,
8719,
5649,
7313,
5523,
6804,
8851,
4886,
407,
3352,
8855,
9111,
9500,
5883,
2088,
10669,
9391,
10675,
4276,
1461,
10548,
2237,
1085,
5309,
6463,
833,
8125,
6339,
5444,
8126... | Test |
4,218 | 2 | Operating_system_service_management:operating system service management computing mechanisms techniques managing services often differ operating system examples operating system service management init | [
9540,
6797,
8877,
3758,
7983,
5397
] | None |
4,219 | 7 | Comparison_of_streaming_media_systems:comparison streaming media systems comparison streaming media systems complete list streaming media systems also available following tables compare general technical information number streaming media systems audio video please see individual systems linked articles information information digital container formats supported information internet protocols supported broadcasting streaming media content | [
10368,
8833,
1674,
11413,
10270,
6435,
1700,
9380,
9381,
6058,
10924,
4147,
7991,
823,
8124,
3019,
9167,
1107,
6380,
753,
7921,
5492
] | None |
4,220 | 3 | Macintosh_Quadra_630:macintosh quadra 630 macintosh quadra 630 also sold macintosh lc 630 macintosh performa 630 personal computer designed manufactured sold apple computer inc. july 1994 october 1995 introduced replacement quadra 610 least-expensive computer macintosh lineup prices starting 1,199 usd apple transition powerpc cpus already begun introduction power macintosh months prior 630 built around older motorola 68040 68lc040 chips two reasons cited one older chips less expensive two powerpc-native education software almost non-existent time also existing powerpc software yet translated non-english languages 630 last new macintosh quadra introduced though earlier quadra 950 remained available longer discontinued direct replacement 630 form factor retained power macintosh 6200 introduced months earlier entry price 2,300 cost nearly twice much power macintosh 4400 apple inexpensive power macintosh 1,725 still cost several hundred dollars 630 form factor quadra 630 introduced new case design macintosh family front headphone jack volume up/down buttons included first macintosh infrared receiver intended use remote included tv tuner card included performa 637cd 638cd models case motherboard accessible opening cover bottom rear case sliding drawer motherboard mounted similar lc 575 memory 630 models 4 mb memory soldered logic board depending logic board system either one two simm slots cases first simm slot requires 80nm non-parity chips refresh rate 2k better 4 8 16 32 mb simms work second slot supports single-sided simm cards 16 mb size maximum memory therefore 52 mb two-slot systems 36 mb one-slot systems hard drive controller one big differences compared previous macintosh models choice internal hard drive interface conforming standards ibm pc compatible platform cheaper slower ide drives used instead scsi first time external scsi port still available cd-rom used scsi internally 630 used older controller much slower ones used higher-end macs time video one external monitor supported db-15 connector non-upgradeable 1 mb dram soldered motherboard provides resolution 640x480 16-bit color 832x624 8-bit color separate video card required 24-bit color higher resolutions choice use dram instead vram saves money due commonality results lower performance increased chance flickering testing macworld described video performance quadra 630 mediocre cd-rom models equipped cd-rom use apple cd 300i plus 2x-speed scsi drive capable reading 656mb 748mb data cds well audio cds caddy tray quadra 610 replaced tray-based loading mechanism remote control models equipped tv/video system included sony rmc-a1 remote control consequently remote would control macintosh compatible sony television time performance macworld magazine ran benchmarks time quadra release reported performance similar quadra 950 slightly slower 800 quadra 630 different names depending target market macintosh quadra 630 professional business use macintosh lc 630 k-12 educational market macintosh performa 630 consumer higher-education markets performa 630 sold several slightly different model numbers depending included hardware software features models included 14 shadow mask crt called apple performa plus display introduced july 1 1994 introduced july 18 1994 introduced november 3 1994 introduced april 3 1995 introduced may 1 1995 introduced july 17 1995 | [
7697,
4114,
6165,
11289,
7706,
8222,
1057,
6183,
1576,
4139,
7211,
8253,
1090,
4180,
10838,
10840,
3167,
9312,
8806,
6258,
10357,
10365,
10878,
6783,
4741,
7305,
8842,
6283,
7824,
147,
7830,
6807,
4258,
7842,
7844,
7869,
8893,
8896,
4807,
... | Test |
4,221 | 6 | Hardware-based_full_disk_encryption:hardware-based full disk encryption hardware-based full disk encryption fde available many hard disk drive hdd vendors including istorage limited seagate technology hitachi western digital samsung toshiba also solid-state drive vendors ocz sandisk samsung micron integral memory symmetric encryption key maintained independently cpu thus removing computer memory potential attack vector relation hard disk drives term self-encrypting drive sed common usage hardware-fde two major components hardware encryptor data store currently three varieties hardware-fde common use hdd fde made hdd vendors using opal enterprise standards developed trusted computing group key management takes place within hard disk controller encryption keys 128 256 bit advanced encryption standard aes keys authentication power drive must still take place within cpu via either software pre-boot authentication environment i.e. software-based full disk encryption component hybrid full disk encryption bios password hitachi micron seagate samsung toshiba disk drive manufacturers offering tcg opal sata drives older technologies include proprietary seagate drivetrust older less secure pata security command standard shipped drive makers including western digital enterprise sas versions tcg standard called tcg enterprise drives within standard hard drive form factor case encryptor bc smaller form factor commercially available hard disk drive enclosed example viasat formerly stonewood electronics flagstone eclypt drives encryptor bridge chipset bc placed computer standard hard disk drive encrypting every sector written intel announced release danbury chipset since abandoned approach hardware-based encryption built drive within drive enclosure notably transparent user drive except bootup authentication operates like drive degradation performance complication performance overhead unlike disk encryption software since encryption invisible operating system host computers processor two main use cases data rest protection cryptographic disk erasure data rest protection laptop simply powered disk self-protects data data safe even os encrypted secure mode aes locked reading writing drive requires authentication code strong 32 bytes 2^256 unlock crypto-shredding practice 'deleting data deleting overwriting encryption keys cryptographic disk erasure crypto erase command given proper authentication credentials drive self-generates new media encryption key goes 'new drive state without old key old data becomes irretrievable therefore efficient means providing disk sanitization lengthy costly process example unencrypted unclassified computer hard drive requires sanitizing conform department defense standards must overwritten 3+ times one terabyte enterprise sata3 disk would take many hours complete process although use faster solid-state drives ssd technologies improves situation take enterprise far slow problem worsen disk sizes increase every year encrypted drives complete secure data erasure action takes milliseconds simple key change drive safely repurposed quickly sanitization activity protected seds drive key management system built firmware order prevent accidental data erasure confirmation passwords secure authentications related original key required way retrieve data erased way keys self generated randomly record anywhere protecting data accidental loss theft achieved consistent comprehensive data backup policy recent hardware models circumvents booting devices allowing access using dual master boot record mbr system whereby mbr operating system data files encrypted along special mbr required boot operating system data requests intercepted sed firmware allow decryption take place unless system booted special sed operating system load mbr encrypted part drive works separate partition hidden view contains proprietary operating system encryption management system means boot methods allow access drive typical self-encrypting drives unlocked remain unlocked long power provided researchers universität erlangen-nürnberg demonstrated number attacks based moving drive another computer without cutting power additionally may possible reboot computer attacker-controlled operating system without cutting power drive computer self-encrypting drive put sleep mode drive powered encryption password retained memory drive quickly resumed without requesting password attacker take advantage gain easier physical access drive instance inserting extension cables firmware drive may compromised data sent may risk even data encrypted physical medium drive fact firmware controlled malicious third-party means decrypted third-party data encrypted operating system sent scrambled form drive would matter firmware malicious | [
672,
1251,
8900,
9894,
11368,
1801,
1515,
7983,
1776,
2416,
7794,
2932,
3572,
5433,
1978,
2525,
7519
] | Test |
4,222 | 8 | WebLogic_(company):weblogic company weblogic company 1995 1998 credited creating first j2ee application server weblogic application server paul ambrose bob pasker laurie pitman carl resnikoff founded weblogic inc. september 1995 founders worked together pursue eventually became application server 1998 weblogic appointed ali kutay president ceo weblogic funded regis mckenna frank j. caufield bea systems acquired weblogic inc. 1998 oracle corporation acquired bea systems 2008 | [
3560,
1250,
4166
] | Test |
4,223 | 4 | Degradation_(telecommunications):degradation telecommunications telecommunication degradation loss quality electronic signal may categorized either graceful catastrophic following meanings several forms causes degradation electric signals time domain physical domain including runt pulse voltage spike jitter wander swim drift glitch ringing crosstalk antenna effect antenna effect ic manufacturing phase noise degradation usually refers reduction quality analog digital signal signal transmitted received undergoes changes undesirable changes called degradation degradation usually caused | [
2882,
10675,
6861
] | Test |
4,224 | 4 | Domain_fronting:domain fronting domain fronting technique circumvents internet censorship obfuscating domain https connection working application layer domain fronting allows user connect service may otherwise blocked dns ip deep packet inspection one configuration large hosting service amazon s3 google app engine uses shared sni certificate containing common target https domains domain name actual blocked endpoint communicated establishment encrypted https connection http host header making invisible censors done blocked innocuous sites hosted large provider google app engine configurations allow content delivery network common https certificate infrastructure act reflector target server behind techniques work using different domain names different layers communication domain name innocuous site used initialize connection domain name exposed censor clear-text part dns request tls server name indication given domain name censors typically unable differentiate circumvention traffic legitimate traffic forced either allow traffic domain name including circumvention traffic block domain name entirely may result expensive collateral damage google disabled domain fronting april 2018 saying never supported feature google amazon also decided disable domain fronting cloudfront april 2018 claiming already handled breach aws terms service effort google amazon part due pressure russian government telegram domain fronting activity using cloud providers services | [
10368,
5254,
138,
4876,
5135,
1692,
9117,
3625,
11693,
10417,
8630,
8640,
3777,
11201,
2884,
3781,
2887,
2661,
10341,
9193,
4725,
5749,
5887
] | None |
4,225 | 3 | Openmoko:openmoko openmoko project create family open source mobile phones including hardware specification operating system openmoko linux actual smartphone development implementation like neo 1973 neo freerunner whole project sponsored openmoko inc first sub-project openmoko linux linux-based operating system designed mobile phones built using free software second sub-project developing hardware devices openmoko linux runs first device released neo 1973 ref name= openmoko.org/wiki/neo1973 /ref 2007 followed neo freerunner 25 june 2008 2 april 2009 openmoko suspended development third device codenamed gta03 focus freerunner 2010 development gta03 continued golden delicious computers new codename gta04 includes major hardware revision first unit shipped 10 october 2011 unlike mobile phone platforms phones designed provide end users ability modify operating system software stack openmoko-supported phones also available project openmoko announced 7 november 2006 founders first international computer fic initial core team openmoko project included werner almesberger michael lauer sean moss-pultz harald welte name openmoko acronym open mobile kommunikations codename phone product series gta abbreviation gsm-ti-agps indicates main components phone originally openmoko inc. developed operating system phones called openmoko linux om uses linux kernel together graphical user environment built using x.org server openembedded build framework opkg package system used create maintain software packages initial version named om 2007 used gtk+ toolkit matchbox window manager om 2008 released august 2008 added support qt toolkit enlightenment 17 despite continuous improvements versions reach stable state result openmoko started developing om 2009 goal providing stable environment based middleware freesmartphone.org project financed openmoko however version finished either april 2009 openmoko cancelled development software task taken several efforts community several groups created modified versions original software ported systems work phones among others openmoko phones support android debian gentoo qt extended improved qtmoko shr openmoko hardware aspires term open-source hardware although various areas availability cell phone components legal requirements prevent full conformance term many vendors openmoko inc. notoriously failed meet publicly announced hardware release dates postponed releases many times first supported phone neo 1973 gta01 version bv4 distributed exclusively openmoko.com july 2007 february 2008 second revision hardware based gta01 design dash express automotive navigation system dash express faster cpu samsung 2440 wi-fi ability third hardware platform neo freerunner codenamed gta02 improved version neo 1973 neo 1973 codenamed gta01 phone developers release device named first year cellular telephone communication inventor cellular phone martin cooper made first call 1973 phone released inconsistently-named neo 1973 neo1973 neo 1973 sold july 9 2007 february 2008 priced us 300 basic model us 450 kit including tools hardware work initial releases neo 1973 hampered supplier shortages forced shipping date slip hardware development difficulties exacerbated small size core team furthermore platforms ported neo 1973 including qt extended debian android phone supports 900 mhz 1800 mhz 1900 mhz gsm frequency bands many linux unix programs used desktop server platforms including utilities games successfully run phone addition linux netbsd freebsd l4 kernels adapted users run platform development hardware platform emulated software high level compatibility using version qemu included openmoko software suite shortly shipping successor neo freerunner openmoko project released cad files schematics development resources neo 1973 freerunner creative commons license cc by-sa 3.0 schematics available download openmoko creative commons attribution sharealike license neo freerunner codenamed gta02 successor neo 1973 changes include faster processor clocked 400 mhz 802.11b/g wi-fi two accelerometers 3d graphics acceleration released mass market 25 june 2008 intended users high demand customizability neo freerunner started shipping june 24 2008 priced individually us 250 us 200 purchased multiples five debug board available us 99 neo freerunner includes features present development release phone neo 1973 changes include 802.11 b/g wi-fi smedia 3362 graphics accelerator two 3d accelerometers samsung 2442 soc 256 mb flash memory 2008.08 software revision gsm phone module working reliably freerunner hardware yet fully functional software interfaces software development split qtopia x11 gtk+ fso debian also derivates openmoko main distribution shr fdom fat dirty openmoko vanilla qtopia distribution recommended openmoko users wishing use early development stage software fdom want test latest features fixes without worrying stability also possible run inferno openmoko neo freerunner android patched run openmoko neo freerunner least two different developers openwrt compiled neo freerunner neo freerunner makes appearance william gibson 2010 novel zero history phone initially used character milgrim 2 january 2008 dash express gps device hardware developed openmoko inc. announced running openmoko linux device initially codenamed hxd8 seems use little none openmoko user-interface simply using patches kernel developed openmoko inc running application dash navigation provide navigation user interface lack reference material happened gta03 codename 3d7k openmoko built 3 working prototypes capacitive touchscreens fully transparent curved case latest product openmoko inc. wikireader device read wikipedia articles offline german engineering firm golden delicious computers began producing gta04 800 mhz cortex-a8 arm 1 ghz processor 800 mhz c64x+ dsp digital signal processor core 3d graphics accelerator specifications 512mb ram combined 512mb nand flash 32gb expandable microsdhc would similar performance iphone 4 iphone 4s golden delicious gta04 board designed exchange gta02 board neo freerunner housing gta01 board neo 1973 housing release openmoko beagle hybrid platform using beagle board basis developing prototyping next generation openmoko phone following month golden delicious stated long-term goal bringing phone market new gta04 board fit neo freerunner case connected existing display components first batch gta04a3 ea early adopter started shipping 10 october 2011 version gta04a4 first batch started shipping 31 january 2012 design next revision gta04a5 contained minor relevant upgrades design parts replacement end-of-life components production crowd funded also possible order ready made phone called openphoenux gta04 complete hardware | [
10813,
11391,
456,
10760,
6763,
2235,
495,
1776,
7983,
1138,
1524,
9237,
823,
8122,
1083,
2492,
6301,
4479
] | None |
4,226 | 1 | Swedish_Film_Database:swedish film database swedish film database internet database swedish films published swedish film institute contains information swedish films 1897 onwards foreign films cinema premiere sweden also provides lot biographies actors directors producers etc participated swedish films years created support bank sweden tercentenary foundation database comprises 62,000 films 17,000 swedish films 265,000 people | [] | None |
4,227 | 5 | Superframe:superframe telecommunications superframe sf t1 framing standard 1970s replaced original t1/d1 framing scheme 1960s framing bit simply alternated 0 1 superframe sometimes called d4 framing avoid confusion single-frequency signaling first supported d2 channel bank first widely deployed d4 channel bank order determine channel located stream data received set 24 channels aligned frame frame 192 bits long 8 24 terminated 193rd bit framing bit used find end frame order framing bit located receiving equipment predictable pattern sent bit equipment search bit correct pattern align framing based bit pattern sent 12 bits long every group 12 frames called superframe pattern used 193rd bit 100011 011100 channel sends two bits call supervision data superframe using robbed-bit signaling frames 6 12 superframe specifically 6th 12th bit superframe pattern least significant data bit channel bit 8 t1 data sent big-endian uses 1-origin numbering replaced channel-associated signalling bit bits b respectively superframe remained service many places turn century replaced improved extended superframe esf 1980s applications additional features desired | [
8192,
3156,
2894
] | Test |
4,228 | 3 | Wintel:wintel wintel partnership microsoft windows intel producing personal computers using intel x86-compatible processors running microsoft windows word wintel blend windows intel early 1980s chaos incompatibility rife early microcomputer market given way smaller number de facto industry standards including s-100 bus cp/m apple ii microsoft basic read-only memory rom inch floppy drive single firm controlled industry fierce competition ensured innovation hardware software rule rather exception microsoft windows intel processors gained ascendance ongoing alliance gave market dominance intel claimed partnership enabled two companies give customers benefit seemingly unending spiral falling prices rising performance addition claim history innovation shared vision flexible computing agile business 1981 ibm entered microcomputer market ibm pc created small subdivision firm unusual ibm product largely sourced outside component suppliers intended run third-party operating systems software ibm published technical specifications schematics pc allowed third-party companies produce compatible hardware so-called open architecture ibm pc became one successful computers time key feature ibm pc ibm enormous public respect behind accident history ibm pc happened intel cpu instead technically superior motorola 68000 tipped ibm in-house design shipped ibm pc dos licensed version microsoft ms-dos rather cp/m-86 operating system accidents enormous significance later years ibm pc ibm product ibm badge personal computers became respectable became easier business justify buying microcomputer even year two easiest justify buying ibm personal computer since pc architecture well documented ibm manuals pc dos designed similar earlier cp/m operating system pc soon thousands different third-party add-in cards software packages available made pc preferred option many since pc supported hardware software needed industry competitors took one several approaches changing market apple amiga atari acorn persevered independent quite different systems systems apple macintosh one remaining market macintoshes since december 2006 fact wintel-compatible hardware level least others digital world second-largest computer company hewlett-packard apricot concentrated making similar technically superior models early market leaders tandy-radio shack texas instruments stayed outdated architectures proprietary operating systems time belatedly realizing way market trends going switching successful long-term business strategy build machine duplicated ibm pc closely possible sell slightly lower price higher performance given conservative engineering early ibm personal computers higher average prices terribly difficult task first bar great technical challenge crafting bios duplicated function ibm bios exactly infringe copyrights two early leaders last strategy start-up companies columbia data products compaq first achieve reputations close compatibility ibm machines meant could run software written ibm machine without recompilation long ibm best-selling personal computer world least two next-best sellers practical purposes identical software industry effect profound first meant rational write ibm pc clones high priority port versions less common systems leisure second even importantly software writer pre-ibm days careful use plain subset possible techniques practicable able run hardware ran cp/m major part market using exact hardware similar clone practical take advantage every hardware-specific feature offered ibm independent bios companies like award chips technologies phoenix began market clean room bios 100 compatible ibm time competent computer manufacturer could achieve ibm compatibility matter routine around 1984 market fast growing relatively stable yet sign win half wintel though microsoft achieving enormous revenues dos sales ibm ever-growing list manufacturers agreed buy ms-dos license every machine made even shipped competing products intel every pc made either intel processor one made second source supplier license intel intel microsoft enormous revenues compaq many makers made far machines ibm power decide shape personal computer rested firmly ibm hands 1987 ibm introduced ps/2 computer line although open architecture pc successors great success biggest single manufacturer market buying faster cheaper ibm-compatible machines made firms ps/2s remained software compatible hardware quite different introduced technically superior micro channel architecture bus higher speed communication within system failed maintain open bus later called isa bus meant none millions existing add-in cards would function words new ibm machines ibm-compatible ibm planned ps/2 way technical legal reasons would difficult clone instead ibm offered sell ps/2 licence anyone could afford royalty would require royalty every ps/2-compatible machine sold also payment every ibm-compatible machine particular maker ever made past many pc manufacturers signed ps/2 licensees apricot lost badly persevering better pc ibm strategy time one many others many others decided hold committing major manufacturers known gang nine decided group together decide bus type would open manufacturers fast faster ibm microchannel yet still retain backward compatibility isa crucial turning point industry whole longer content let ibm make major decisions technical direction event new eisa bus commercial failure beyond high end time cost implementing eisa reduced extent would implemented desktop pcs much cheaper vesa local bus removed need desktop pcs though remained common servers due example possibility data corruption hard disk drives attached vlb controllers intel pci bus around corner although eisa systems sold achieved purpose ibm longer controlled computer industry ibm would belatedly amend ps/2 series ps/valuepoint line tracked features emerging ad hoc platform around time end 1980s beginning 1990s microsoft windows operating environment started become popular microsoft competitor digital research started recover share dos press dos market dr-dos ibm planned replace dos vastly superior os/2 originally ibm/microsoft joint venture unlike ps/2 hardware highly backward compatible microsoft preferred push industry direction product windows ibm suffering greatest ever public humiliation wake ps/2 disaster massive financial losses marked lack company unity direction microsoft combination soft marketing voice big financial stick effective windows became de facto standard competing computer manufacturers large small common factors provide joint technical leadership operating software microsoft cpus intel following years firms wintel partnership would attempt extend monopolies intel made successful major push motherboard chipset markets—becoming largest motherboard manufacturer world one stage almost chipset manufacturer—but badly fumbled attempt move graphics chip market 1991 faced sharp competition core cpu territory amd cyrix via transmeta microsoft fared better 1990 microsoft two competitors core market digital research ibm intel none 1996 intel two competitors core market cpus microsoft none microsoft pursued policy insisting per-processor royalties thus making competing operating systems unattractive computer manufacturers provoking regulatory scrutiny european commission us authorities leading undertaking microsoft cease practices however integration dos windows 95 masterstroke operating system vendors frozen microsoft could require computer manufacturers comply demands pain higher prices required ibm stop actively marketing os/2 else pay twice much windows 95 competitor compaq withholding designed windows 95 endorsement regarded essential hardware marketing tool microsoft also able require free publicity given hardware makers example windows key advertising symbols nearly modern keyboards strict license restrictions may may displayed system boot windows desktop also microsoft able take networking market formerly domain artisoft lantastic novell*s netware windows nt business application market formerly led lotus wordperfect microsoft office although microsoft far dominant player wintel partnership intel continuing influence underestimated intel microsoft closest partners operated uneasy distance one another since first major dispute intel heavy investment 32-bit optimized pentium pro microsoft delivery unexpectedly high proportion 16-bit code windows 95 firms talk one another competitors time time notably microsoft close relationship amd development windows xp professional x64 edition utilizing amd-designed 64-bit extensions x86 architecture intel decision sell processors apple inc wintel platform still dominant desktop laptop computer architecture opinions microsoft windows natural software bloat eaten much hardware progress intel processors gave wintel platform via moore law rise smartphones netbooks media outlets speculated predicting possible end wintel dominance cheap devices employing technologies intel investing linux microsoft ported windows arm architecture windows 8 strictest sense wintel refers computers run windows intel processor however wintel commonly used refer system running modern microsoft operating system modern x86 compatible cpu manufactured either intel amd pc applications run x86 intel processor usually run x86 amd processor mid-october 2017 microsoft announced windows 10 qualcomm snapdragon final stage testing would considered wintel systems running microsoft operating system using intel processor based itanium arm architecture despite fact processor manufactured intel also considered wintel system | [
6913,
6148,
6797,
8976,
5523,
2452,
6419,
9363,
3883,
1324,
5681,
178,
4409,
9913,
1083,
11068,
10051,
9166,
1501,
2273,
7269,
1515,
9964,
11627,
6129,
499,
3445,
5368,
8700
] | Test |
4,229 | 5 | Gnutella:gnutella gnutella large peer-to-peer network first decentralized peer-to-peer network kind leading later networks adopting model celebrated decade existence march 14 2010 user base millions peer-to-peer file sharing june 2005 gnutella population 1.81 million computers increasing three million nodes january 2006 late 2007 popular file-sharing network internet estimated market share 40 first client also called gnutella network got name developed justin frankel tom pepper nullsoft early 2000 soon company acquisition aol march 14 program made available download nullsoft servers event prematurely announced slashdot thousands downloaded program day source code released later gnu general public license gpl however original developers never got chance accomplish purpose next day aol stopped availability program legal concerns restrained nullsoft work project stop gnutella days protocol reverse engineered compatible free open source clones began appear parallel development different clients different groups remains modus operandi gnutella development today among first independent gnutella pioneers gene kan spencer kimball launched first portal aimed assemble open-source community work gnutella also developed gnubile one first open-source gnu-gpl programs implement gnutella protocol gnutella network fully distributed alternative semi-centralized systems fasttrack kazaa original napster initial popularity network spurred napster threatened legal demise early 2001 growing surge popularity revealed limits initial protocol scalability early 2001 variations protocol first implemented proprietary closed source clients allowed improvement scalability instead treating every user client server users treated ultrapeers routing search requests responses users connected allowed network grow popularity late 2001 gnutella client limewire basic became free open source february 2002 morpheus commercial file sharing group abandoned fasttrack-based peer-to-peer software released new client based free open source gnutella client gnucleus word gnutella today refers one project piece software open protocol used various clients name portmanteau gnu nutella brand name italian hazelnut flavored spread supposedly frankel pepper ate lot nutella working original project intended license finished program gnu general public license gnutella associated gnu project gnu peer-to-peer network gnunet october 26 2010 popular gnutella client limewire ordered shut judge kimba wood united states district court southern district new york signed consent decree recording industry plaintiffs limewire agreed event likely cause notable drop size network negotiating injunction limewire staff inserted remote-disabling code software injunction came force users installed affected versions newer 5.5.10 cut p2p network since limewire free software nothing prevented creation forks omitted disabling code long limewire trademarks used shutdown affect example frostwire fork limewire created 2004 carries neither remote-disabling code adware november 9 2010 limewire resurrected secret team developers named limewire pirate edition based limewire 5.6 beta version server dependencies removed pro features enabled free envision gnutella originally worked imagine large circle users called nodes gnutella client software initial startup client software must bootstrap find least one node various methods used including pre-existing address list possibly working nodes shipped software using updated web caches known nodes called gnutella web caches udp host caches rarely even irc connected client requests list working addresses client tries connect nodes shipped well nodes receives clients reaches certain quota connects many nodes locally caching addresses yet tried discards addresses tried invalid user wants search client sends request actively connected node version 0.4 protocol number actively connected nodes client quite small around 5 node forwarded request actively connected nodes turn forwarded request packet reached predetermined number hops sender maximum 7 since version 0.6 2002 gnutella composite network made leaf nodes ultra nodes also called ultrapeers leaf nodes connected small number ultrapeers typically 3 ultrapeer connected 32 ultrapeers higher outdegree maximum number hops query travel lowered 4 leaves ultrapeers use query routing protocol exchange query routing table qrt table 64 ki-slots 2 mi-slots consisting hashed keywords leaf node sends qrt ultrapeers connected ultrapeers merge qrt leaves downsized 128 ki-slots plus qrt share files exchange neighbors query routing done hashing words query seeing whether match qrt ultrapeers check forwarding query leaf node also forwarding query peer ultra node provided last hop query travel search request turns result node result contacts searcher classic gnutella protocol response messages sent back along route query came query contain identifying information node scheme later revised search results delivered user datagram protocol udp directly node initiated search usually ultrapeer node thus current protocol queries carry ip address port number either node lowers amount traffic routed gnutella network making significantly scalable user decides download file negotiate file transfer node requested file firewalled querying node connect directly however node firewalled stopping source node receiving incoming connections client wanting download file sends so-called push request server remote client initiate connection instead push file first push requests routed along original chain used send query rather unreliable routes would often break routed packets always subject flow control therefore so-called push proxies introduced usually ultrapeers leaf node announced search results client connects one push proxies using http request proxy sends push request leaf behalf client normally also possible send push request udp push proxy efficient using tcp push proxies two advantages first ultrapeer-leaf connections stable routes makes push requests much reliable second reduces amount traffic routed gnutella network finally user disconnects client software saves list nodes actively connected collected pong packets use next time attempts connect becomes independent kind bootstrap services practice method searching gnutella network often unreliable node regular computer user constantly connecting disconnecting network never completely stable also bandwidth cost searching gnutella grew exponentially number connected users often saturating connections rendering slower nodes useless therefore search requests would often dropped queries reached small part network observation identified gnutella network unscalable distributed system inspired development distributed hash tables much scalable support exact-match rather keyword search address problems bottlenecks gnutella developers implemented tiered system ultrapeers leaves instead nodes considered equal nodes entering network kept 'edge network leaf responsible routing nodes capable routing messages promoted ultrapeers would accept leaf connections route searches network maintenance messages allowed searches propagate network allowed numerous alterations topology improved efficiency scalability greatly additionally gnutella adopted number techniques reduce traffic overhead make searches efficient notable query routing protocol qrp dynamic querying dq qrp search reaches clients likely files rare files searches grow vastly efficient dq search stops soon program acquired enough search results vastly reduces amount traffic caused popular searches gnutella users vast amount information improvements gnutella user-friendly style one benefits gnutella decentralized make difficult shut network make network users ones decide content available unlike napster entire network relied central server gnutella shut shutting one node impossible company control contents network also due many free open source gnutella clients share network gnutella operate purely query flooding-based protocol outdated gnutella version 0.4 network protocol employs five different packet types namely mainly concerned searching gnutella network file transfers handled using http development gnutella protocol currently led gnutella developers forum gdf many protocol extensions developed software vendors free gnutella developers gdf extensions include intelligent query routing sha-1 checksums query hit transmission via udp querying via udp dynamic queries via tcp file transfers via udp xml metadata source exchange also termed download mesh parallel downloading slices swarming efforts finalize protocol extensions gnutella 0.6 specification gnutella protocol development website gnutella 0.4 standard although still latest protocol specification since extensions exist proposals far outdated fact hard impossible connect today 0.4 handshakes according developers gdf version 0.6 new developers pursue using work-in-progress specifications gnutella protocol remains development spite attempts make clean break complexity inherited old gnutella 0.4 design clean new message architecture still one successful file-sharing protocols date following tables compare general technical information number applications supporting gnutella network tables attempt give complete list gnutella clients tables limited clients participate current gnutella network gnutella2 protocol often referred g2 despite name successor protocol gnutella related original gnutella project rather completely different protocol forked original project piggybacked gnutella name sore point many gnutella developers gnutella2 name conveys upgrade superiority led flame war criticism included use gnutella network bootstrap g2 peers poor documentation g2 protocol additionally frequent search retries shareaza client one initial g2 clients could unnecessarily burden gnutella network protocols undergone significant changes since fork 2002 g2 advantages disadvantages compared gnutella advantage often cited gnutella2 hybrid search efficient original gnutella query flooding later replaced efficient search methods starting query routing 2002 proposed 2001 limewire developers advantage gnutella users number millions whereas g2 network approximately order magnitude smaller difficult compare protocols current form individual client choice probably much effect end user either network | [
5251,
4229,
6534,
4490,
6797,
11029,
1558,
3350,
11413,
10522,
5405,
3366,
8998,
10924,
10807,
3770,
10173,
8640,
11073,
708,
6351,
3792,
6991,
6993,
7761,
3676,
5085,
5086,
479,
5470,
3428,
3813,
10341,
488,
5612,
877,
7921,
1908,
4725,
... | Validation |
4,230 | 2 | Henry_Poole_(technologist):henry poole technologist henry poole technologist social entrepreneur ceo civicactions board member free software foundation co-founded one first digital agencies vivid studios 1993 year served technical editor book demystifying multimedia 1994 led project study social interactions use technology well community 1995 firm managed online launch microsoft windows 95 largest online technology product introduction time 2000 poole joined ceo french gnu/linux publisher mandrakesoft 2001 poole founded first opensaas enterprise affero inc. 2002 published affero general public license version 1 poole joined board free software foundation december 2002 2003 poole managed digital team kucinich us president 2004 founded government digital services firm civicactions may 2006 poole free software foundation launched anti-drm campaign defective design software freedom activist poole organized fundraisers dmitry sklyarov free software foundation signatory 9/11 truth statement | [
2050,
2180,
11654,
4493,
1939,
802,
3618,
5555,
9148,
10687,
10822,
5703,
5833,
10192,
8147,
3674,
2010,
10464,
9579,
8304,
1394,
8436
] | Test |
4,231 | 2 | Dynamic_Language_Runtime:dynamic language runtime dynamic language runtime dlr microsoft runs top common language runtime clr provides computer language services dynamic languages services include dlr used implement dynamic languages .net framework including ironpython ironruby projects dynamic language implementations share common underlying system easier interact one another example possible use libraries dynamic language dynamic language addition hosting api allows interoperability statically typed cli languages like c visual basic .net microsoft dynamic language runtime project announced microsoft mix 2007 microsoft shipped .net dlr 0.9 beta november 2008 final 0.9 december 2008 version 1.0 shipped april 2010 july 2010 microsoft changed license dlr microsoft public license apache license v2.0 release .net 4 also april 2010 dlr incorporated .net framework open source dlr project hosted github additional features language implementers activity project since july 2010 release could linked including microsoft developer worked ironruby saw lack commitment microsoft dynamic languages .net framework dlr services currently used development version ironruby .net implementation ruby language ironpython 2007 microsoft planned use dlr upcoming visual basic 2010 vb 10.0 managed jscript ecmascript 3.0 however august 2009 microsoft plans implement managed jscript ecmascript 3.0 dlr like c visual basic access objects dynamic languages built dlr ironpython ironruby powershell 3.0 released windows 8 updated use dlr ironscheme upcoming scheme implementation planning build upon dlr idea abandoned dlr branch used project became sync trunk also according project coordinator current version dlr time could support majority scheme requirements dynamic language runtime built idea possible implement language specificities top generic language-agnostic abstract syntax tree whose nodes correspond specific functionality common many dynamic languages architecture backed idea number elementary language constructs would implemented generic stack inherently limited dlr dynamically generates code corresponding functionality expressed nodes compiler dynamic language implemented top dlr generate dlr abstract trees hand dlr libraries dlr provides dynamically-updated codice_1 objects cache task binding methods objects since type object—as well members contains—in dynamic languages change program lifetime method invocation must check method list see invocation valid one codice_1 objects represent cache state object methods update object reflected codice_1 objects well dlr routes method invocations via codice_1 objects performs fast lookup binding method actual implementation contrast efforts like parrot virtual machine dependencies da vinci machine built java jvm adding new bytecodes jvm instruction set dlr built top existing common language runtime .net framework virtual machine | [
10624,
9348,
8854,
11670,
3224,
10011,
3997,
4384,
11559,
2603,
7983,
9263,
1591,
1347,
1348,
9808,
11221,
9434,
2011,
603,
2145,
10083,
3821,
3573,
4853,
9726
] | Validation |
4,232 | 4 | De-identification:de-identification de-identification process used prevent someone personal identity revealed example data produced human subject research might de-identified preserve privacy research participants applied metadata general data identification process also known data anonymization common strategies include deleting masking personal identifiers personal name suppressing generalizing quasi-identifiers date birth reverse process using de-identified data identify individuals known data re-identification successful re-identifications cast doubt de-identification effectiveness systematic review fourteen distinct re-identification attacks found high re-identification rate … dominated small-scale studies data de-identified according existing standards de-identification adopted one main approaches data privacy protection commonly used fields communications multimedia biometrics big data cloud computing data mining internet social networks audio–video surveillance survey conducted census collect information group people encourage participation protect privacy survey respondents researchers attempt design survey way people participate survey result published possible match participant individual response data published result online shopping website wants know users preferences shopping habits decides retrieve customers data database analysis personal data information including personal identifiers collected directly customers created accounts website needs pre-handle data de-identification techniques analyzing data records avoid violating customers privacy anonymization refers irreversibly severing data set identity data contributor study prevent future re-identification even study organizers condition de-identification also severing data set identity data contributor may include preserving identifying information re-linked trusted party certain situations debate technology community whether data re-linked even trusted party ever considered de-identified common strategies de-identification masking personal identifiers generalizing quasi-identifiers pseudonymization main technique used mask personal identifiers data records k-anonymization usually adopted generalizing quasi-identifiers pseudonymization performed replacing real names temporary id deletes masks personal identifiers make individuals unidentified method makes possible track individual record time even though record updated however prevent individual identified specific combinations attributes data record indirectly identify individual k-anonymization defines attributes indirectly points individual identity quasi-identifiers qis deal data making least k individuals combination qi values qi values handled following specific standards example k-anonymization replaces original data records new range values keep values unchanged new combination qi values prevents individual identified also avoid destroying data records research de-identification driven mostly protecting health information libraries adopted methods used healthcare industry preserve readers privacy big data de-identification widely adopted individuals organizations.with development social media e-commerce big data de-identification sometimes required often used data privacy users personal data collected companies third-party organizations analyze personal usage smart cities de-identification may required protect privacy residents workers visitors without strict regulation de-identification may difficult sensors collect information without consent whenever person participates genetics research donation biological specimen often results creation large amount personalized data data uniquely difficult de-identify anonymization genetic data particularly difficult huge amount genotypic information biospecimens ties specimens often medical history advent modern bioinformatics tools data mining demonstrations data individuals aggregate collections genotypic data sets tied identities specimen donors researchers suggested reasonable ever promise participants genetics research retain anonymity instead participants taught limits using coded identifiers de-identification process may 2014 united states president council advisors science technology found de-identification somewhat useful added safeguard useful basis policy robust near‐term future re‐identification methods hipaa privacy rule provides mechanisms using disclosing health data responsibly without need patient consent mechanisms center two hipaa de-identification standards – safe harbor expert determination method safe harbor relies removal specific patient identifiers e.g name phone number email address etc expert determination method requires knowledge experience generally accepted statistical scientific principles methods render information individually identifiable safe harbor method uses list approach de-identification two requirements expert determination takes risk-based approach de-identification applies current standards best practices research determine likelihood person could identified protected health information method requires person appropriate knowledge experience generally accepted statistical scientific principles methods render information individually identifiable requires key law research electronic health record data hipaa privacy rule law allows use electronic health record deceased subjects research hipaa privacy rule section 164.512 1 iii | [
7781,
4749,
3858,
10102,
8471
] | Test |
4,233 | 8 | Oracle_Application_Server:oracle application server oracle application server 10g g stands grid short oracle consists integrated standards-based software platform forms part oracle corporation fusion middleware technology stack heart oracle application server consists oracle http server based apache http server oc4j oracleas containers java ee deploys java ee-based applications version oc4j offers full compatibility java ee 1.4 specifications oracle application server became first platform designed grid computing well full life-cycle support service-oriented architecture soa release oracle application server 10g r3 feature metadata repository tier relying instead metadata repositories provided previous releases following oracle acquisition bea systems “ key features integrated weblogic server seamless migration ” oracle corporation marketed first application server using name oracle web server ows subsequent repackaging resulted oracle application server oas later product superseding oas became internet application server oracle corporation subdivides products varying editions — apparently facilitate marketing license-tracking available oracle editions include oracle corporation refers implementation java ee specification oracle containers j2ee abbreviates concept oc4j oc4j originally based ironflare orion application server developed solely oracle control since oracle corporation acquired source code oc4j includes following servers oracle application server utilize oracle infrastructure database — oracle database instance supporting oracle metadata repository and/or oracle identity management opmn oracle process management notification server monitors components oracle application server opmnctl command starts stops monitors oracle components | [
865,
8994,
5956,
3558,
7175,
3560,
7944,
4107,
5612,
9867,
6286,
7983,
10193,
6067,
1367,
10553,
3517,
3710
] | None |
4,234 | 4 | LogLogic:loglogic loglogic technology company specializes security management compliance reporting operations products loglogic developed first appliance-based log management platform loglogic log management platform collects correlates user activity event data loglogic products used many world largest enterprises rapidly identify alert compliance violations policy breaches cyber attacks insider threats loglogic founded 2002 jason destefano thomas grabowski peter jordan minneapolis mn company established help system administrators automate management log data diagnose system problems 2009 loglogic released database security compliance management products acquired security information event management siem company 2012 company acquired tibco loglogic makes computer appliance system administrators compliance managers cios cisos use collect logs events network devices servers databases operating systems applications appliances also translate various log formats search logs generate alerts create graphs logging trends loglogic products help several industry compliance mandates standards payment card industry data security standard pci dss health insurance portability accountability act hipaa sarbanes-oxley sox focus ventures sequoia capital telesoft partners worldview technology partners invesco private capital sap ventures cm-cic private equity crédit agricole private equity elaia partners | [
11429,
2765,
3827,
11542,
8471,
5210
] | None |
4,235 | 3 | Sun_Ray:sun ray sun ray oracle stateless thin client solution aimed corporate environments originally introduced sun microsystems september 1999 discontinued oracle 2014 featured smart card reader several models featured integrated flat panel display idea stateless desktop significant shift eventual successor sun earlier line diskless java-only desktops javastation concept began sun microsystems laboratories 1997 project codenamed networkterminal newt client designed small low cost low power silent based sun microelectronics microsparc iiep processors initially considered included intel strongarm philips semiconductors trimedia national semiconductors geode microsparc iiep selected high level integration good performance low cost general availability newt included 8 mb edo dram 4 mb flash graphics controller used ati rage 128 low power 2d rendering performance low cost also included ati video encoder tv-out removed sun ray 1 philips semiconductor saa7114 video decoder/scaler crystal semiconductor audio codec sun microelectronics ethernet controller pci usb host interface 4 port hub i²c smart card interface motherboard daughtercard housed off-the-shelf commercial small form-factor pc case internal +12/+5vdc auto ranging power supply newt designed much feature parity modern business pc every way possible client n't use commercial operating system instead used real-time exec originally developed sun labs part ethernet-based security camera project codenamed netcam less 60 newt ever built survived however one collection computer history museum mountain view california july 2013 reports circulated oracle ending development sun ray related products scott mcnealy long-time ceo sun tweeted official announcement made august 1 2013 last order february 2014 support hardware maintenance available 2017 contrast thick client sun ray networked display device applications running server elsewhere state user session independent display enables another feature sun ray portable sessions user go one sun ray another continue work without closing programs smart card user insert card presented session reauthentication requirement depends mode operation without smart card procedure almost identical except user must specify username well password get session either case session yet exist new one created first time user connects sun ray clients connected via ethernet network sun ray server sun ray software srs available solaris linux operating systems sun developed separate network display protocol appliance link protocol alp sun ray system vmware announced support protocol vmware view 2008 sun ray software two basic modes operation—generic session kiosk mode generic session user see solaris gnu/linux login screen operating system running srs kiosk mode log screen varies depending session type use kiosk mode used number different desktop applications oracle integrated rdp client vmware view client sun ray software used kiosk mode start full screen windows session mode window manager unix desktop started windows environment os supports rdp 2007 sun uk company thruput integrated sun ray 2fs 28 2048 × 2048 30 2560 × 1600 56 3840 × 2160 displays 2008 trialled external graphics accelerator enables sun ray used high resolution display sun ray 3 models last production—last order date february 28 2014 last ship date august 31 2014 sun oem partners produced wi-fi notebook versions sun ray sun ray 1 clients used 100mhz microsparc iiep processor initially followed custom soc version codenamed copernicus us 6993,617 b2 based microsparc iiep core added 4mb on-chip dram usb smart card interface addition memory controller pci interface already microsparc iiep sun ray 2 3 clients use mips architecture-based rmi alchemy au1550 processor pure software implementation available sun ray software 5 srs5 commercial environments sun rays commonly deployed thin client access microsoft windows desktop using srss built-in rdp client uttsc desktop terminal server session virtual machine vdi setup flexible works well many environments intermediate sun ray server layer transparent windows desktop time however transparency also become issue software location dependent location dependent information needs added possible extend functionality sun ray software additional custom scripts sun ray wiki offers follow printing setup example e.g user always gets nearest printer default printer going room-to-room location-to-location also inside windows session relatively easy administrator extend add functionality required | [
3328,
9090,
9731,
8327,
1801,
6153,
6797,
1809,
4241,
9745,
2710,
1818,
8863,
7072,
9343,
8994,
5375,
1316,
10789,
1707,
2731,
5677,
3247,
6322,
2871,
823,
4664,
4285,
6464,
7104,
6338,
7234,
9665,
10436,
8007,
1480,
2895,
3919,
597,
3285... | None |
4,236 | 7 | Oracle_Cloud:oracle cloud oracle cloud cloud computing service offered oracle corporation providing servers storage network applications services global network oracle corporation managed data centers company allows services provisioned demand internet oracle cloud provides infrastructure service iaas platform service paas software service saas data service daas services used build deploy integrate extend applications cloud platform supports numerous open standards sql html5 rest etc open-source solutions kubernetes hadoop kafka etc variety programming languages databases tools frameworks including oracle-specific open source third-party software systems oracle branded infrastructure service oracle cloud infrastructure oci oracle cloud infrastructure offerings include following services oracle announced generation 2 cloud oracle openworld 2018 oracle branded platform service oracle cloud platform ocp oracle cloud platform offerings include following services july 28 2016 oracle bought netsuite first cloud company 9.3 billion may 16 2018 oracle announced acquired datascience.com privately held cloud workspace platform data science projects workloads oracle provides saas applications also known oracle cloud applications applications offered across variety products industrial sectors various deployment options adhere compliance standards list mentions oracle cloud applications provided oracle corporation platform known oracle data cloud platform aggregates analyzes consumer data powered oracle id graph across channels devices create cross-channel consumer understanding oracle cloud deployed public cloud private cloud hybrid cloud deployment models oracle cloud offered global network oracle corporation managed data centers oracle corporation deploys cloud regions inside region least three fault-independent availability domains availability domains contains independent data center power thermal network isolation oracle cloud generally available north america emea apac japan announced south america us gov regions coming soon oracle developers forum responsible engaging developer community provides information documentation discussion authored oracle community members large oracle offers certifications infrastructure service iaas platform service paas several specializations software service | [
1539,
526,
3086,
4623,
530,
10265,
5662,
5666,
9766,
39,
5159,
3121,
5681,
10820,
8262,
4683,
590,
1102,
7248,
5202,
5210,
1628,
4194,
5732,
10340,
2170,
11392,
6797,
10893,
8353,
6307,
2217,
10413,
9906,
7352,
3262,
4289,
3269,
1224,
636... | Test |
4,237 | 3 | Processor_supplementary_capability:processor supplementary capability processor supplementary capability feature added existing central processing unit cpu design initial introduction design marketplace supplementary capability increases usefulness processor design allowing compete favorably competitors giving consumers reason upgrade retaining backwards compatibility original design cpu supplementary instruction capability rule apply 8 16 bit cpus many cpus used mostly microcontrollers modern 32 64 bit cpus processor supplementary capability extend floating point units fpus memory management units mmus considered fundamental core functionalities extensions core functionalities mmu fpu may considered cpu extensions however supplementary instructions feature always assumed mean fixed sets instructions obligatory across cpus cpu family supplementary instructions simply found processors within family programmer wishes use supplementary feature cpu faced couple choices supplemental instruction programming options needed instructions fall back presumably slower otherwise less desirable alternative technique initiated else program may set run reduced functionality using lowest common denominator strategy avoiding use processor supplementary capabilities programs kept portable across machines architecture popular processor architectures x86 68000 mips seen many new capabilities introduced several generations design capabilities seen widespread adoption programmers spurring consumer upgrades making previous generations processors obsolete processor supplementary instructions instructions implemented certain processors within family present processors within particular family following instructions considered processor supplementary instructions ia-32 architecture instructions added later production processors part original ia-32 instruction set programs containing instructions may operate correctly machines ia-32 family fpu floating point unit maths co-processing capability available x86 processors since 80486dx series fpu mmu instruction sets x86 family considered supplementary instructions since introduction due importance core cpu functionality | [
5380,
2821,
4491,
6924,
6038,
9369,
9500,
2847,
5922,
1915,
2088,
7983,
9391,
1461,
8120,
8506,
1085,
7997,
8125,
8126,
833,
7234,
9541,
3142,
6730,
5326,
977,
2514,
5844,
7508,
9428,
8795,
3294,
2655,
1122,
7783,
10985,
9964,
5358,
9582,... | Validation |
4,238 | 2 | Linux-VServer:linux-vserver linux-vserver virtual private server implementation created adding operating system-level virtualization capabilities linux kernel developed distributed open-source software project started jacques gélinas maintained herbert pötzl related linux virtual server project implements network load balancing linux-vserver jail mechanism used securely partition resources computer system file system cpu time network addresses memory way processes mount denial-of-service attack anything outside partition partition called security context virtualized system within virtual private server chroot-like utility descending security contexts provided booting virtual private server simply matter kickstarting init new security context likewise shutting simply entails killing processes security context contexts robust enough boot many linux distributions unmodified including debian fedora virtual private servers commonly used web hosting services useful segregating customer accounts pooling resources containing potential security breaches save space installations virtual server file system created tree copy-on-write hard links template file system hard link marked special filesystem attribute modified securely transparently replaced real copy file linux-vserver provides two branches stable 2.2.x devel 2.3.x 2.6-series kernels single stable branch 2.4-series separate stable branch integrating grsecurity patch set also available | [
5120,
6150,
4616,
2058,
3082,
5139,
10780,
10785,
9762,
6180,
8242,
9266,
7733,
4161,
5697,
7234,
8772,
6213,
5702,
8268,
589,
7248,
593,
2645,
10851,
6244,
5222,
10856,
4207,
5244,
4734,
11391,
7812,
7821,
10382,
2195,
2711,
6808,
9882,
... | None |
4,239 | 4 | Security_Attribute_Modulation_Protocol:security attribute modulation protocol security attribute modulation protocol samp protocol used encode role based user based access control attributes transmission network typically embedded tcp/ip udp/ip packet application layer payload trailing afterwards sun microsystems makes brief mention samp trusted solaris 8 administration manuals case trusted solaris 8 trusted network daemon parses samp headers manages system security conjunction security provisions system | [
5280,
9665
] | Test |
4,240 | 4 | BlueKeep:bluekeep bluekeep security vulnerability discovered microsoft remote desktop protocol implementation allows possibility remote code execution first reported may 2019 present unpatched windows nt-based versions microsoft windows windows 2000 windows server 2008 r2 windows 7 microsoft issued security patch including out-of-band update several versions windows reached end-of-life windows xp 14 may 2019 13 august 2019 related bluekeep security vulnerabilities collectively named dejablue reported affect newer windows versions including windows 7 recent versions windows 10 operating system well older windows versions bluekeep security vulnerability first noted uk national cyber security centre 14 may 2019 reported microsoft vulnerability named bluekeep computer security expert kevin beaumont twitter bluekeep officially tracked wormable remote code execution vulnerability u.s. national security agency issued advisory vulnerability 4 june 2019 microsoft stated vulnerability could potentially used self-propagating worms microsoft based security researcher estimation nearly 1 million devices vulnerable saying theoretical attack could similar scale eternalblue-based attacks notpetya wannacry day nsa advisory researchers cert coordination center disclosed separate rdp-related security issue windows 10 may 2019 update windows server 2019 citing new behaviour rdp network level authentication nla login credentials cached client system user re-gain access rdp connection automatically network connection interrupted microsoft dismissed vulnerability intended behaviour disabled via group policy 1 june 2019 active malware vulnerability seems publicly known however undisclosed proof concept poc codes exploiting vulnerability may available 1 july 2019 sophos british security company reported working example poc order emphasize urgent need patch vulnerability 22 july 2019 details exploit purportedly revealed conference speaker chinese security firm 25 july 2019 computer experts reported commercial version exploit may available 31 july 2019 computer experts reported significant increase malicious rdp activity warn based histories exploits similar vulnerabilities active exploit bluekeep vulnerability wild may imminent 13 august 2019 related bluekeep security vulnerabilities collectively named dejablue reported affect newer windows versions including windows 7 recent versions operating system windows 10 well older windows versions rdp protocol uses virtual channels configured pre-authentication data path client server providing extensions rdp 5.1 defines 32 static virtual channels dynamic virtual channels contained within one static channels server binds virtual channel ms_t120 channel legitimate reason client connect static channel 31 heap corruption occurs allows arbitrary code execution system level windows xp windows vista windows 7 windows server 2003 windows server 2008 windows server 2008 r2 named microsoft vulnerable attack versions newer 7 windows 8 windows 10 affected cybersecurity infrastructure security agency stated also successfully achieved code execution via vulnerability windows 2000 microsoft released patches vulnerability 14 may 2019 windows xp windows vista windows 7 windows server 2003 windows server 2008 windows server 2008 r2 included versions windows end-of-life vista xp server 2003 longer eligible security updates patch forces aforementioned ms_t120 channel always bound 31 even requested otherwise rdp server nsa recommended additional measures disabling remote desktop services associated port used requiring network level authentication nla rdp according computer security company sophos two-factor authentication may make rdp issue less vulnerable however best protection take rdp internet switch rdp needed needed make rdp accessible via vpn | [
1024,
5636,
4117,
8726,
535,
9761,
4644,
4133,
5682,
1608,
3657,
8779,
11358,
4703,
8288,
8292,
5749,
10875,
3711,
8320,
5764,
2187,
6797,
4240,
2709,
1688,
2717,
9375,
7337,
9904,
9395,
8886,
8386,
3789,
7887,
4304,
9432,
4314,
9435,
431... | Test |
4,241 | 3 | Rock_(processor):rock processor rock rock multithreading multicore sparc microprocessor development sun microsystems canceled 2010 separate project sparc t-series coolthreads/niagara family processors rock aimed higher per-thread performance higher floating-point performance greater smp scalability niagara family rock processor targeted traditional high-end data-facing workloads back-end database servers well floating-point intensive high-performance computing workloads whereas niagara family targets network-facing workloads web servers rock processor implements 64-bit sparc v9 instruction set vis 3.0 simd multimedia instruction set extension rock processor 16 cores core capable running two threads simultaneously yielding 32 threads per chip servers built rock use fb-dimms increase reliability speed density memory systems rock processor uses 65 nm manufacturing process design frequency 2.3 ghz maximum power consumption rock processor chip approximately 250 w. 16 cores rock arranged four core clusters cores cluster share 32 kb instruction cache two 32 kb data caches two floating point units sun designed chip way server workloads usually high re-utilization data instruction across processes threads low number floating-point operations general thus sharing hardware resources among four cores cluster leads significant savings area power low impact performance 2005 sun publicly disclosed feature rock processor called hardware scout hardware scout uses otherwise idle chip execution resources perform prefetching cache misses march 2006 marc tremblay vice president chief architect sun scalable systems group gave presentation xerox palo alto research center parc thread-level parallelism hardware scouting thread-level speculation multithreading technologies expected included rock processor august 2007 sun confirmed rock would first production processor support transactional memory provide functionality two new instructions introduced chkpt commit one new status register cps instruction chkpt fail_pc used begin transaction commit commit transaction transaction abort condition detected jump fail_pc issued cps used determine reason support best-effort based addition data conflicts transactions aborted reasons include tlb misses interrupts certain commonly used function call sequences difficult instructions e.g. division nevertheless many arguably fine-grained code blocks requiring synchronization could benefited transactional memory support rock processor february 2008 marc tremblay announced unique feature called out-of-order retirement isscc benefits include replacing traditional instruction window much smaller deferred queue april 2008 sun engineers presented transactional memory interface transact 2008 adaptive transactional memory test platform simulator announced made available general public shortly rock processor intended used sun proposed supernova server line details server specifications released opensolaris architecture review case fwarc/2008/761 physical resource inventory pri specification arc 2008/761 indicates supernova platforms would support ieee 1275 openfirmware platform virtualization logical domains ldoms independent system controller sc fault management architecture fma domain services fma feature originally referenced fwarc/2006/141 closed extended fwarc/2008/455 successfully diagnose pci fabric errors occur root domains arc 2008/761 indicated planned support pci express pcie hot-pluggable slots well bridge older pci extended pci-x bronze servers would support pcie slots 0-5 silver servers would support i/o boards 0-1 pcie slots 0-7 board platinum servers would support i/o boards 0-3 pcie slots 0-7 board silver-ii servers would support pcie slots 00-19 platinum-ii servers would support boards 0-7 slots 0-3 board february 2005 ceo sun microsystems scott mcnealy stated taping rock would schedule later year however tape-out ultimately delayed january 2007 april 2007 sun ceo jonathan i. schwartz blogged image bga-packaged rock chip labeled ultrasparc rk disclosed could address 256 terabytes virtual memory single system running solaris next month sun announced created rock chip could boot operating system solaris successfully august year sun released details use transactional memory rock architecture however result entirely new design given uniqueness complexity release rock delayed 2008 2009 2008 mark moir presented rock transactional memory exploit sun labs open house 2008 discussing transactional memory well scouting threads mitigated computing problems solved innovative use massive thread counts slower processors september opensolaris project began integrate code supporting rock-based supernova program january 2009 sun ceo jonathan schwartz announced rock still track 2009 release 10 march 2009 dave dice yossi lev mark moir dan nussbaum presented early experience commercial hardware transactional memory implementation fourteenth international conference architectural support programming languages operating systems asplos '09 published experience hardware transactional memory htm feature two pre-production revisions new commercial multicore processor 2009 april 20 2009 sun oracle corporation announced entered definitive agreement oracle would acquire sun june 12 posting sun blog announced technical nda-only presentation rock july 14 2009 hamburg opensolaris users group meeting 15 june 2009 new york times reported two people briefed sun ’ plans said rock project canceled sun comment two days later ee times reported sun submit paper rock nowiki hot chips 21 /nowiki leading speculation company may canceled chip 24 june 2009 presentation speculative threading parallelization featured novel pipeline architecture implemented sun rock processor 36th international symposium computer architecture 6 august 2009 support rock removed opensolaris project 13 august 2009 presentation nztm nonblocking zero-indirection transactional memory written fuad tabba mark moir james goodman andrew hay cong wang presented 21st acm symposium parallelism algorithms architectures calgary canada nzstm algorithm performance evaluated sun ’ forthcoming rock processor 11 september 2009 register reported rock processor left sparc processor roadmap shown sun customers partners 15 september 2009 paper tm_db generic debugging library transactional programs written yossi lev maurice herlihy presented eighteenth international conference parallel architectures compilation techniques pact raleigh north carolina 26 october 2009 dave dice yossi lev mark moir dan nussbaum expanded formerly published paper early experience commercial hardware transactional memory implementation presented fourteenth international conference architectural support programming languages operating systems asplos '09 january 27 2010 oracle announced completed acquisition sun 5 april 2010 dave dice yossi lev virendra marathe mark moir marek olszewski dan nussbaum released paper simplifying concurrent algorithms exploiting hardware transactional memory presented 22nd acm symposium parallelism algorithms architectures spaa 2010 5 april 2010 dave dice nir shavit released paper tlrw return read-write lock presented spaa 2010 12 may 2010 reuters reported oracle ceo larry ellison shut rock project oracle acquired sun quoting saying processor two incredible virtues incredibly slow consumed vast amounts energy hot put 12 inches cooling fans top cool processor madness continue project | [
9090,
9731,
1801,
4235,
1809,
1818,
8863,
1707,
2731,
10926,
3247,
6322,
10675,
1461,
4664,
4285,
6464,
7104,
9665,
709,
2895,
3919,
597,
731,
6107,
2269,
9955,
11363,
4581,
7142,
7270,
11626,
11636,
1399,
9976,
1788
] | Test |
4,242 | 4 | TACACS:tacacs terminal access controller access-control system tacacs usually pronounced like tack-axe refers family related protocols handling remote authentication related services networked access control centralized server original tacacs protocol dates back 1984 used communicating authentication server common older unix networks spawned related protocols tacacs originally developed 1984 bbn technologies administering milnet ran unclassified network traffic darpa time would later evolve u.s. department defense niprnet originally designed means automate authentication – allowing someone already logged one host network connect another network without needing re-authenticate – first formally described bbn brian anderson december 1984 ietf rfc 927 cisco systems began supporting tacacs networking products late 1980s eventually adding several extensions protocol 1990 cisco extensions top tacacs became proprietary protocol called extended tacacs xtacacs although tacacs xtacacs open standards craig finseth university minnesota cisco assistance published description protocols 1993 ietf rfc 1492 informational purposes tacacs defined rfc 1492 uses either tcp udp port 49 default tacacs allows client accept username password send query tacacs authentication server sometimes called tacacs daemon simply tacacsd tacacsd uses tcp usually runs port 49 would determine whether accept deny authentication request send response back tip routing node accepting dial-up line connections user would normally want log would allow access based upon response way process making decision opened algorithms data used make decision complete control whomever running tacacs daemon xtacacs stands extended tacacs provides additional functionality tacacs protocol also separates authentication authorization accounting aaa functions separate processes even allowing handled separate servers technologies tacacs+ radius generally replaced tacacs xtacacs recently built updated networks tacacs+ entirely new protocol compatible predecessors tacacs xtacacs tacacs+ uses tcp radius operates udp since tcp connection oriented protocol tacacs+ implement transmission control radius however detect correct transmission errors like packet loss timeout etc since rides udp connectionless radius encrypts users password travels radius client radius server information username authorization accounting transmitted clear text therefore vulnerable different types attacks tacacs+ encrypts information mentioned therefore vulnerabilities present radius protocol tacacs+ cisco designed extension tacacs encrypts full content packet moreover provides granular control command command authorization | [
7,
3477,
11413,
2080,
2083,
8867,
9635,
2087,
10924,
6834,
4663,
5433,
5568,
10058,
6993,
6098,
4435,
6750,
2143,
8670,
2274,
6888,
1012,
5492,
5373
] | Test |
4,243 | 9 | ASTAP:astap astap advanced statistical analysis program general purpose analog electronic circuit simulator developed primarily in-house use ibm 1973 powerful program used simulation integrated circuit designs analysis statistical variations manufacturing process combination built-in monte carlo method capabilities allowed prediction performance electronic circuits wide range material parameters temperatures astap designed run ibm mainframe computers unlike spice used modified nodal analysis mna form system circuit equations astap instead used sparse tableau formulation sta construct solve sparse matrix sparse tableau formulation produced large sparse matrices required special techniques solve efficiently even time advantage sta statistical analysis originally outlined subsequent analysis circuit randomly varied parameters required changing entries matrix | [
5881,
3323,
7819
] | Test |
4,244 | 3 | IBM_PC_Convertible:ibm pc convertible ibm pc convertible first laptop computer released ibm released april 3 1986 convertible also first ibm computer use 3½-inch floppy disk format went become industry standard like modern laptops featured power management ability run batteries follow-up ibm portable model number 5140 replaced 1991 ibm ps/2 l40 sx japan ibm personal system/55note predecessor thinkpad ibm engineers 1983 reportedly developed tandy model 100-like laptop codenamed sweetpea estridge rejected pc compatible 1984 larger lcd screen another prototype p-14 reportedly failed chiclet rule especially poor reception data general-one display pc convertible used cmos version intel 8088 cpu running 4.77 mhz 256 kb ram expandable 640 kb dual 720 kb 3.5 floppy drives monochrome cga-compatible lcd screen price 2,000 weighed 13 pounds 5.8 kg featured built-in carrying handle pc convertible expansion capabilities proprietary isa bus-based port rear machine extension modules including small printer video output module could snapped place machine could also take internal modem room internal hard disk concept design body made german industrial designer richard sapper pressing power button computer turn put machine suspend mode would hold place long battery power avoided long boot-up process cmos 80c88 cpu static core held state indefinitely stopping system clock oscillator resume processing clock signal restarted long kept powered cmos 80c88 processor used little power clock signal stopped system ram convertible sram rather dram lower power consumption less circuitry fit cramped laptop case convertible 256k ram included 128k eventually also 256k memory cards available space 4 memory cards system least one 256k card order able upgrade system full 640k base memory screen half size lid text characters graphics compressed vertically appearing half normal height display capable 80x25 text graphics modes 640x200 320x200 pixels pressing lever two floppy drives display detached entire screen unit feature allowed convenient use full-size desktop monitor one desk early forerunner docking station concept well apple powerbook duo machine sold poorly number reasons convertible heavy much faster portable replaced despite newer cmos processor use static ram traditional pc expansion ports serial ports parallel port without add-on hard-to-read oddly-shaped lcd screen first screens lacked backlight also competed faster portables based intel 80286 offered optional hard drives companies compaq laptops companies toshiba zenith lighter offered similar specifications sometimes half price keyboard also widely criticized | [
1121,
6148,
3304,
11657,
780,
8301,
7983,
1776,
6129,
5368,
9338,
3323,
8893
] | Test |
4,245 | 4 | Patched_(malware):patched malware win32/patched computer trojan targeting microsoft windows operating system first detected october 2008 files detected trojan.win32.patched usually windows components patched malicious application purpose patching varies example certain malware patches system components order disable security windows safe file check feature malware add parts code system component patch certain functions original file point appended code trojan operates modification legitimate systems files infected system additionally malware add parts code system component patch certain functions original file point appended code frequently patched components obvious symptoms indicate presence malware affected machine additionally common symptoms associated threat alert notifications installed antivirus software may symptom advised delete rename quarantine patched windows components may affect system stability even though windows locks main files active might still possible affect anti-virus software detected certain file trojan.win32.patched attempt create copy patched file try restore contents add renaming command windows registry order replace patched file cleaned one next windows startup restoration one recent system restore points may advisable many cases patched system component replaced clean one restoring system restore point advised backup personal data avoid losing windows rolls back previously saved state windows installation discs contain repair option replace patched file another course action includes attaching hard drive patched file slave similar windows-based system boot replace patched file file taken clean system | [
3072,
6786,
7044,
10245,
10756,
9356,
6797,
9233,
8978,
4863,
4883,
278,
10392,
1690,
3867,
10141,
5281,
2213,
8998,
9256,
939,
7983,
1970,
3643,
6588,
7739,
9791,
1088,
3320,
3395,
4165,
2508,
7515,
3941,
107,
877,
4344,
2041,
5245,
1279... | Test |
4,246 | 3 | Zero_insertion_force:zero insertion force zero insertion force zif type ic socket electrical connector requires little force insertion zif socket ic inserted lever slider side socket moved pushing sprung contacts apart ic inserted little force generally weight ic sufficient external downward force required lever moved back allowing contacts close grip pins ic zif sockets much expensive standard ic sockets also tend take larger board area due space taken lever mechanism therefore used good reason normal integrated circuit ic socket requires ic pushed sprung contacts grip friction ic hundreds pins total insertion force large hundreds newtons leading danger damage device circuit board also even relatively small pin counts pin extraction fairly awkward carries significant risk bending pins particularly person performing extraction n't much practice board crowded low insertion force lif sockets reduce issues insertion extraction lower insertion force conventional socket likely produce less reliable connections large zif sockets commonly found mounted pc motherboards used mid 1990s forward cpu sockets designed support particular range cpus allowing computer retailers consumers assemble motherboard/cpu combinations based individual budget requirements rest electronics industry largely abandoned sockets kind instead moved use surface mount components soldered directly board smaller zif sockets commonly used chip-testing programming equipment e.g. programming testing eeproms microcontrollers etc standard dip packages come number widths measured pin centers 0.3 7.62 mm 0.6 15.24 mm common allow design programmers similar devices support range devices universal test sockets produced wide slots pins drop allowing devices differing widths inserted zif sockets used ball grid array chips particularly development sockets tend unreliable failing grab solder balls another type bga socket also free insertion force zif socket traditional sense better job using spring pins push underneath balls zif wire-to-board connectors used attaching wires printed circuit boards inside electronic equipment example would cable lcd screen motherboard laptops wires often formed ribbon cable pre-stripped bare ends placed inside connector two sliding parts connector pushed together causing grip wires important advantage system require mating half fitted wire ends therefore saving space cost inside miniaturised equipment see flexible flat cable zif tape connections used connecting parallel ata serial ata disk drives mostly drives 1.8-inch form factor pata hard drives zif-style connectors used primarily design ultra-portable notebooks since phased sata relatively small-form-factor connector default mini-sata msata used even smaller form factors required internally nearly hard drives use zif tape connect circuit board platter motor zif tape connections also heavily used design ipod range portable media players hard drive also connections main circuit board three types zif connectors known exist 1.8 inch pata drives zif-24 zif-40 zif-50 24 40 50 pins respectively | [
3588,
8452,
10260,
7445,
3992,
3995,
4252,
4767,
9122,
682,
4523,
11183,
3892,
8629,
4537,
2874,
4805,
9157,
3783,
7247,
7122,
4179,
4185,
7132,
9570,
5859,
10468,
1260,
7788,
7151,
1651,
9592
] | Validation |
4,247 | 4 | Webroot_Antivirus_with_Spy_Sweeper:webroot antivirus spy sweeper webroot antivirus spy sweeper previously known webroot antivirus antispyware antimalware utility developed webroot software product added antivirus detection engine company ’ previous standalone antispyware product spy sweeper product originally launched october 30 2006 name spy sweeper antivirus product re-launched year later october 24 2007 webroot antivirus antispyware firewall enhanced rebranded version product included new two-way firewall built various changes including windows vista compatibility recent version product webroot antivirus spy sweeper 7.0 launched july 27 2010 versions product antivirus antispyware malware detection within various changes user interfaces system shields additional features added compatibilities new microsoft windows operating systems changed version 5.2 received editor ’ choice award integration effectiveness combining antispyware antivirus utilities one product shield names changed version including spy communication shield renamed internet communication shield spy installation shield changed installation shield product update included quick sweep option allowed users rapidly scan computer use many system resources full sweep option would various smart shields protect pc changes activex controls common browser threats update also included daily definition flex defs flexible definitions updates version 5.3 added windows vista compatibility product version 5.5 added several changes real-time protection shields within product execution shield file system shield replaced old spy installation shield still work together block malicious programs executing reading changing files “ system services shield ” added prevent unauthorized changes numerous system services microsoft windows email attachments shield also added allows scanning email attachments malware behavioral based detection also added release allowing zero-day threats dealt hit system version 5.8 added compatibility 64-bit vista “ gamer mode ” allows play online games uninterrupted notifications background shields run background product included 1gb online storage space time release firewall component found earlier versions product removed release significant user interface changes made 7.0 version software well optimized scanning feature new ui commented reviewers simplistic easier use previous versions tray icons added notify user state program currently three icons used include br “ fix ” feature added 7.0 versions allows users opt webroot software resolve situation without user interaction version added automatic periodic scans computer eliminated option quick sweeps full sweeps seen previous versions default 7.0 version eliminated option run virus-scanning access web portal accessible computer web access includes account information software license status keycode well access certain tasks upgrading software installing computers 7.0 version product require reboot installation previous versions webroot antivirus spysweeper received virus bulletin certifications four times including april 2010 windows ex december 2009 windows 7 august 2008 windows xp february 2003 windows server xp webroot antivirus spysweeper icsa labs certified desktop/server anti-virus detection anti-virus cleaning windows 7 32 64 bit numerous certifications dating 2008 received west coast labs product including anti-spyware desktop anti-trojan anti-virus desktop anti-virus disinfection desktop firewall | [
2213,
8998,
10026,
6797,
3342,
7983,
2257,
9713,
6516,
7515
] | Test |
4,248 | 2 | Windows_System_Assessment_Tool:windows system assessment tool windows system assessment tool winsat module microsoft windows vista windows 7 windows 8 windows 10 available control panel performance information tools except windows 8.1 windows 10 measures various performance characteristics capabilities hardware running reports windows experience index wei score wei includes five subscores processor memory 2d graphics 3d graphics disk basescore equal lowest subscores average subscores winsat reports wei scores scale 1.0 5.9 windows vista 7.9 windows 7 9.9 windows 8 windows 10 wei enables users match computer hardware performance performance requirements software example aero graphical user interface automatically enabled unless system wei score 3 higher wei also used show part system would expected provide greatest increase performance upgraded example computer lowest subscore memory would benefit ram upgrade adding faster hard drive component detailed raw performance information like actual disk bandwidth obtained invoking codice_1 command line also allows specific tests re-run obtaining wei score command line done invoking codice_2 also updates value stored codice_3 xml files stored easily hacked report fake performance values wei also available applications api configure function hardware performance taking advantage capabilities without becoming unacceptably slow windows experience index score displayed windows 8.1 onwards graphical user interface winsat removed versions windows although command line winsat tool still exists operates correctly along final score launching command shell games according article pc pro microsoft removed winsat gui order promote idea kinds hardware run windows 8 equally well 2003 game developers conference dean lester microsoft general manager windows graphics gaming stated interview gamespot microsoft intended focus improvements pc gaming experience part new gaming initiative next version windows windows vista codenamed longhorn lester stated part initiative operating system would include games folder would centralize settings pertinent gamers among features display driver streamlining parental controls games ability start windows game directly optical media installation—in manner similar games designed video game console microsoft would also require new method displaying system requirements retail packaging windows games rating system would categorize games based numerical system 2004 lester expanded microsoft intentions stating company would work hardware manufacturers create pcs windows vista used level system designate performance capabilities system hardware xbox 360 peripherals would fully compatible operating system windows experience index feature windows vista relies measurements taken winsat provide accurate assessment system capabilities—these capabilities presented form rating higher rating indicates better performance preliminary design elements created microsoft robert stein 2004 suggest winsat intended rate user hardware out-of-box experience design decision would retained operating system release manufacturing windows hardware engineering conference 2005 microsoft formally unveiled existence winsat presented technology games one would allow windows vista make decisions whether enable desktop composition based machine hardware capabilities winsat would remain key focus throughout development operating system release manufacturing winsat windows vista windows 7 performs following tests running tests show progress bar working background animation aero glass deactivated windows vista windows 7 testing tool properly assess graphics card cpu windows 8 winsat runs maintenance scheduler every week default schedule 1am sundays maintenance scheduler collates various os tasks schedule computer randomly interrupted individual tasks scheduler wakes computer sleep runs scheduled tasks puts computer back sleep weekly task winsat runs long enough detect hardware changes tests run winsat simply ends existing scores must valid winsat perform tests laptop battery-operated | [
11270,
2568,
5643,
4624,
6674,
537,
8729,
540,
3102,
9762,
8227,
8740,
1577,
10281,
9780,
2101,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
9819,
8798,
3170,
622,
1647,
9839,
4210,
7796,
1656,
6265,
7290,
47... | Test |
4,249 | 4 | Managed_VoIP_Service:managed voip service computing managed voip services mvs simply put voip services outsourced company providing service managed voip service provider managed voip services provide enterprises necessary skills expertise assure voice quality meets expectations managed voip services equipment software included along network operations centers technical resources usage-based pricing replaced fixed flat-rate billing based number users number network elements managed criteria relevant given business making ongoing costs predictable manageable | [
2558
] | None |
4,250 | 4 | Ralph_Echemendia:ralph echemendia ralph rafael echemendia cyber security specialist known ethical hacker specialises protecting intellectual property entertainment industry educating security echemendia born cuba raised miami attended miami senior high first computer commodore 64 began hacking age 14 echemendia began working entertainment created secure online ticketing system marley family also investigated early online leak eminem album 2011 echemendia lead technical investigator breach security led leaking worked identify person responsible leaking behind scenes pictures videos film almost year movie ’ release 2015 echemendia worked stone snowden providing technical supervision supported actors explaining background technical terms script echemendia screenwriter kieran fitzgerald also worked edward snowden replicate actual nsa log-in screen 2016 echemendia became hacking consultant directors producers nerve | [
7887,
3495
] | Train |
4,251 | 2 | Avie_Tevanian:avie tevanian dr. avadis avie tevanian american computer scientist carnegie mellon university principal designer engineer mach operating system leveraged work next inc. foundation nextstep operating system senior vice president software engineering apple 1997 2003 chief software technology officer 2003 2006 redesigned nextstep become macos became ios longtime friend steve jobs tevanian westbrook maine armenian descent tevanian cloned 1980s arcade game missile command giving name version xerox alto mac missiles macintosh platform b.a mathematics university rochester m.s ph.d. degrees computer science carnegie mellon university principal designer engineer mach operating system vice president software engineering next inc. responsible managing next software engineering department designed nextstep operating system based upon previous academic work mach senior vice president software engineering apple 1997 2003 chief software technology officer 2003 2006 redesigned nextstep become macos became ios united states v. microsoft 2001 witness united states department justice testifying microsoft tevanian left apple march 31 2006 joined board dolby labs theranos inc resigned board theranos late 2007 acrimonious ending faced legal threats forced sign waiver waive right buy company cofounder shares may 2006 joined board tellme networks later sold microsoft january 12 2010 became managing director elevation partners july 2015 cofounded nextequity partners currently serving managing director | [
10755,
9732,
1549,
7697,
11289,
6186,
6700,
1074,
9778,
9784,
8253,
576,
8783,
4180,
10838,
6234,
9826,
5733,
8806,
3691,
2676,
10871,
6264,
7806,
6783,
2686,
10878,
8842,
10386,
5784,
1177,
2207,
11430,
171,
2735,
3248,
4283,
7869,
713,
... | Train |
4,252 | 3 | Socket_7:socket 7 socket 7 physical electrical specification x86-style cpu socket personal computer motherboard released june 1995 socket supersedes earlier socket 5 accepts p5 pentium microprocessors manufactured intel well compatibles made cyrix/ibm amd idt others socket 7 socket supported wide range cpus different manufacturers wide range speeds differences socket 5 socket 7 socket 7 extra pin designed provide dual split rail voltage opposed socket 5 single voltage however motherboard manufacturers supported dual voltage boards initially socket 7 backwards compatible socket 5 cpu placed socket 7 motherboard processors used socket 7 amd k5 k6 cyrix 6x86 6x86mx idt winchip intel p5 pentium 2.5–3.5 v 75–200 mhz pentium mmx 166–233 mhz rise technology mp6 amd geode lx geode gx used socket 7 2015 socket 7 typically uses 321-pin arranged 19 19 pins spga zif socket rare 296-pin arranged 37 37 pins spga lif socket size 1.95 x 1.95 4.95 cm x 4.95 cm extension socket 7 super socket 7 developed amd k6-2 k6-iii processors operate higher clock rate use agp socket 7 socket 8 replaced slot 1 slot 2 1999 | [
3588,
6151,
1677,
5901,
5523,
8851,
4246,
2455,
3992,
8855,
11417,
3995,
799,
6175,
7712,
7714,
10019,
3883,
2604,
4523,
2350,
6192,
9649,
4537,
2874,
7105,
4805,
7110,
8394,
3403,
4427,
4179,
3798,
473,
4185,
7002,
9945,
1501,
11484,
957... | Test |
4,253 | 4 | Common_Criteria_Evaluation_and_Validation_Scheme:common criteria evaluation validation scheme common criteria evaluation validation scheme ccevs united states government program administered national information assurance partnership niap evaluate security functionality information technology conformance common criteria international standard new standard uses protection profiles common criteria standards certify product change happened 2009 change implemented bring credibility back cc brand stated goal making change ensure achievable repeatable testable evaluations ccevs program partnership u.s. government industry assist consumers scheme intended serve many communities interest diverse roles responsibilities community includes product developers product vendors value-added resellers systems integrators security researchers acquisition/procurement authorities consumers products auditors accreditors individuals deciding fitness operation products within respective organizations close cooperation government industry paramount success scheme realization objectives validation body ultimate responsibility operation ccevs accordance niap policies procedures appropriate interpret amend policies procedures nist nsa responsible providing sufficient resources niap validation body may carry responsibilities however 2009 niap reached vendors labs academia customers help evaluation products therefore diminishing reliance nsa validation body led director deputy director selected nist nsa management personnel include validators technical experts various technology areas validation body ensures appropriate mechanisms place protect interests parties within ccevs participating process security evaluation disputes brought forth participating party i.e sponsor evaluation product protection profile developer cctl concerning operation ccevs associated activities shall referred validation body resolution product certified listed pp compliant niap product compliant list pcl | [
8904,
1905,
6593,
5865
] | Test |
4,254 | 1 | Supra-entity:supra-entity supra-entity conceptual element derived entity-relationship e-r technique information system modeling similar entity defined higher level encompassing individual entity occurrences parts groups groups parts parts groups concepts supra-entity supra-relationship supra-attribute created published gonzález muller work “ business entity-relationship model innovation entrepreneurship management ” applied first time work conceptually model key elements interrelationships “ business ” reality supra-entities supra-relationships supra-attributes objective covering diversity situations perspectives existing reality integrated representation higher level individual occurrences multiple parts groups entities relationships according different criteria structures properties attributes association supra-entities level partition grouping supra-entity formed individual entities multiple structures entity parts multiple structures entity groups multiple structures groups entity parts parts entity groups associated closed squared structure shown attached diagram representation multiple structures parts groups groups parts parts entity groups form supra-entity done strips connecting different elements instead usual line symbol used single structure entity-relationship models example supra-entity products business sector shown next diagram addition application modeling development databases information systems supra-entities supra-relationships allow redefinition concept innovation degrees types clarity amplitude facilitates generation ideas innovation capacity general business innovation defined supra-entity domain scope consists creation generation introduction new occurrences supra-entity elements good results success first invention major innovation improved minor incremental innovation including new occurrences replicate similar previous ones example apply definition innovation supra-entity products obtain product innovations consist creation generation introduction market new element occurrences supra-entity products good results success first invention major innovation improved minor incremental innovation including new occurrences replicate similar previous ones business innovation traditionally identified introduction marketing new improved products processes market innovation necessarily require technological innovate identifying new needs new customer segments new ways getting product customer new forms agreements contracting new environments etc summary possible innovate different supra-entities supra-relationships constitute business entity-relationship model achieving different types innovations increasing innovation capacity business | [] | Validation |
4,255 | 1 | IBM_Db2_Family:ibm db2 family db2 family data management products including database servers developed ibm support relational model recent years products extended support object-relational features non-relational structures like json xml brand name styled db2 creation 1983 2017 historically unlike database vendors ibm produced platform-specific db2 product major operating systems however 1990s ibm changed track produced db2 mostly-common product designed mostly common code base l-u-w linux-unix-windows db2 z db2 different result use different drivers db2 traces roots back beginning 1970s edgar f. codd researcher working ibm described theory relational databases june 1970 published model data manipulation 1974 ibm san jose research center developed relational dbms system r implement codd concepts key development system r project sql apply relational model codd needed relational-database language named dsl/alpha time ibm n't believe potential codd ideas leaving implementation group programmers codd supervision violated several fundamentals codd relational model result structured english query language sequel ibm released first relational-database product wanted commercial-quality sublanguage well overhauled sequel renamed basically-new language structured query language sql ibm bought metaphor computer systems utilize gui interface encapsulating sql platform already use since mid 80 parallel development sql ibm also developed query example qbe first graphical query language ibm first commercial relational-database product sql/ds released dos/vse vm/cms operating systems 1981 1976 ibm released query example vm platform table-oriented front-end produced linear-syntax language drove transactions relational database later qmf feature db2 produced real sql brought qbe look feel db2 name db2 ibm database 2 first given database management system dbms 1983 ibm released db2 mvs mainframe platform years db2 full-function dbms exclusively available ibm mainframes later ibm brought db2 platforms including os/2 unix ms windows servers linux including linux z systems pdas process occurred 1990s inspiration mainframe version db2 architecture came part ibm ims hierarchical database dedicated database-manipulation language ibm dl/i db2 also embedded i5/os operating system ibm system iseries formerly as/400 versions available z/vse z/vm earlier version code would become db2 luw linux unix windows part extended edition component os/2 called database manager ibm extended functionality database manager number times including addition distributed database functionality means distributed relational database architecture drda allowed shared access database remote location lan note drda based objects protocols defined distributed data management architecture ddm eventually ibm took decision completely rewrite software new version database manager called db2/2 db2/6000 respectively versions db2 different code bases followed '/ naming convention became db2/400 as/400 db2/vse dos/vse environment db2/vm vm operating system ibm lawyers stopped handy naming convention used decided products needed called product platform example db2 os/390 next iteration mainframe server-based products named db2 universal database db2 udb mid-1990s ibm released clustered db2 implementation called db2 parallel edition initially ran aix edition allowed scalability providing shared-nothing architecture single large database partitioned across multiple db2 servers communicate high-speed interconnect db2 edition eventually ported linux unix windows luw platforms renamed db2 extended enterprise edition eee ibm refers product database partitioning feature dpf bundles flagship db2 enterprise product informix corporation acquired illustra made database engine object-sql dbms introducing universal server oracle ibm followed suit changing database engines capable object-relational extensions 2001 ibm bought informix software following years incorporated informix technology db2 product suite db2 technically considered object-sql dbms mid-2006 ibm announced viper codename db2 9 distributed platforms z/os db2 9 z/os announced early 2007 ibm claimed new db2 first relational database store xml natively enhancements include oltp-related improvements distributed platforms business intelligence/data warehousing-related improvements z/os self-tuning self-managing features additional 64-bit exploitation especially virtual storage z/os stored procedure performance enhancements z/os continued convergence sql vocabularies z/os distributed platforms october 2007 ibm announced viper 2 codename db2 9.5 distributed platforms three key themes release simplified management business critical reliability agile xml development june 2009 ibm announced cobra codename db2 9.7 luw db2 9.7 added data compression database indexes temporary tables large objects db2 9.7 also supported native xml data hash partitioning database partitioning range partitioning table partitioning multi-dimensional clustering native xml features allows users directly work xml data warehouse environments db2 9.7 also added several features make easier oracle database users work db2 include support commonly used sql syntax pl/sql syntax scripting syntax data types oracle database db2 9.7 also enhanced concurrency model exhibit behavior familiar users oracle database microsoft sql server october 2009 ibm introduced second major release year announced db2 purescale db2 purescale database cluster solution non-mainframe platforms suitable online transaction processing oltp workloads ibm based design db2 purescale parallel sysplex implementation db2 data sharing mainframe db2 purescale provides fault-tolerant architecture shared-disk storage db2 purescale system grow 128 database servers provides continuous availability automatic load balancing 2009 announced db2 engine mysql allows users system platform natively access db2 ibm operating system formerly called as/400 users platforms access files mysql interface system predecessors as/400 system/38 db2 tightly integrated operating system comes part operating system provides journaling triggers features early 2012 ibm announced next version db2 db2 10.1 code name galileo linux unix windows db2 10.1 contained number new data management capabilities including row column access control enables ‘ fine-grained ’ control database multi-temperature data management moves data cost effective storage based hot cold frequently data accessed data ibm also introduced ‘ adaptive compression ’ capability db2 10.1 new approach compressing data tables june 2013 ibm released db2 10.5 code name kepler 12 april 2016 ibm announced db2 luw 11.1 june 2016 released mid-2017 ibm re-branded db2 dashdb product offerings amended names db2 db2 z/os mainframe available traditional product packaging value unit edition allows customers instead pay one-time charge db2 also powers ibm infosphere warehouse offers data warehouse capabilities infosphere warehouse available z/os includes several bi features etl data mining olap acceleration in-line analytics db2 10.5 linux unix windows contains functionality tools offered prior generation db2 infosphere warehouse linux unix windows ibm provides three cloud services db2 db2 administered either command-line gui command-line interface requires knowledge product easily scripted automated gui multi-platform java client contains variety wizards suitable novice users db2 supports sql xquery db2 native implementation xml data storage xml data stored xml relational data clob data faster access using xquery db2 apis rexx pl/i cobol rpg fortran c++ c delphi .net cli java python perl php ruby many programming languages db2 also supports integration eclipse visual studio integrated development environments purequery ibm data access platform focused applications access data purequery supports java .net purequery provides access data databases in-memory java objects via tools apis runtime environment delivered ibm data studio developer ibm data studio purequery runtime important feature db2 computer programs error handling sql communications area sqlca structure used exclusively within db2 program return error information application program every sql statement executed primary singularly useful error diagnostic held field sqlcode within sqlca block sql return code values later versions db2 added functionality complexity execution sql multiple errors warnings could returned execution sql statement may example initiated database trigger sql statements instead original sqlca error information retrieved successive executions get diagnostics statement see sql return codes comprehensive list common sqlcodes | [
3,
8201,
1037,
2068,
4630,
1049,
5658,
9245,
2089,
5677,
10286,
7217,
7733,
9286,
10326,
8792,
3171,
9828,
2669,
6775,
2168,
1146,
6797,
8340,
10389,
4263,
6311,
10413,
9397,
6850,
4817,
2775,
2780,
734,
10471,
5356,
6383,
9455,
3323,
537... | Validation |
4,256 | 5 | Quadrature-division_multiple_access:quadrature-division multiple access quadrature-division multiple access qdma radio protocol term combines two standard terms telecommunications cdma qpsk qdma used local area networks usually wireless short-range wimax cdma qdma especially suitable modern communications example transmission short messages sms mms communication motion cars trains etc establishment unplanned links traditional tdma fdma require lot overhead set link parameter new user detect user left allocation free allocated another cdma qdma new user simply allocated new code ready go may impose slight load spectrum system devised absorb controlled measure collisions continue operations high level quality service | [
2458,
11181
] | Test |
4,257 | 3 | SVI-738:svi-738 spectravideo svi-738 x'press msx1 compatible home computer manufactured spectravideo 1985 although compatible msx 1.0 standard incorporates several extensions standard 80-column display serial rs-232 built-in 3.5 floppy drive many hardware-compatible msx 2.0 standard system whole leading referred msx 1.5 computer along sony hb-101 canon v-8 casio mx-10 hitachi mb-h1 portable computer based msx standard hence title x'press came packaged carrying bag addition manuals booklets software cp/m 2.2 msx-dos 1.0 disk containing special demonstration program featuring astronaut flying screen demonstrating computer graphic capabilitites listing facts computer rom ram sizes along disk drive integrated serial port stood use graphics chip specified msx-2 standard although use 16 kb vram allowed add 80 column mode together bugs first model design konami scc-sound based cartridges work bad sound among reasons msx 1.5 moniker ran microsoft disk basic 1.0 rom turned disk non-autoexecutable disk inserted computer marketed mainly europe australasia middle east poland marketed centralna składnica harcerska price 590 000 polish złotys average salary two months time msx computer marketed poland equipped several schools version svi-738 sold altered keyboard rom order provide polish-specific characters could also found schools finland spain initially distributed indescomp creation spanish subsidiary united kingdom sold £399.95 svi-738 also sold united states | [
10658,
11462,
1801,
3406,
7983,
1776,
9006,
9998,
4409
] | Test |
4,258 | 3 | Apple_A12:apple a12 apple a12 bionic 64-bit arm-based system chip soc designed apple inc first appeared iphone xs xs max xr 2019 versions ipad air ipad mini two high-performance cores claimed 15 faster 50 energy-efficient apple a11 four high-efficiency cores claimed use 50 less power energy-efficient cores a11 a12 features apple-designed 64-bit armv8.3-a six-core cpu two high-performance cores running 2.49 ghz called vortex four energy-efficient cores called tempest vortex cores 7-wide decode out-of-order superscalar design tempest cores 3-wide decode out-of-order superscalar design like mistral cores tempest cores based apple swift cores apple a6 a12 also integrates apple-designed four-core graphics processing unit gpu 50 faster graphics performance a11 a12 includes dedicated neural network hardware apple calls next-generation neural engine neural network hardware eight cores perform 5 trillion 8-bit operations per second unlike a11 neural engine third party apps access a12 neural engine a12 manufactured tsmc using 7 nm finfet process first ship consumer product contains 6.9 billion transistors die size a12 83.27 mm 5 smaller a11 manufactured package package pop together 4 gib lpddr4x memory iphone xs xs max 3 gb lpddr4x memory iphone xr ipad air 2019 ipad mini 2019 armv8.3 instruction set supports brings significant security improvement form pointer authentication mitigates exploitation techniques involving memory corruption jump-oriented-programming return-oriented-programming | [
9732,
7697,
4114,
9235,
11282,
6165,
11289,
7706,
8222,
1057,
2551,
38,
6183,
1576,
4139,
7211,
8237,
9774,
2097,
8250,
8253,
7745,
1090,
7747,
2635,
8783,
4180,
10838,
10840,
9312,
9826,
99,
8806,
8812,
6258,
10357,
10361,
4220,
10365,
6... | Test |
4,259 | 2 | IdeaPad_tablets:ideapad tablets ideapad tablets lenovo brand consumer-oriented tablet computers designed home use entertainment opposed business-focused thinkpad tablet series devices sold certain countries china india new zealand sold lepad brand similar lephone series smartphones ideapad-branded tablets produced android windows operating systems ideapad brand gradually phased recent years replaced general tab brand android devices miix brand windows devices exception several distinctive hardware lines yoga series yoga tablet 2 pro 13-inch tablet built-in projector 9,600 mah battery lenovo claims last 15 hours continuous use display resolution 2,560 pixels 1,440 pixels 32 gigabytes built-in storage come standard expanded 64 gigabytes microsd card yoga tablet 2 pro like previous yoga tablets thin body thick cylindrical base thick base designed make holding device portrait mode comfortable device projector mounted projector resolution 854 pixels 480 pixels sound provided stereo speakers subwoofer but-in base lenovo a10 tablet 10.1-inch tablet computer runs android lenovo ideatab lynx released united states december 2012 lynx tablet sold 599 accutype keyboard base priced 149 lynx 11.6-inch tablet lynx without dock 11.85 inches 7.4 inches 0.37 inches weighs 1.41 pounds approximately weight thickness third generation apple ipad keyboard dock weighs 1.45 pounds total 2.86 pounds lynx runs full-version windows 8 opposed windows rt lynx uses 1.8 ghz dual-core clovertrail intel atom z2760 processor 2gb memory either 32gb 64gb emmc flash storage 11.6-inch in-plane switching display resolution 1,366 x 768 resolution supports five-point capacitive multitouch micro-usb micro-hdmi ports microsd card slot lynx table keyboard dock two standard usb 2.0 ports lynx also bluetooth 4.0 802.11b/g/n wi-fi networking stereo speakers dual microphones 2-megapixel front-facing webcam review lynx cnet wrote real question lynx stand one answer might weight despite 11.6-inch screen tablet felt shockingly light held lenovo launch event although lenovo says 1.44 pounds lynx tablet portion closer feel kindle ipad larger display either keyboard dock takes away lynx airiness course although two least feel solidly linked use together latch secure n't worry accidentally dislodging screen also happy responsiveness lynx touchscreen although n't get chance really challenge five minute hands-on ideapad k2 ideapad k2010 1920x1200 pixel 10.1-inch ips panel tablet tegra 3 running 1.7 ghz possibly overclocked 2gb ram fingerprint scanner keyboard dock known lepad k2 lepad k2010 china ideapad k2 meant high-end gamers business users lenovo displayed tablet new product showcase india ideatab a1 1024x600 7-inch display tablet android 2.3 4.0 ideatab s2109 1024 x 768 pixels 4:3 aspect ratio 9.7-inch ips display omap 4430 soc dual core arm cortex a9 1 ghz sgx540 powervr gpu 1gb ram 3 versions 8 16 32 gb included storage capacity android 4.0 ideatab s2110 10.1-inch ips display tablet using qualcomm 1.5 ghz soc 1gb ram android 4.0 three tablets announced lenovo ideapad tablet line 2011 ideapad k1 a1 p1 ideapad k1 tablet announced july 2011 ideapad k1 tablet offered following specifications 30 free apps pre-loaded ideapad including angry birds hd kindle android documents go norton mobile security review gizmodo appreciated value ideapad k1 represented offer 32gb tablet 499 reviewer described tablet one attractive gizmodo reviewed “ matte chrome-colored side back trim deep red back panel ” ideapad k1 tablet featured interface improvements compared android 3.1 tablets gizmodo indicated battery life average android tablets 8 hours 3 minutes despite continuous web surfing wi-fi ideapad k1 summarized laptop magazine offering “ strong mix style performance uniquely compelling enhancements android 3.1 ui ” ideapad a1 tablet announced september 2011 pcworld review indicated a1 would first 7-inch tablet prices 200 less reviewer stated low price achieved reduction storage capacity functionality basic unit offered 2gb internal storage variants storage would made available a1 contained micro sd card slot allowed expansion 32gb a1 tablet powered single-core 1 ghz cortex a8 processor suggested reviewer single-core cpu may reason honeycomb board may explain lenovo achieve aggressive price feature indicated notable tablet price capacitive touch screen contrast resistive touch screen found value tablets display also offered higher-than average resolution 1024x600 pixels 170 pixels per inch ppi ppi value made display sharper even apple ipad 2 offered 132 ppi 9.7-inch screen fact a1 included android 2.3 gingerbread opposed android 3.2 honeycomb indicated point concern reviewer said companies incorporate android 2.2 2.3 achieved making significant customizations on-board apps well interface time announcement lenovo provided information customizations made ideapad a1 tablet 0.47 inches thin weighed 0.88 lbs a1 offered four different colors white black pink light blue feature a1 announced lenovo inclusion magnesium alloy roll cage protected internal components bumpers another key feature a1 gps require data connection used ideapad p1 tablet different ideapad k1 thinkpad tablets featured windows 7 operating system instead android 3.1 additionally unlike k1 thinkpad tablets p1 tablet included intel atom processor opposed nvidia tegra processor lenovo ideapad p1 windows tablet also preloaded adobe flash player 10.3 lenovo app shop microsoft security essentials lenovo app manager switch entertainment productivity apps like send email games watch online movies specifications ideapad p1 follows | [
9863,
5384,
6539,
6797,
271,
424,
11062,
1083,
10303,
11082,
2635,
10838,
8921,
1377,
5606,
3304,
5481,
2165,
1400
] | Validation |
4,260 | 7 | Versive:versive versive machine learning startup based seattle washington us founded 2012 stephen purpura chris metcalfe company sells on-premises software cloud services professional service solutions help businesses automate human expertise september 2014 versive raised 42 million total investment company changed name context relevant versive 2017 october 2018 versive acquired esentire versive developed platform ingests data determines important creates problem-specific solution deployed continually learning proprietary high-performance machine learning technology accelerates deployment machine learning solutions problem-specific applications provide out-of-the-box experience reduces workload users building complicated models deployment options include public private clouds traditional servers hadoop clusters scale-out in-memory technology allows smart caching small huge datasets using computers parallelize efforts needed versive software applied various industries including finance information gathered technology aims help clients predict activity based observed trends technology used help security teams detect advanced cyber threats best emerging security product interop may 2017 useful calculating prices risks high speed system also detect fraud quickly versive launched 1.3 million seed funding madrona venture group seattle-based angel investor geoff entress initial investors included mike mcsherry cliff kushler mark illing swype/nuance startup received additional 1.5 million funding madrona november 2012 july 2013 versive raised total 7 million round series funding round included previous investors madrona entress well vulcan capital bloomberg beta may june september 2014 versive raised additional 35 million total investment three chunks goldman sachs bank america merrill lynch bloomberg beta new york life formation 8 madrona work-bench seattle angel investors versive partnered good harbor security risk management company founded richard a. clarke counterterrorism expert former cyber-security adviser bush administration clarke sits versive advisory board company helps versive repair security breaches ensure security compliance among services may 2014 versive named databeat innovation showdown april 2014 versive nominated pacific northwest startup year geekwire november 2013 versive selected geekwire collaboration museum history industry mohai bezos center innovation one seattle 10 recognizes promising young start-up companies within seattle region context relevant along nine companies recognized geekwire gala 4 december 2013 also unveiled sketch business concept giant-sized cocktail napkins | [
8446
] | None |
4,261 | 1 | Recordset:recordset recordset data structure consists group database records either come base table result query table concept common number platforms notably microsoft data access objects dao activex data objects ado recordset object contains fields collection properties collection time recordset object refers single record within set current record | [
736,
4647,
2183,
10737,
2901
] | Test |
4,262 | 4 | Computer_Security_Institute:computer security institute computer security institute csi professional membership organization serving practitioners information network computer-enabled physical security level system administrator chief information security officer founded 1974 csi used conduct two conferences per year — annual computer security conference exhibition csi sx internet entrepreneur jimmy wales keynote speaker csi ’ annual conference held november 6–8 2006 orlando florida csi perhaps best known annual csi/fbi computer crime security survey began conduct 1996 collaboration san francisco federal bureau investigation computer intrusion squad researchers robert h. smith school business university maryland fbi disappeared title study 2006 2007 reports 15th annual survey turned last released 2011 available general public information week csi staff including richard power testified expert witnesses united states senate committee hearings 2011 csi absorbed ubm although mention appears ubm wikipedia page september 2014 original csi website returns 404 file found error snapshots website found wayback time machine | [
4348,
3629
] | None |
4,263 | 1 | Relational_calculus:relational calculus relational calculus consists two calculi tuple relational calculus domain relational calculus part relational model databases provide declarative way specify database queries contrast relational algebra also part relational model provides procedural way specifying queries relational algebra might suggest steps retrieve phone numbers names book stores supply sample book relational calculus would formulate descriptive declarative way relational algebra relational calculus essentially logically equivalent algebraic expression equivalent expression calculus vice versa result known codd theorem | [
10632,
8201,
8979,
2068,
10389,
7446,
11030,
2456,
1049,
5658,
5403,
2972,
9112,
7582,
4255,
9248,
9631,
9634,
932,
1447,
2344,
7080,
10793,
10413,
10286,
9397,
10137,
3004,
1341,
7868,
11324,
10048,
2369,
5953,
6850,
9411,
2246,
9286,
2632... | Test |
4,264 | 3 | Genesi:genesi genesi international group technology consulting companies united states mexico germany widely known designing manufacturing arm architecture power isa computing devices genesi group consists genesi usa inc. genesi americas llc genesi europe ug red efika bplan gmbh affiliated non-profit organization power2people genesi official linaro partner software development team instrumental moving linux arm architecture towards wider adoption hard-float application binary interface incompatible existing applications provides enormous performance gains many use cases main products genesi arm-based computers designed inexpensive quiet highly energy efficient custom open firmware compliant firmware products run multitude operating systems genesi designed maintains powerdeveloper online platform genesi products arm products manufacturers via powerdeveloper projects programs hundreds systems provided powerdeveloper community far thereby supporting open source development many countries linux distributions directly benefited programs include limited crux debian raspbian fedora gentoo opensuse ubuntu genesi funded development morphos operating system shifted focus towards linux 2004 however genesi remains main supporter operating system continues actively support user developer communities via morphzone social platform features discussion forums digital library software repository bounty system | [
9921,
8899,
4581,
8102,
10501,
10985,
1515,
9163,
9964,
7534,
7151,
7983,
8625,
10223,
799
] | Validation |
4,265 | 2 | Leonard_H._Tower_Jr.:leonard h. tower jr. leonard len h. tower jr. born june 17 1949 free software activist one founding board members free software foundation contributed initial releases gcc gnu diff left free software foundation 1997 tower born june 17 1949 astoria queens new york city u.s 1971 tower received sb biology massachusetts institute technology time business manager tech student newspaper fsf first full-time paid employee tower mostly performed administrative tasks including managing mailing lists newsgroups requests information 1986 tower assisted richard stallman stallman initial plan base c compiler gnu project pastel compiler stallman obtained lawrence livermore lab tower worked rewriting existing code pastel variation pascal c stallman worked building new c front end stallman dropped plan discovered livermore compiler required much memory concluding would write new compiler scratch new compiler known gcc none pastel compiler used managed adapt use c front end written stallman released new gnu c compiler march 22 1987 acknowledging others contributions including tower wrote parts parser rtl generator rtl definitions vax machine description based ideas contributed jack davidson christopher fraser along mike haertel david hayes stallman tower also one initial co-authors gnu diff file comparison utility based published algorithm eugene myers late 1980s early 1990s tower spoke usenix conferences representative fsf tower early member league programming freedom 1991 tower one organization two active speakers along richard stallman | [
2050,
2180,
11654,
4493,
1939,
802,
3618,
5555,
9148,
10687,
10822,
5703,
5833,
8524,
8147,
3674,
2010,
8671,
10464,
9579,
8304,
1394,
8436
] | None |
4,266 | 4 | Gervase_Markham_(programmer):gervase markham programmer gervase markham 21 june 1978 – 27 july 2018 british software engineer mozilla foundation lead developer bugzilla started contributing mozilla project 1999 became youngest paid employee mozilla.org age 23 graduated oxford university markham named paternal grandfather canon gervase markham 1910–2007 squire vicar morland near penrith related 16th-century poet writer gervase markham according times obituary elder gervase markham descendant william markham archbishop york 1710–1807 2006 google-o'reilly open source award best community activist also presented fosdem conference several years mozilla foundation activities bugzilla markham born-again christian undergoing treatment metastatic adenoid cystic carcinoma wrote relationship saw died 27 july 2018 long battle cancer | [] | Train |
4,267 | 9 | CINT:cint cint command line c/c++ interpreter included object oriented data analysis package root although intended use faculties root cint also used standalone addition another program requires interpreter cint interpreted version c/c++ much way beanshell interpreted version java addition language interpreter offers certain bash-like shell features history tab-completion accomplish latter relies heavily reflection support built root user classes follow interfaces may also take advantage features language interpreted cint actually something hybrid c c++ covering 95 ansi c 85 c++ syntax however bit forgiving either language example operator codice_1 replaced codice_2 optional warning addition statements command line need end semi-colon although necessary statements macros cern switched cling c++ interpreter cint distributed standalone author cint latest home page | [
5677,
7919,
9714,
11442,
9078,
2045,
10143
] | None |
4,268 | 4 | WireGuard:wireguard wireguard free open-source software application communication protocol implements virtual private network vpn techniques create secure point-to-point connections routed bridged configurations run module inside linux kernel aims better performance ipsec openvpn tunneling protocols wireguard aims provide vpn simple highly effective review arstechnica observed popular vpn technologies openvpn ipsec often complex set disconnect easily absence configuration take substantial time negotiate reconnections may use outdated ciphers relatively massive code 400,000 600,000 lines code two examples given makes harder find bugs wireguard design seeks reduce issues making tunnel secure easier manage default using versioning cryptography packages focuses ciphers believed among secure current encryption methods also codebase around 4000 lines 1 either openvpn ipsec making security audits easier ars technica reported testing stable tunnels easy create wireguard compared alternatives commented would hard go back long reconnection delays compared wireguard nonsense instant reconnections wireguard utilizes curve25519 key exchange chacha20 encryption poly1305 data authentication siphash hashtable keys blake2s hashing supports layer 3 ipv4 ipv6 encapsulate v4-in-v6 vice versa written jason a. donenfeld published second version gnu general public license gpl may 2019 researchers inria published machine-checked proof protocol produced using cryptoverif proof assistant two early adopters wireguard vpn service providers mullvad azirevpn wireguard received donations mullvad private internet access nlnet foundation december 18 2018 protonmail protonvpn advocated continued research development wireguard technology indicating intent raise financial support oregon senator ron wyden recommended national institute standards technology nist evaluate wireguard replacement existing technologies like ipsec openvpn implementations wireguard protocol include | [
2050,
5254,
10631,
10889,
4746,
8331,
6797,
9722,
8211,
2709,
11162,
1435,
3742,
10016,
9764,
7983,
10417,
7859,
2228,
4791,
823,
8640,
3777,
9281,
2884,
5959,
8265,
11468,
7376,
7889,
11606,
2136,
9048,
6490,
8283,
5084,
5469,
5470,
6364,
... | None |
4,269 | 3 | Sunway_(processor):sunway processor sunway shenwei chinese series computer microprocessors developed jiāngnán computing lab wuxi china uses reduced instruction set computing risc architecture details still sparse sunway series microprocessors developed mainly use military people republic china expressed online forums original microarchitecture believed inspired dec alpha sw-3 thought especially based alpha 21164 jack dongarra states follow-on sw26010 shenwei-64 instruction set related dec alpha instruction set n't say new instruction set three prior generations names although precise details instruction set unknown | [
8450,
398,
1298,
7699,
9371,
9851,
8861,
6815,
3493,
6311,
682,
9132,
9391,
2224,
4144,
1462,
7234,
6084,
3014,
3142,
1480,
6607,
2517,
10985,
9964,
8048,
8944,
757,
2039,
249,
3451,
8700,
1399
] | Validation |
4,270 | 3 | Computer_cooling:computer cooling computer cooling required remove waste heat produced computer components keep components within permissible operating temperature limits components susceptible temporary malfunction permanent failure overheated include integrated circuits central processing units cpus chipset graphics cards hard disk drives components often designed generate little heat possible computers operating systems may designed reduce power consumption consequent heating according workload heat may still produced removed without attention cooling use heatsinks cooled airflow reduces temperature rise produced given amount heat attention patterns airflow prevent development hotspots computer fans widely used along heatsink fans reduce temperature actively exhausting hot air also exotic cooling techniques liquid cooling modern day processors designed cut reduce voltage clock speed internal temperature processor exceeds specified limit cooling may designed reduce ambient temperature within case computer exhausting hot air cool single component small area spot cooling components commonly individually cooled include cpu graphics processing unit gpu northbridge integrated circuits e.g. cpu gpu main generators heat modern computers heat generation reduced efficient design selection operating parameters voltage frequency ultimately acceptable performance often achieved managing significant heat generation operation temperature computer components rise heat transferred surroundings equal heat produced component thermal equilibrium reached reliable operation temperature must never exceed specified maximum permissible value unique component semiconductors instantaneous junction temperature rather component case heatsink ambient temperature critical cooling changed high temperatures significantly reduce life span cause permanent damage components heat output components sometimes exceed computer cooling capacity manufacturers often take additional precautions ensure temperatures remain within safe limits computer thermal sensors integrated cpu motherboard chipset gpu shut high temperatures detected prevent permanent damage although may completely guarantee long-term safe operation overheating component reaches point may throttled temperatures fall safe point using dynamic frequency scaling technology throttling reduces operating frequency voltage integrated circuit disables non-essential features chip reduce heat output often cost slightly significantly reduced performance desktop notebook computers throttling often controlled bios level throttling also commonly used manage temperatures smartphones tablets components packed tightly together little active cooling additional heat transferred hand user electronic computers became larger complex cooling active components became critical factor reliable operation early vacuum-tube computers relatively large cabinets could rely natural forced air circulation cooling however solid state devices packed much densely lower allowable operating temperatures starting 1965 ibm manufacturers mainframe computers sponsored intensive research physics cooling densely packed integrated circuits many air liquid cooling systems devised investigated using methods natural forced convection direct air impingement direct liquid immersion forced convection pool boiling falling films flow boiling liquid jet impingement mathematical analysis used predict temperature rises components possible cooling system geometry ibm developed three generations thermal conduction module tcm used water-cooled cold plate direct thermal contact integrated circuit packages package thermally conductive pin pressed onto helium gas surrounded chips heat conducting pins design could remove 27 watts chip 2000 watts per module maintaining chip package temperatures around systems using tcms 3081 family 1980 es/3090 1984 models es/9000 1990 ibm 3081 processor tcms allowed 2700 watts single printed circuit board maintaining chip temperature thermal conduction modules using water cooling also used mainframe systems manufactured companies including mitsubishi fujitsu cray-1 supercomputer designed 1976 distinctive cooling system machine height diameter consumed 115 kilowatts comparable average power consumption dozen western homes medium-sized car integrated circuits used machine fastest available time using emitter-coupled logic however speed accompanied high power consumption compared later cmos devices heat removal critical refrigerant circulated piping embedded vertical cooling bars twelve columnar sections machine 1662 printed circuit modules machine copper core clamped cooling bar system designed maintain cases integrated circuits refrigerant circulating final heat rejection water-cooled condenser piping heat exchangers pumps cooling system arranged upholstered bench seat around outside base computer 20 percent machine weight operation refrigerant later cray-2 densely packed modules seymour cray trouble effectively cooling machine using metal conduction technique mechanical refrigeration switched 'liquid immersion cooling method involved filling chassis cray-2 liquid called fluorinert fluorinert name implies inert liquid interfere operation electronic components components came operating temperature heat would dissipate fluorinert pumped machine chilled water heat exchanger performance per watt modern systems greatly improved many computations carried given power consumption possible integrated circuits 1980s 1990s recent supercomputer projects blue gene rely air cooling reduces cost complexity size systems compared liquid cooling fans used natural convection insufficient remove heat fans may fitted computer case attached cpus gpus chipset psu hard drives cards plugged expansion slot common fan sizes include 40 60 80 92 120 140 mm 200 230 250 300 mm fans sometimes used high-performance personal computers computer certain resistance air flowing chassis components sum smaller impediments air flow inlet outlet openings air filters internal chassis electronic components fans simple air pumps provide pressure air inlet side relative output side pressure difference moves air chassis air flowing areas lower pressure fans generally two published specifications free air flow maximum differential pressure free air flow amount air fan move zero back-pressure maximum differential pressure amount pressure fan generate completely blocked two extremes series corresponding measurements flow versus pressure usually presented graph fan model unique curve like dashed curves adjacent illustration fans installed parallel series combination parallel installation would fans mounted side side series installation would second fan line another fan inlet fan exhaust fan simplify discussion assumed fans model parallel fans provide double free air flow additional driving pressure series installation hand double available static pressure increase free air flow rate adjacent illustration shows single fan versus two fans parallel maximum pressure water doubled flow rate note air flow changes square root pressure thus doubling pressure increase flow 1.41 times twice might assumed another way looking pressure must go factor four double flow rate determine flow rate chassis chassis impedance curve measured imposing arbitrary pressure inlet chassis measuring flow chassis requires fairly sophisticated equipment chassis impedance curve represented solid red black lines adjacent curve determined actual flow chassis generated particular fan configuration graphically shown chassis impedance curve crosses fan curve slope chassis impedance curve square root function doubling flow rate required four times differential pressure particular example adding second fan provided marginal improvement flow configurations approximately shown plot second fan series would provide slightly better performance parallel installation equation required airflow chassis formula_1 simple conservative rule thumb cooling flow requirements discounting effects heat loss chassis walls laminar versus turbulent flow accounting constants specific heat density sea level formula_2 formula_3 example typical chassis 500 watts load maximum internal temperature environment i.e difference formula_4 would actual flow chassis free air rating fan dual piezo cooling jet patented ge uses vibrations pump air device initial device three millimeters thick consists two nickel discs connected either side sliver piezoelectric ceramics alternating current passed ceramic component causes expand contract 150 times per second nickel discs act like bellows contracted edges discs pushed together suck hot air expanding brings nickel discs together expelling air high velocity device bearings require motor thinner consumes less energy typical fans jet move amount air cooling fan twice size consuming half much electricity lower cost passive heat-sink cooling involves attaching block machined extruded metal part needs cooling thermal adhesive may used commonly personal-computer cpu clamp holds heat sink directly chip thermal grease thermal pad spread block fins ridges increase surface area heat conductivity metal much better air radiates heat better component protecting usually integrated circuit cpu fan-cooled aluminium heat sinks originally norm desktop computers nowadays many heat sinks feature copper base-plates entirely made copper dust buildup metal fins heat sink gradually reduces efficiency countered gas duster blowing away dust along unwanted excess material passive heat sinks commonly found older cpus parts get hot chipset low-power computers usually heat sink attached integrated heat spreader ihs essentially large flat plate attached cpu conduction paste layered dissipates spreads heat locally unlike heat sink spreader meant redistribute heat remove addition ihs protects fragile cpu passive cooling involves fan noise convection forces move air heatsink another growing trend due increasing heat density computer gpu fpga asics immerse entire computer select components thermally electrically conductive liquid although rarely used cooling personal computers liquid immersion routine method cooling large power distribution components transformers also becoming popular data centers personal computers cooled manner may require either fans pumps may cooled exclusively passive heat exchange computer hardware enclosure placed heat exchanger i.e heater core radiator might still needed though piping also needs placed correctly coolant used must sufficiently low electrical conductivity interfere normal operation computer liquid somewhat electrically conductive may cause electrical shorts components traces permanently damage reasons preferred liquid insulator dielectric conduct electricity wide variety liquids exist purpose including transformer oils synthetic single-phase dielectric coolants engineered fluids electrocool l 2-phase coolants 3m fluorinert non-purpose oils including cooking motor silicone oils successfully used cooling personal computers fluids used immersion cooling especially hydrocarbon based materials mineral oils cooking oils organic esters may degrade common materials used computers rubbers pvc thermal greases therefore critical review material compatibility fluids prior use mineral oil particular found negative effects pvc rubber-based wire insulation thermal pastes used transfer heat heat sinks processors graphic cards reported dissolve liquids however negligible impact cooling unless components removed operated air evaporation especially 2-phase coolants pose problem liquid may require either regularly refilled sealed inside computer enclosure powerful computers many features required less powerful computers ones fewer features used via epia motherboard cpu typically dissipates approximately 25 watts heat whereas capable pentium 4 motherboard cpu typically dissipates around 140 watts computers powered direct current external power supply brick generate heat inside computer case replacement cathode ray tube crt displays efficient thin-screen liquid crystal display lcd ones early twenty-first century reduces power consumption significantly component may fitted good thermal contact heatsink passive device large thermal capacity large surface area relative volume heatsinks usually made metal high thermal conductivity aluminium copper incorporate fins increase surface area heat relatively small component transferred larger heatsink equilibrium temperature component plus heatsink much lower component alone would heat carried away heatsink convective fan-forced airflow fan cooling often used cool processors graphics cards consume significant amounts electrical energy computer typical heat-generating component may manufactured flat surface block metal corresponding flat surface finned construction sometimes attached fan clamped component fill poorly conducting air gaps due imperfectly flat smooth surfaces thin layer thermal grease thermal pad thermal adhesive may placed component heatsink heat removed heat-sink convection extent radiation possibly conduction heat-sink thermal contact say metal case inexpensive fan-cooled aluminium heat sinks often used standard desktop computers heat-sinks copper base-plates made copper better thermal characteristics aluminium copper heat-sink effective aluminium unit size relevant regard high-power-consumption components used high-performance computers passive heat sinks commonly found older cpus parts dissipate much power chipset computers low-power processors equipment silent operation critical fan noise unacceptable usually heat-sink clamped integrated heat spreader ihs flat metal plate size cpu package part cpu assembly spreads heat locally thin layer thermal compound placed compensate surface imperfections spreader primary purpose redistribute heat heat-sink fins improve efficiency several brands ddr2 ddr3 ddr4 upcoming ddr5 dram memory modules fitted finned heatsink clipped onto top edge module technique used video cards use finned passive heatsink gpu dust tends build crevices finned heatsinks particularly high airflow produced fans keeps air away hot component reducing cooling effectiveness however removing dust restores effectiveness peltier junctions generally around 10-15 efficient ideal refrigerator carnot cycle compared 40–60 achieved conventional compression cycle systems reverse rankine systems using compression/expansion due lower efficiency thermoelectric cooling generally used environments solid state nature moving parts low maintenance compact size orientation insensitivity outweighs pure efficiency modern tecs use several stacked units composed dozens hundreds thermocouples laid next allows substantial amount heat transfer combination bismuth tellurium commonly used thermocouples active heat pumps consume power tecs produce temperatures ambient impossible passive heatsinks radiator-cooled liquid cooling heatpipe hsfs however pumping heat peltier module typically consume electric power heat amount pumped liquid cooling highly effective method removing excess heat common heat transfer fluid desktop pcs distilled water advantages water cooling air cooling include water higher specific heat capacity thermal conductivity principle used typical active liquid cooling system computers identical used automobile internal combustion engine water circulated water pump waterblock mounted cpu sometimes additional components gpu northbridge heat exchanger typically radiator radiator usually cooled additionally means fan besides fan could possibly also cooled means peltier cooler although peltier elements commonly placed directly top hardware cooled coolant used conduct heat away hot side peltier element coolant reservoir often also connected system besides active liquid cooling systems passive liquid cooling systems also sometimes used systems often discard fan water pump hence theoretically increasing reliability system and/or making quieter active systems downsides systems however much less efficient discarding heat thus also need much coolant -and thus much bigger coolant reservoir- giving time coolant cool liquids allow transfer heat parts cooled air making liquid cooling suitable overclocking high performance computer applications compared air cooling liquid cooling also influenced less ambient temperature liquid cooling comparatively low noise-level compares favorably active cooling become quite noisy disadvantages liquid cooling include complexity potential coolant leak leaked water importantly additives added water damage electronic components comes contact need test repair leaks makes complex less reliable installations notably first major foray field liquid-cooled personal computers general use high-end versions apple power mac g5 ultimately doomed propensity coolant leaks. ref name= powermac g5 coolant leaks/repairs /ref air-cooled heat sink generally much simpler build install maintain water cooling solution although cpu-specific water cooling kits also found may easy install air cooler limited cpus however liquid cooling gpu cards also possible originally limited mainframe computers liquid cooling become practice largely associated overclocking form either manufactured kits form do-it-yourself setups assembled individually gathered parts past years seen increase popularity liquid cooling pre-assembled moderate high performance desktop computers sealed closed-loop systems incorporating small pre-filled radiator fan waterblock simplify installation maintenance water cooling slight cost cooling effectiveness relative larger complex setups liquid cooling typically combined air cooling using liquid cooling hottest components cpus gpus retaining simpler cheaper air cooling less demanding components ibm aquasar system uses hot water cooling achieve energy efficiency water used heat buildings well since 2011 effectiveness water cooling prompted series all-in-one aio water cooling solutions aio solutions result much simpler install unit units reviewed positively review sites heat pipe hollow tube containing heat transfer liquid liquid absorbs heat evaporates one end pipe vapor travels cooler end tube condenses giving latent heat liquid returns hot end tube gravity capillary action repeats cycle heat pipes much higher effective thermal conductivity solid materials use computers heat sink cpu attached larger radiator heat sink heat sinks hollow attachment creating one large heat pipe transfers heat cpu radiator cooled using conventional method method expensive usually used space tight small form-factor pcs laptops fan noise tolerated audio production efficiency method cooling many desktop cpus gpus well high end chipsets use heat pipes addition active fan-based cooling remain within safe operating temperatures cooling technology development kronos thorn micro technologies employs device called ionic wind pump also known electrostatic fluid accelerator basic operating principle ionic wind pump corona discharge electrical discharge near charged conductor caused ionization surrounding air corona discharge cooler developed kronos works following manner high electric field created tip cathode placed one side cpu high energy potential causes oxygen nitrogen molecules air become ionized positively charged create corona halo charged particles placing grounded anode opposite end cpu causes charged ions corona accelerate towards anode colliding neutral air molecules way collisions momentum transferred ionized gas neutral air molecules resulting movement gas towards anode advantages corona-based cooler lack moving parts thereby eliminating certain reliability issues operating near-zero noise level moderate energy consumption soft cooling practice utilizing software take advantage cpu power saving technologies minimize energy use done using halt instructions turn put standby state cpu subparts n't used underclocking cpu resulting lower total speeds useful overclocking cpu improve user experience rather increase raw processing power since prevent need noisier cooling contrary term suggests form cooling reducing heat creation undervolting practice running cpu component voltages device specifications undervolted component draws less power thus produces less heat ability varies manufacturer product line even different production runs product well components system processors often specified use voltages higher strictly necessary tolerance ensures processor higher chance performing correctly sub-optimal conditions lower-quality motherboard low power supply voltages certain limit processor function correctly although undervolting far typically lead permanent hardware damage unlike overvolting undervolting used quiet systems less cooling needed reduction heat production allowing noisy fans omitted also used battery charge life must maximized conventional cooling techniques attach cooling component outside computer chip package attaching technique always exhibit thermal resistance reducing effectiveness heat efficiently quickly removed directly cooling local hot spots chip within package locations power dissipation 300 w/cm typical cpu less 100 w/cm occur although future systems expected exceed 1000 w/cm form local cooling essential developing high power density chips ideology led investigation integrating cooling elements computer chip currently two techniques micro-channel heat sinks jet impingement cooling micro-channel heat sinks channels fabricated silicon chip cpu coolant pumped channels designed large surface area results large heat transfers heat dissipation 3000 w/cm reported technique heat dissipation increased two-phase flow cooling applied unfortunately system requires large pressure drops due small channels heat flux lower dielectric coolants used electronic cooling another local chip cooling technique jet impingement cooling technique coolant flown small orifice form jet jet directed toward surface cpu chip effectively remove large heat fluxes heat dissipation 1000 w/cm reported system operated lower pressure comparison micro-channel method heat transfer increased using two-phase flow cooling integrating return flow channels hybrid micro-channel heat sinks jet impingement cooling phase-change cooling extremely effective way cool processor vapor compression phase-change cooler unit usually sits underneath pc tube leading processor inside unit compressor type air conditioner compressor compresses gas mixture gases comes evaporator cpu cooler discussed hot high pressure vapor pushed condenser heat dissipation device condenses hot gas liquid typically subcooled exit condenser liquid fed expansion device restriction system cause drop pressure vaporize fluid cause reach pressure boil desired temperature expansion device used simple capillary tube elaborate thermal expansion valve liquid evaporates changing phase absorbing heat processor draws extra energy environment accommodate change see latent heat evaporation produce temperatures reaching around liquid flow evaporator boiling cooling cpu turning vapor low pressure end evaporator gas flows compressor cycle begins way processor cooled temperatures ranging depending load wattage processor refrigeration system see refrigeration gas mixture used type system suffers number issues cost weight size vibration maintenance cost electricity noise need specialized computer tower mainly one must concerned dew point proper insulation sub-ambient surfaces must done pipes sweat dripping water sensitive electronics alternately new breed cooling system developed inserting pump thermosiphon loop adds another degree flexibility design engineer heat effectively transported away heat source either reclaimed dissipated ambient junction temperature tuned adjusting system pressure higher pressure equals higher fluid saturation temperatures allows smaller condensers smaller fans and/or effective dissipation heat high ambient temperature environment systems essence next generation fluid cooling paradigm approximately 10 times efficient single phase water since system uses dielectric heat transport medium leaks cause catastrophic failure electric system type cooling seen extreme way cool components since units relatively expensive compared average desktop also generate significant amount noise since essentially refrigerators however compressor choice air cooling system main determinant allowing flexibility noise reduction based parts chosen liquid nitrogen boils far freezing point water valuable extreme coolant short overclocking sessions typical installation liquid nitrogen cooling copper aluminum pipe mounted top processor graphics card system heavily insulated condensation liquid nitrogen poured pipe resulting temperatures well evaporation devices ranging cut heat sinks pipes attached custom milled copper containers used hold nitrogen well prevent large temperature changes however nitrogen evaporates refilled realm personal computers method cooling seldom used contexts overclocking trial-runs record-setting attempts cpu usually expire within relatively short period time due temperature stress caused changes internal temperature although liquid nitrogen non-flammable condense oxygen directly air mixtures liquid oxygen flammable materials dangerously explosive liquid nitrogen cooling generally used processor benchmarking due fact continuous usage may cause permanent damage one parts computer handled careless way even harm user liquid helium colder liquid nitrogen also used cooling liquid helium boils temperatures ranging measured heatsink however liquid helium expensive difficult store use liquid nitrogen also extremely low temperatures cause integrated circuits stop functioning silicon-based semiconductors example freeze around cooling improved several techniques may involve additional expense effort techniques often used particular run parts computer cpu gpu higher voltages frequencies specified manufacturer overclocking increases heat generation installation higher performance non-stock cooling may also considered modding many overclockers simply buy efficient often expensive fan heat sink combinations others resort exotic ways computer cooling liquid cooling peltier effect heatpumps heat pipe phase change cooling also related practices positive impact reducing system temperatures often called thermal interface material tim e.g intel perfectly flat surfaces contact give optimal cooling perfect flatness absence microscopic air gaps practically possible particularly mass-produced equipment thin skim thermal compound much thermally conductive air though much less metal improve thermal contact cooling filling air gaps small amount compound sufficient fill gaps used best temperature reduction obtained much debate merits compounds overclockers often consider compounds superior others main consideration use minimal amount thermal compound required even surfaces thermal conductivity compound typically 1/3 1/400 metal though much better air conductivity heatsink compound ranges 0.5 80w/mk see articles aluminium 200 air 0.02 heat-conductive pads also used often fitted manufacturers heatsinks less effective properly applied thermal compound simpler apply fixed heatsink omitted users unaware importance good thermal contact replaced thick ineffective layer compound unlike techniques discussed use thermal compound padding almost universal dissipating significant amounts heat mass-produced cpu heat spreaders heatsink bases never perfectly flat smooth surfaces placed best contact possible air gaps reduce heat conduction easily mitigated use thermal compound best possible results surfaces must flat possible achieved laborious process known lapping reduce cpu temperature typically older pcs use flat ribbon cables connect storage drives ide scsi large flat cables greatly impede airflow causing drag turbulence overclockers modders often replace rounded cables conductive wires bunched together tightly reduce surface area theoretically parallel strands conductors ribbon cable serve reduce crosstalk signal carrying conductors inducing signals nearby conductors empirical evidence rounding cables reducing performance may length cable short enough effect crosstalk negligible problems usually arise cable electromagnetically protected length considerable frequent occurrence older network cables computer cables cable tied chassis cables increase airflow less problem new computers use serial ata much narrower cable colder cooling medium air effective cooling cooling air temperature improved guidelines fewer fans strategically placed improve airflow internally within pc thus lower overall internal case temperature relation ambient conditions use larger fans also improves efficiency lowers amount waste heat along amount noise generated fans operation little agreement effectiveness different fan placement configurations little way systematic testing done rectangular pc atx case fan front fan rear one top found suitable configuration however amd somewhat outdated system cooling guidelines notes front cooling fan seem essential fact extreme situations testing showed fans recirculating hot air rather introducing cool air may fans side panels could similar detrimental effect—possibly disrupting normal air flow case however unconfirmed probably varies configuration desktop computers typically use one fans cooling almost desktop power supplies least one built-in fan power supplies never draw heated air within case results higher psu operating temperatures decrease psu energy efficiency reliability overall ability provide steady supply power computer internal components reason modern atx cases exceptions found ultra-low-budget cases feature power supply mount bottom dedicated psu air intake often filter beneath mounting location allowing psu draw cool air beneath case manufacturers recommend bringing cool fresh air bottom front case exhausting warm air top rear fans fitted force air case effectively removed pressure inside becomes higher outside referred positive airflow opposite case called negative airflow worth noting positive internal pressure prevents dust accumulating case air intakes equipped dust filters case negative internal pressure suffer higher rate dust accumulation even intakes filtered negative pressure draw dust available opening case air flow inside typical desktop case usually strong enough passive cpu heatsink desktop heat sinks active including one even multiple directly attached fans blowers server cooling fans 1 u enclosures usually located middle enclosure hard drives front passive cpu heat sinks rear larger higher enclosures also exhaust fans approximately 4u may active heat sinks power supplies generally rear-facing exhaust fans data centers typically contain many racks thin horizontally mounted 1u servers air drawn front rack exhausted rear data centers typically contain large numbers computers power-dissipating devices risk equipment overheating extensive hvac systems used prevent often raised floor used area floor may used large plenum cooled air power cabling another way accommodating large numbers systems small space use blade chassis oriented vertically rather horizontally facilitate convection air heated hot components tends rise creating natural air flow along boards stack effect cooling manufacturers take advantage effect laptops present difficult mechanical airflow design power dissipation cooling challenge constraints specific laptops include device whole light possible form factor built around standard keyboard layout users close noise must kept minimum case exterior temperature must kept low enough used lap cooling generally uses forced air cooling heat pipes use metal chassis case passive heat sink also common solutions reduce heat include using lower power-consumption arm intel atom processors mobile devices usually discrete cooling systems mobile cpu gpu chips designed maximum power efficiency due constraints device battery higher performance devices may include heat spreader aids transferring heat external case phone tablet | [
518,
1933,
3472,
8730,
7963,
10658,
3882,
3883,
10288,
1480,
10966,
2394,
2525,
10337,
8035,
11623,
1515,
9964,
4334,
7151,
1776,
3323
] | Test |
4,271 | 0 | Research_on_Language_and_Computation:research language computation research language computation quarterly peer-reviewed academic journal covering research computational linguistics natural language processing established 2003 ceased publication december 2010 journal published springer science+business media journal abstracted indexed | [
1890,
7780
] | Test |
4,272 | 4 | Anti-spam_techniques_(users):anti-spam techniques users people tend much less bothered spam slipping filters mail box false negatives desired e-mail ham blocked false positives trying balance false negatives missed spams vs false positives rejecting good e-mail critical successful anti-spam system servers able block spam tools individual users help control balance number techniques individuals use restrict availability e-mail addresses reducing preventing attractiveness spam sharing email address among limited group correspondents one way limit spam method relies discretion members group disclosing email addresses outside group circumvents trust relationship group reason forwarding messages recipients n't know one another avoided absolutely necessary forward messages recipients n't know one another good practice list recipient names bcc instead practice avoids scenario unscrupulous recipients might compile list email addresses spamming purposes practice also reduces risk address distributed computers affected email address harvesting malware however privacy email address lost divulgence likely regained posting anonymously fake name address one way avoid e-mail address harvesting users ensure fake address valid users want receive legitimate email regarding posts web sites alter addresses humans figure spammers instance joe example.com might post joenos pam.invalid.example.com address munging however cause legitimate replies lost user valid address truly invalid otherwise someone server still get spam ways use transparent address munging avoid allowing users see actual address obfuscate automated email harvesters methods displaying part e-mail address web page image text logo shrunken normal size using in-line css jumbled text order characters restored using css spammers often regard responses messages—even responses like n't spam —as confirmation email address valid likewise many spam messages contain web links addresses user directed follow removed spammer mailing list several cases spam-fighters tested links confirming lead recipient address removal—if anything lead spam removal request filing complaint may get address list washed lower complaints spammer stay active acquire new accounts and/or internet provider sender addresses often forged spam messages including using recipient address forged sender address responding spam may result failed deliveries may reach innocent e-mail users whose addresses abused usenet widely considered even important avoid responding spam many isps software seek destroy duplicate messages someone may see spam respond cancelled server effect reposting spam since duplicate reposted copy last longer replying may also cause poster falsely linked part spam message contact forms allow users send email filling forms web browser web server takes form data forwarding email address users never see email address forms however sometimes inconvenient users able use preferred e-mail client risk entering faulty reply address typically notified delivery problems contact forms drawback require website supports server side scripts finally software used run contact forms badly designed become spam tool right additionally spammers begun send spam using contact form many modern mail programs incorporate web browser functionality display html urls images easily expose user offensive images spam addition spam written html contain web bugs allows spammers see e-mail address valid message caught spam filters javascript programs used direct user web browser advertised page make spam message difficult close delete spam messages contained attacks upon security vulnerabilities html renderer using holes install spyware computer viruses borne mechanisms mail clients automatically download display html images attachments fewer risks clients configured display default email user may sometimes need give address site without complete assurance site owner use sending spam one way mitigate risk provide disposable email address—a temporary address user disable abandon forwards email real account number services provide disposable address forwarding addresses manually disabled expire given time interval expire certain number messages forwarded disposable email addresses used users track whether site owner disclosed address capability resulted legal jeopardy sites disclose confidential addresses without permission systems use ham passwords ask unrecognised senders include email password demonstrates email message ham spam message typically email address ham password would described web page ham password would included subject line email address ham passwords often combined filtering systems counter risk filtering system accidentally identify ham message spam message plus addressing technique appends password username part email address tracking spammer isp reporting offense lead spammer service terminated criminal prosecution unfortunately difficult track spammer—and online tools assist always accurate occasionally spammers employ netblocks case abuse contact netblock spammer confirm address examples online tools spamcop network abuse clearinghouse provide automated semi-automated means report spam isps spam-fighters regard inaccurate compared expert email system however email users experts free tool called complainterator may used reporting spam complainterator send automatically generated complaint registrar spamming domain registrar name servers historically reporting spam way seriously abated spam since spammers simply move operation another url isp network ip addresses consumers may also forward unwanted deceptive commercial email email address spam uce.gov maintained us federal trade commission ftc database collected used prosecute perpetrators scam deceptive advertising alternative contacting isps contact registrar domain name used spam e-mail registrars icann-accredited administrative organizations obliged uphold certain rules regulations resources necessary dealing abuse complaints advocate responding aggressively spam—in words spamming spammer basic idea make spamming less attractive spammer increasing spammer overhead several ways reach spammer besides caveats mentioned may lead retaliations spammer variety techniques e-mail senders use try make sure send spam failure control amount spam sent judged e-mail receivers often cause even legitimate email blocked sender put dnsbls since spammer accounts frequently disabled due violations abuse policies constantly trying create new accounts due damage done isp reputation source spam many isps web email providers use captchas new accounts verify real human registering account automated spamming system also verify credit cards stolen accepting new customers check spamhaus project rokso list background checks one difficulty implementing opt-in mailing lists many means gathering user email addresses remain susceptible forgery instance company puts web form allow users subscribe mailing list products malicious person enter people email addresses — harass make company appear spamming anti-spammers company sends e-mail forgery victims spamming albeit inadvertently prevent abuse maps anti-spam organizations encourage mailing lists use confirmed opt-in also known verified opt-in double opt-in whenever email address presented subscription list list software send confirmation message address confirmation message contains advertising content construed spam — address added live mail list unless recipient responds confirmation message see also spamhaus mailing lists vs. spam lists page modern mailing list management programs gnu mailman listserv majordomo qmail ezmlm support confirmed opt-in default e-mail senders type anti-spam checks e-mail coming users customers done e-mail coming rest internet sort bounce message anti-virus warning gets sent forged email address result backscatter problems sending challenges forged e-mail addresses greatly reduced creating new message contains challenge instead challenge placed bounce message receiving mail system gives rejection-code smtp session receiving mail system rejects e-mail way sending system actually creates bounce message result bounce message almost always sent real sender format language sender usually recognize firewalls routers programmed allow smtp traffic tcp port 25 machines network supposed run mail transfer agents send e-mail practice somewhat controversial isps block home users especially isps allow blocking turned upon request e-mail still sent computers designated smart hosts via port 25 smart hosts via e-mail submission port 587 network address translation used intercept port 25 smtp traffic direct mail server enforces rate limiting egress spam filtering commonly done hotels cause e-mail privacy problems well making impossible use starttls smtp-auth port 587 submission port n't used machines suddenly start sending lots e-mail may well become zombie computers limiting rate e-mail sent around typical computer question legitimate e-mail still sent large spam runs slowed manual investigation done monitoring spam reports places spamcop aol feedback loop network abuse clearinghouse domain abuse mailbox etc. isps often learn problems seriously damage isp reputation mail servers blacklisted malicious software human spam senders often use forged addresses sending spam messages control may enforced smtp servers ensure senders use correct email address field outgoing messages email users database user record e-mail address smtp server must check email address field outgoing message address belongs user credentials supplied smtp authentication field forged smtp error returned email client e.g email address trying send isps webmail providers either acceptable use policy aup terms service tos agreement discourages spammers using system allows spammer terminated quickly violations increasingly anti-spam efforts led co-ordination law enforcement researchers major consumer financial service companies internet service providers monitoring tracking e-mail spam identity theft phishing activities gathering evidence criminal cases appropriate legislation enforcement significant impact spamming activity penalty provisions australian spam act 2003 dropped australia ranking list spam-relaying countries email spam tenth twenty-eighth legislation provides mandates bulk emailers must follow makes compliant spam easier identify filter analysis sites spamvertised given piece spam often leads questionable registrations internet domain names since registrars required maintain trustworthy whois databases digging registration details complaining proper locations often results site shutdowns uncoordinated activity may effective given today volume spam rate criminal organizations register new domains however coordinated effort implemented adequate infrastructure obtain good results since spamming facilitated fact large volumes email inexpensive send one proposed set solutions would require senders pay cost order send email making prohibitively expensive spammers anti-spam activist daniel balsam attempts make spamming less profitable bringing lawsuits spammers number proposals sideband protocols assist smtp operation anti-spam research group asrg internet research task force irtf working number email authentication proposals providing simple source authentication flexible lightweight scalable recent internet engineering task force ietf activities include marid 2004 leading two approved ietf experiments 2005 domainkeys identified mail 2006 dmarc stands domain-based message authentication reporting conformance standardizes email receivers perform email authentication using well-known sender policy framework spf dkim mechanisms channel email new proposal sending email attempts distribute anti-spam activities forcing verification probably using bounce messages back-scatter n't occur first email sent new contacts smtp proxies allow combating spam real time combining sender behavior controls providing legitimate users immediate feedback eliminating need quarantine statistical bayesian filtering set requires administrative maintenance per se instead users mark messages spam nonspam filtering software learns judgements thus statistical filter reflect software author administrator biases content rather user biases example biochemist researching viagra wo n't messages containing word viagra automatically flagged spam viagra show often legitimate messages still spam emails containing word viagra get filtered content rest spam messages differs significantly content legitimate messages statistical filter also respond quickly changes spam content without administrative intervention long users consistently designate false negative messages spam received email statistical filters also look message headers thereby considering content also peculiarities transport mechanism email typical statistical filtering uses single words calculations decide message classified spam powerful calculation made using groups two words taken together random noise words used successfully fool filter software programs implement statistical filtering include bogofilter dspam spambayes assp e-mail programs mozilla mozilla thunderbird mailwasher later revisions spamassassin another interesting project crm114 hashes phrases bayesian classification phrases also free mail filter popfile sorts mail many categories user wants family friends co-worker spam whatever bayesian filtering spam subject several research conferences including | [
1667,
3462,
519,
9222,
8202,
8204,
3350,
10263,
10392,
1305,
11418,
8224,
8747,
10541,
9909,
4793,
7739,
9532,
4414,
8130,
4547,
3908,
4294,
10696,
3145,
10826,
10578,
7764,
3032,
7515,
9053,
4325,
6246,
488,
6762,
1771,
1653,
6261
] | Test |
4,273 | 4 | Whoscall:whoscall whoscall caller id number management mobile application developed gogolook division korean company naver corporation app identifies incoming call call comes allowing users identify important calls filter unwanted callers also includes number management features number keyword blocks offline database whoscall relies networks local partners internet searches user community generated content identify numbers platform available across android windows phone ios platforms name whoscall derives calling available 31 countries including taiwan korea hong kong japan thailand brazil conception app arose weekly gathering three founders later became gogolook moment took time day jobs work various app ideas weekends free time gathering one founders received telephone call promptly asked others quick search incoming unknown number online hoping search result either forum business page prepare call choose ignore got wondering app feasible first version app launched august 2010 still one several apps part-timers moment got slow start eventually gained traction propelled limelight google ’ ceo eric schmidt visit taiwan mentioned app whoscall name “ app called whoscall tells strange numbers ’ fast growing ... taiwan. ” 2013 whoscall selected google play ’ best apps 2013 8 countries across asia time received initial funding trinity investment corporation angel investors end year whoscall buyout korea internet service company nhn株式會社 nt 529 million dollars whoscall ios version launched december 2014 2015 whoscall official website completely updated provide search services number searching time whoscall officially launched beta test whoscall card also released whoscall featured whoscall dialer shortcuts end 2015 whoscall announced upgrade three major functions whoscall card mobile directory whoscall featured soon became user personal call manager 2016 whoscall fully upgraded whoscall card ios version introduces instant caller identification new blocking features end 2016 whoscall global downloads exceeded 50 million identifying billions times month july 18 2017 whoscall signed mou korean financial management association company launched online shopping reporting system fraud october whoscall released playbook advanced searching feature providing caller identification also store information far whoscall 60 million users around world specializing ai r whoscall showcard released beta v4.3 allows users customize outgoing call screens users edit personal business names along descriptions business address business hours photos shown shown showcard info shown outgoing calls rings screen receiving end call ends receiver call end dialogue may also choose view information regarding number whoscall featured several prominent international media including techcrunch techinasia e27 highly regarded overwhelming positive reviews holds average 4.4 star ratings google play store 2013 google play taiwan awarded whoscall 2013 innovation awards year whoscall awarded google play ’ best apps year taiwan hong kong singapore philippines malaysia indonesia vietnam thailand 2015 whoscall 2015 app store featured next year whoscall became 2016 google play featured awarded popular app google store 2017 whoscall chosen google successful case study event google i/o 2017 november 2011 google ’ ceo eric schmidt visit taiwan mentioned app whoscall name “ app called whoscall tells strange numbers ’ fast growing ... taiwan. ” may 20 2014 president taiwan ying-jeou address nation marking 6th year office mentions gogolook name refers example creativity potential youth taiwan april 2014 growing concerns regarding whoscall privacy issues prompting public figures take press cases public records including home telephone numbers addresses showing incoming calling screens gogolook swiftly came statement never collected stored personal information servers let alone make publicly available soon discovered personal information said public figures leaked government servers poor security made available search engines gogolook sources information whoscall promptly lauded call screen telemarketers also reliable reminder possible dissemination personal information | [
8351,
11170,
8413,
7983
] | Train |
4,274 | 7 | Heartbeat_network:heartbeat network computer clusters heartbeat network private network shared nodes cluster accessible outside cluster used cluster nodes order monitor node status communicate messages necessary maintaining operation cluster heartbeat method uses fifo nature signals sent across network making sure messages received system ensures events properly ordered communications protocol every node sends back message given interval say delta effect confirming alive heartbeat messages viewed control messages help determine network includes delayed messages receiver node called sync maintains ordered list received messages message timestamp later given marked time received every node system determines messages received since fifo property ensures messages ordered general difficult select delta optimal applications delta small requires much overhead large results performance degradation everything waits next heartbeat signal | [
2913,
3927,
4026,
9243,
5566
] | None |
4,275 | 4 | BLADE_(software):blade software blade block drive-by download exploits computer program developed phillip porras vinod yegneswaran sri international long lu wenke lee georgia institute technology blade funded grants national science foundation united states army research laboratory office naval research program designed prevent drive-by download malware attacks | [
3786,
3555,
5612,
5373
] | Train |
4,276 | 3 | Larrabee_(microarchitecture):larrabee microarchitecture larrabee codename cancelled gpgpu chip intel developing separately current line integrated graphics accelerators named larrabee state park whatcom county washington near town bellingham chip released 2010 core consumer 3d graphics card plans cancelled due delays disappointing early performance figures project produce gpu retail product directly larrabee research project terminated may 2010 intel mic multiprocessor architecture announced 2010 inherited many design elements larrabee project function graphics processing unit product intended co-processor high performance computing almost decade later june 12 2018 idea intel dedicated gpu revived intel desire create discrete gpu set launch 2020 whether new development connected developments larabee remain uncertain however december 4 2009 intel officially announced first-generation larrabee would released consumer gpu product instead released development platform graphics high-performance computing official reason strategic reset attributed delays hardware software development may 25 2010 technology intel blog announced larrabee would released gpu instead would released product high-performance computing competing nvidia tesla project produce gpu retail product directly larrabee research project terminated may 2010 intel mic multiprocessor architecture announced 2010 inherited many design elements larrabee project function graphics processing unit product intended co-processor high performance computing prototype card named knights ferry production card built 22 nm process named knights corner planned production 2012 later larrabee considered hybrid multi-core cpu gpu similarities coherent cache hierarchy x86 architecture compatibility cpu-like wide simd vector units texture sampling hardware gpu-like gpu larrabee would supported traditional rasterized 3d graphics direct3d opengl games however hybridization cpu gpu features also suitable general purpose gpu gpgpu stream processing tasks example might performed ray tracing physics processing real time games offline scientific research component supercomputer larrabee early presentation drew criticism gpu competitors nvision 08 nvidia employee called intel siggraph paper larrabee marketing puff quoted industry analyst peter glaskowsky speculated larrabee architecture like gpu 2006 june 2009 intel claimed prototypes larrabee par nvidia geforce gtx 285 justin rattner intel cto delivered keynote supercomputing 2009 conference november 17 2009 talk demonstrated overclocked larrabee processor topping one teraflops performance claimed first public demonstration single-chip system exceeding one teraflops pointed early silicon thereby leaving open question eventual performance architecture one fifth available competing graphics boards larrabee cancelled standalone discrete graphics product december 4 2009 larrabee intended differ older discrete gpus geforce 200 series radeon 4000 series three major ways expected make larrabee flexible current gpus allowing differentiation appearance games 3d applications intel siggraph 2008 paper mentioned several rendering features difficult achieve current gpus render target read order-independent transparency irregular shadow mapping real-time raytracing recent gpus ati radeon hd 5xxx nvidia geforce 400 series feature increasingly broad general-purpose computing capabilities via directx11 directcompute opencl well nvidia proprietary cuda technology giving many capabilities larrabee x86 processor cores larrabee differed several ways cores current intel cpus core 2 duo core i7 theoretically larrabee x86 processor cores would able run existing pc software even operating systems different version processor might sit motherboard cpu sockets using quickpath intel never announced plans though larrabee native c/c++ compiler included auto-vectorization many applications able execute correctly recompiled maximum efficiency expected required code optimization using c++ vector intrinsics inline larrabee assembly code however gpgpus software would benefited utilization vector processing unit one tech journalism site claims larrabee graphics capabilities planned integrated cpus based haswell microarchitecture larrabee philosophy using many small simple cores similar ideas behind cell processor commonalities use high-bandwidth ring bus communicate cores however many significant differences implementation expected make programming larrabee simpler intel began integrating line gpus onto motherboards intel gma brand 2004 integrated onto motherboards newer versions released sandy bridge incorporated onto die cpu chips sold separately though low cost power consumption intel gma chips made suitable small laptops less demanding tasks lack 3d graphics processing power compete contemporary nvidia amd/ati gpus share high-end gaming computer market hpc market place popular video game consoles contrast larrabee sold discrete gpu separate motherboards expected perform well enough consideration next generation video game consoles team working larrabee separate intel gma team hardware designed newly formed team intel hillsboro oregon site separate designed nehalem software drivers written newly formed team 3d stack specifically written developers rad game tools including michael abrash intel visual computing institute research basic applied technologies could applied larrabee-based products intel siggraph 2008 paper describes cycle-accurate simulations limitations memory caches texture units included larrabee projected performance graphs show many 1 ghz larrabee cores required maintain 60 frame/s 1600×1200 resolution several popular games roughly 25 cores required gears war antialiasing 25 cores f.e.a.r 4× antialiasing 10 cores 4× antialiasing intel claimed larrabee would likely run faster 1 ghz numbers represent actual cores rather virtual timeslices another graph shows performance games scales nearly linearly number cores 32 cores 48 cores performance drops 90 would expected linear relationship continued june 2007 pc watch article suggested first larrabee chips would feature 32 x86 processor cores come late 2009 fabricated 45 nanometer process chips defective cores due yield issues would sold 24-core version later 2010 larrabee would shrunk 32 nanometer fabrication process enable 48-core version last statement performance calculated theoretically maximum possible performance follows 32 cores × 16 single-precision float simd/core × 2 flop fused multiply-add × 2 ghz 2 tflops theoretically public demonstration larrabee architecture took place intel developer forum san francisco september 22 2009 early port former cpu-based research project shown real-time scene contained ray traced water surface reflected surrounding objects like ship several flying vehicles accurately second demo given sc09 conference portland november 17 2009 keynote intel cto justin rattner larrabee card able achieve 1006 gflops sgemm 4kx4k calculation engineering sample larrabee card procured reviewed linus sebastian video published may 14 2018 unable make card give video output however motherboard displaying post code d6 | [
3586,
3459,
5380,
2821,
3973,
9095,
5386,
9611,
4108,
6926,
5649,
5523,
6804,
8851,
4886,
407,
3352,
9111,
5883,
6815,
10658,
9126,
6311,
3882,
10669,
9391,
10548,
1461,
9911,
2237,
5309,
8126,
8514,
6339,
5444,
1480,
1998,
2638,
5073,
11... | Test |
4,277 | 9 | Interactive_Ruby_Shell:interactive ruby shell interactive ruby shell irb irb repl programming object-oriented scripting language ruby abbreviation irb comes fact filename extension ruby .rb although interactive ruby files extension .irb program launched command line allows execution ruby commands immediate response experimenting real-time features command history line editing capabilities job control able communicate directly shell script internet interact live server developed keiju ishitsuka syntax example | [
2181,
7430,
9229,
4750,
2191,
7695,
10387,
10771,
7325,
9245,
7983,
564,
9780,
5945,
1852,
5567,
6338,
8262,
11208,
5578,
10973,
2786,
1379,
9320,
11625,
5612,
2804
] | Test |
4,278 | 3 | Alien_8:alien 8 alien 8 action-adventure video game developed published ultimate play game released zx spectrum bbc micro amstrad cpc msx 1985 game spiritual successor best-selling knight lore lauded critics isometric graphics game player takes control robot alien 8 whose job ensure cryogenically frozen passengers board starship remain viable ship voyage game written chris stamper graphics designed tim stamper alien 8 uses image masking technique knight lore allows developers create composite structures stacked images without visual overlay technique copyrighted ultimate filmation game engine spiritual predecessor game rendered isometric projection game critically acclaimed upon release reviewers praised game graphics innovation however minor criticism directed similarities knight lore game presented isometric format set board starship taking role robot alien 8 player must explore large starship order ensure cryogenic life support systems preserving biological crew re-activated core system series geometrically-shaped circuits however circuits removed invading aliens distributed around starship main objective game collect correct circuits return respective locations starship reaches destination circuits variously shaped cubes pyramids domes cylinders spiritual predecessor environment game takes form series isometric flip-screen rooms trace outline large starship total 129 rooms filled various objects moveable platforms static hazards spikes hostile aliens well executing well-timed manoeuvres jumps player able use starship props block defend another feature use remote controlled drones directed alien 8 inaccessible dangerous areas dying planet distant galaxy last creatures known guardians stored libraries records knowledge single starship together cryogenically preserved members race single robot alien 8 tasked keeping occupants vessel alive duration journey ship launched towards new solar system alien 8 performs task thousands years journey however ship nears destination attacked boarded hostile aliens cryogenic life support systems damaged attack alien 8 must restore operational status ship automatic thrusting systems manoeuvre planetary orbit development alien 8 began immediately release knight lore stamper brothers predicted publishers would attempt copy knight lore filmation technology games predecessor stamper brothers developed game monochrome avoid visual overlay attribute clash common processing limitation early 8-bit consoles however amstrad release exclusively displayed dual-colours game critically acclaimed upon release reviewer crash praised graphics presentation stating excellent imaginative pleasing compared predecessor despite regarding slight difference amstrad action similarly praised graphics citing amazing brilliant great colour combinations reviewer amtix stated visuals breathtakingly stunning improves predecessor david kelly popular computing weekly stated game little disappointment due similarities knight lore however asserted graphics superior quality predecessor chris bourne sinclair user stated general quality graphics higher predecessor although used identical system crash praised new additions game particular time limit various collectable items reviewer stated new features compelling exciting differs predecessor reviewer amstrad action similarly praised innovation stating wonderfully original ideas despite criticising similarities knight lore kelly praised game extra puzzles animation enemies heralding brilliant bourne similarly praised 3d animation stating every extension game improved knight lore | [
320,
4102,
9191,
2792,
9254,
9006,
10931,
5820,
2173
] | Test |
4,279 | 2 | MCC_Interim_Linux:mcc interim linux mcc interim linux linux distribution first released february 1992 owen le blanc manchester computing centre mcc part university manchester first linux distribution created computer users unix experts featured menu-driven installer installed kernel set end-user programming tools mcc first made linux available anonymous ftp november 1991 le blanc irritations early experiments linux lack working fdisk would later write one need use multiple ftp repositories acquire essential software library version problems inspired creation distribution le blanc claimed referred distributions interim ... intended final official small harmonious moderately tested conform everyone taste -- release -- provide stable base software added prior first release closest approximation linux distribution h j lu boot-root floppy disk images two 5¼ diskette images containing linux kernel minimum tools required get started minimal tools able boot hard drive required editing master boot record hex editor first release mcc interim linux based linux 0.12 made use theodore ts ramdisk code copy small root image memory freeing floppy drive additional utilities diskettes also stated distributions unofficial experiments describing goals releases indeed attempt ever made distribute wide range software even x386 windowing system soon first release came distributions tamu created individuals texas university martin junius mj softlanding linux system h j lu small base system turn quickly superseded debian slackware oldest surviving distributions 1.0 distribution mcc interim pointed debian five times size mcc quite comprehensive final distribution encouraged users switch debian providing transitional support discussed email dated 23 april 1992 boot utilities disk pair included optional pair disks contained gcc g++ 2.1 kermit shoelace released 14 april 1993 added version 0.95c+ bison flex gdb gprof groff gzip man released 26 april 1993 added version 0.99.p8 emacs info added version 0.99.p8+ elm lp mail progman timezone words | [
8837,
9735,
7435,
10127,
912,
2321,
5397,
3222,
4887,
6808,
10394,
10016,
673,
3745,
10530,
11297,
9253,
10149,
11305,
4398,
7854,
2738,
4790,
439,
56,
59,
7483,
3903,
4673,
9542,
2375,
4039,
5067,
8907,
4309,
1110,
9693,
2914,
485,
3685,... | Test |
4,280 | 5 | Zerocoin_protocol:zerocoin protocol zerocoin privacy protocol proposed johns hopkins university professor matthew d. green graduate students ian miers christina garman 2013 designed extension bitcoin protocol would improve bitcoin transactions anonymity coin-mixing capabilities natively built protocol zerocoin currently compatible bitcoin due public nature blockchain users may privacy compromised interacting network address problem third-party coin mixing service used obscure trail cryptocurrency transactions may 2013 matthew d. green graduate students ian miers christina garman proposed zerocoin protocol cryptocurrency transactions anonymised without going trusted third-party coin destroyed minted erase history coin spent information available reveal exactly coin spent initially zerocoin protocol planned integrated bitcoin network however proposal accepted bitcoin community thus zerocoin developers decided launch protocol independent cryptocurrency project create standalone cryptocurrency implementing zerocoin protocol named moneta september 2016 zcoin xzc first cryptocurrency implement zerocoin protocol launched poramin insom team january 2018 academic paper partially funded zcoin published replacing proof-of-work system memory intensive merkle tree proof algorithm ensuring equitable mining among ordinary users april 2018 cryptographic flaw found zerocoin protocol allows attacker destroy coins owned honest users create coins thin air steal users coins zcoin cryptocurrency team acknowledging flaw stated high difficulty performing attacks low probability giving economic benefit attacker december 2018 zcoin released academic paper proposing lelantus protocol remove need trusted setup hides origin amount coins transaction using zerocoin protocol transactions use zerocoin feature drawn escrow pool coin transaction history erased emerges transactions verified zero-knowledge proofs mathematical way prove statement true without revealing details question 16 november 2013 matthew d. green announced zerocash protocol provides additional anonymity shielding amount transacted zerocash reduces transaction sizes 98 however significantly computationally expensive taking 3.2gb memory generate recent developments protocol reduced 40mb zerocash utilizes succinct non-interactive zero-knowledge arguments knowledge also known zk-snarks special kind zero-knowledge method proving integrity computations proofs less 300 bytes long verified milliseconds contain additional advantage hiding amount transacted well however unlike zerocoin zerocash requires initial set trusted entity developed matthew d. green assistant professor behind zerocoin protocol zcash first zerocash based cryptocurrency began development 2013 late 2014 poramin insom student masters security informatics johns hopkins university wrote paper implementing zerocoin protocol cryptocurrency matthew green faculty member roger ver tim lee zcoin initial investors poramin also set exchanged named satang convert thai baht zcoin directly 20 february 2017 malicious coding attack zerocoin protocol created 370,000 fake tokens perpetrators sold 400 bitcoins 440,000 zcoin team announced single-symbol error piece code allowed attacker create zerocoin spend transactions without corresponding mint unlike ethereum dao event developers opted destroy coins attempt reverse happened newly generated ones september 2018 zcoin introduced dandelion protocol hides origin ip address sender without using onion router tor virtual private network vpn october 2018 unknown user uploaded banned video zcoin blockchain order avoid thai government censorship november 2018 zcoin conducted world first large-scale party elections thailand democrat party using interplanetary file system ipfs december 2018 zcoin implemented merkle tree proof mining algorithm deters usage application-specific integrated circuit asic mining coins memory intensive miners allows ordinary users use central processing unit cpu graphics card mining enable egalitarianism coin mining 30 july 2019 zcoin formally departed zerocoin protocol adopting new protocol called sigma prevents counterfeit privacy coins inflating coin supply achieved removing feature called trusted setup zerocoin protocol pivx cryptocurrency based zerocoin protocol using proof-of-stake mechanism issue new coins validate transactions one criticism zerocoin added computation time required process would need performed primarily bitcoin miners proofs posted blockchain would also dramatically increase size blockchain nevertheless stated original author proofs could stored outside blockchain since zerocoin denomination bitcoin used mint zerocoin anonymity would compromised zerocoins zerocoins denomination currently minted unspent potential solution problem would allow zerocoins specific set denominations however would increase needed computation time since multiple zerocoins could needed one transaction depending specific implementation zerocoin requires two large prime numbers generate parameter easily factored values must either generated trusted parties rely rsa unfactorable objects avoid requirement trusted party setup however possible zerocash protocol | [
8640,
3713,
9248,
9859,
1776,
1908,
8916,
4827,
11612,
1087
] | Test |
4,281 | 1 | Join_dependency:join dependency area computer science known dependency theory join dependency constraint set legal relations database scheme table formula_1 subject join dependency formula_1 always recreated joining multiple tables subset attributes formula_1 one tables join attributes table formula_1 join dependency called trivial join dependency plays important role fifth normal form also known project-join normal form proven scheme formula_5 decomposed tables formula_6 formula_7 decomposition lossless-join decomposition legal relations formula_5 restricted join dependency formula_5 called formula_10 another way describe join dependency say relationships join dependency independent unlike case functional dependencies sound complete axiomatization join dependencies though axiomatization exist expressive dependency languages full typed dependencies however implication join dependencies decidable let formula_5 relation schema let formula_12 decomposition formula_5 relation formula_14 satisfies join dependency join dependency trivial one formula_17 formula_5 2-ary join dependencies called multivalued dependency historical artifact fact studied general case specifically u set attributes r relation r satisfies formula_19 r satisfies formula_20 given pizza-chain models purchases table customer order-number customer-name pizza-name courier following relations derived since relationships independent join dependency follows order-number customer-name order-number pizza-name order-number courier customer courier however join-dependency like order-number customer-name order-number pizza-name order-number courier customer-name courier order-number customer-name courier order-number pizza-name would valid well makes obvious join dependency enough normalize database scheme | [
5792,
4065,
5794,
5795,
2022,
6983,
2024,
2025,
2026,
1292,
244,
9143,
3004,
6782
] | None |
4,282 | 3 | Dynamic_Kernel_Module_Support:dynamic kernel module support dynamic kernel module support dkms program/framework enables generating linux kernel modules whose sources generally reside outside kernel source tree concept dkms modules automatically rebuilt new kernel installed essential feature dkms automatically recompiles dkms modules new kernel version installed allows drivers devices outside mainline kernel continue working linux kernel upgrade another benefit dkms allows installation new driver existing system running arbitrary kernel version without need manual compilation precompiled packages provided vendor dkms written linux engineering team dell 2003 included many distributions ubuntu debian fedora suse arch dkms free software released terms gnu general public license gpl v2 later dkms supports rpm deb package formats out-of-the-box | [
1952,
5096,
3791,
7983,
11221,
2230,
823,
1400
] | None |
4,283 | 2 | IPhone_3GS:iphone 3gs iphone 3gs originally styled iphone 3g smartphone designed marketed apple inc third generation iphone successor iphone 3g introduced june 8 2009 wwdc 2009 took place moscone center san francisco iphone named 3gs stood speed phil schiller mentioned launch keynote improvements include performance 3-megapixel camera higher resolution video ability voice control support 7.2 mbit/s hsdpa downloading remains limited uploading apple implemented hsupa protocol released united states canada six european countries june 19 2009 australia japan june 26 internationally july august 2009 iphone 3gs runs apple ios operating system succeeded apple flagship smartphone 2010 iphone 4 june 24 8gb model released discontinuing 16 32gb models however 3gs continued production september 2012 iphone 5 announced iphone 3gs made available pre-order june 7 2009 released june 19 united states canada 7 european countries june 26 australia united kingdom within first weekend release one million iphone 3gs units sold new features iphone 3gs mainly internal changes regarding speed iphone 3gs speedy 2x faster predecessor though addition upgrades mainly regarding performance various software features also introduced exclusive iphone 3gs video recording voice control digital compass features ios apple mobile operating system user interface ios based concept direct manipulation using multi-touch gestures interface control elements consist sliders switches buttons interaction os includes gestures swipe tap pinch reverse pinch specific definitions within context ios operating system multi-touch interface internal accelerometers used applications respond shaking device one common result undo command rotating vertically one common result switching portrait landscape mode lcd display device designed apple made lg features capacitive touchscreen pixel density 163 pixels per inch ppi 480-by-320 display improvements predecessor screen include 24-bit color emulation 18-bit color display plus dithering color rich display oleophobic coating help reduce fingerprints display capacitive touchscreen designed bare finger multiple fingers multi-touch sensing iphone 3gs features improved 3-megapixel camera manufactured omnivision addition higher pixel count also features auto-focus auto white balance auto macro capable capturing vga video iphone 3gs camera app features slider allows users switch capturing photos recording videos tap-to-focus feature allows users tap area camera image auto-focus 5x digital zoom ios 4 later auto focus auto exposure lock holding area ios 5 later gridlines composition ios 5 later iphone 3gs powered samsung apl0298c05 chip designed manufactured samsung first iphone system-on-a-chip system-on-a-chip composed arm cortex-a8 cpu core underclocked 600 mhz 833 mhz integrated powervr sgx 535 gpu 256 mb package package pop dram twice amount 3g allowing increased performance multi-tasking apple claims iphone 3gs 2x faster predecessor showing demonstrations various apps loading half time predecessor previous models data stored flash memory sim offer options expand storage initially available 16 32 gb though 8 gb model later released apple discontinuing 16 32 gb models forcing needing storage select iphone 4 buy older model 3gs iphone 3gs powered internal 3.7 v 1220 mah rechargeable lithium-ion polymer battery designed retain 80 original capacity 400 full charge discharge cycles battery life indicator percentage also exclusive iphone 3gs apple claims 3gs last ten hours video nine hours web browsing wi-fi twelve hours 2g talk time five 3g 30 hours music 300 hours standby magnetometer also built-in iphone 3gs used measure strength and/or direction magnetic field vicinity device sometimes certain devices radio signals interfere magnetometer requiring users either move away interference re-calibrate moving device figure 8 motion iphone 3gs also features compass app unique time release showing compass points direction magnetic field addition iphone 3g tri-band umts/hsdpa radio quad-band gsm/gprs/edge radio 3gs also adds support 7.2 mbit/s hsdpa allowing faster downlink speeds though upload speeds remain apple implemented hsupa protocol updates include addition built-in nike+ipod sensor eliminates need external sensor allows native nike+ipod support bluetooth server iphone 3gs also slightly improved adding support bluetooth 2.1 specifications voice control introduced exclusive feature iphone 3gs allows controlling phone music features phone voice two ways activate voice control hold home button home screen seconds change effect double-clicking home button activate voice control ios 3.x ios 4 later double clicking home button opens multitasking bar voiceover color inversion text zoom introduced exclusive features iphone 3gs voiceover feature dictates music details system menus text things first introduced third generation ipod shuffle color inversion reverses color scheme black white white black text zoom allows users zoom text screen iphone 3gs retains design 3g glossy plastic back tapered edges metal buttons 3gs reflective silver text reverse side matches silver apple logo replacing 3g grey text unlike predecessor iphone 3gs available white black 16 gb 32 gb although 8 gb model available black reviews iphone 3gs generally mixed favorable walt mossberg wall street journal described device packed new features makes great product even better many users software may enough boost keep buying new model engadget also said additions video recording compass speed bump n't seem compelling us device managed receive numerous favorable reviews cnet gave iphone 3gs 4 5 stars citing battery life improvements speed bump engadget praised performance improvements 8 gb version received favorable reviews mainly comes pre-installed ios 4 jason snell macworld praised iphone 3gs saying device internal changes shines ios 4 update making iphone 3gs worthwhile upgrade compared predecessor although little late compared iphone 4 tipb stated aside hardware specific features like facetime retina display gyroscope support bottom line iphone 3gs users getting software makes iphone 4 great shortly release iphone 3gs users reported overheating device heavy use others reported discoloration device due heat particularly white models discoloration issues largely discounted result iphone covers rubbing back iphone apple responded heat issue reports warning users leaving iphones car hot day leaving direct sunlight extended periods time refraining heavy usage hot/sunny environment also worth pointing temperature specifications iphone operated follows safety standards countries 3gs released release iphone 4 iphone 3gs received update ios 4 release iphone 4s 3gs still offered free contract november 2011 raised price 59 cents explanation 99¢ price available two-year contract united states three-year contract telus rogers bell fido solutions canada departure apple previous trends two phones sold september 9 2009 apple launched updated model iphone 3gs patched segment overflow securerom device allowed loading unsigned llb release iphone 4s apple updated baseband hardware infineon baseband chip toshiba baseband chip week 2 production 2011 removed end-user ability change basebands although new chip uses modem firmware infineon chip updated ipad baseband 06.15.00 still vulnerable at+xapp exploit 3gs received ios 6 making first ios device receive updates four major ios releases although 3gs still supported major features ios 6 supported 3gs generally positive reviews smooth performance ios 5 even claim better performance making still good candidate ios 6 september 12 2012 apple announced would longer selling supporting iphone 3gs device receive ios 7 due hardware limitations february 21 2014 apple issued ios 6.1.6 fix infamous goto fail ssl security bug | [
4609,
10755,
9732,
1549,
5647,
7697,
4114,
5138,
11289,
7706,
1057,
1576,
6186,
4139,
6700,
1074,
8754,
9784,
1083,
8253,
576,
8783,
4180,
10838,
1623,
3672,
3681,
9826,
8806,
3691,
2673,
6264,
7292,
2686,
6783,
7806,
10878,
8842,
5784,
1... | Train |
4,284 | 5 | FHFS_(file_server):fhfs file server fhfs ftp http web server package transparently based hfs filezilla fhfs built act all-in-one user-based file hosting website good schools businesses etc whose students/employees need easily transport files fhfs designed specifically account-based storage easily compatible uses using over-top original hfs setup early development started january 2011 beta builds tested october 2011 version 1.0 released 11/3/2011 fhfs started accelerate development filesplat.com well showcase capabilities hfs macros fhfs 2.0 released 10/28/2012 exactly one year first beta 1.0 fhfs loosely based source code www.filesplat.com time created developer filesplat longer uses fhfs fhfs written several different languages including hfs macros xml xhtml css javascript dos php c fhfs recognized developer hfs fhfs 2.0.5 contains roughly 9500 somewhat-compressed lines 412,000 characters original code addition standard features hfs | [
225,
8644,
3462,
7983,
4059,
479
] | None |
4,285 | 3 | MB86900:mb86900 mb86900 microprocessor produced fujitsu implements sparc v7 instruction set architecture developed sun microsystems first implementation sparc introduced 1986 used first sparc-based workstation sun microsystems sun-4 1987 chipset operated 16.67 mhz chipset consisted two chips mb86900 microprocessor mb86910 floating-point unit chip set implemented two 20,000-gate 1.2 µm complementary metal–oxide–semiconductor cmos gate-arrays fabricated fujitsu limited | [
9090,
9731,
1801,
4235,
1809,
4241,
1818,
8863,
1707,
2731,
10926,
3247,
9137,
6322,
4664,
6464,
7104,
9665,
2895,
3919,
597,
2269,
9955,
7270,
11626,
5358,
1776,
11636,
1399,
1788
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.