node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
4,286
3
Temporal_multithreading:temporal multithreading temporal multithreading one two main forms multithreading implemented computer processor hardware simultaneous multithreading distinguishing difference two forms maximum number concurrent threads execute given pipeline stage given cycle temporal multithreading number one simultaneous multithreading number greater one authors use term super-threading synonymously many possible variations temporal multithreading classified two sub-forms main processor pipeline may contain multiple threads context switches effectively occurring pipe stages e.g. barrel processor form multithreading expensive coarse-grained forms execution resources span multiple pipe stages may deal multiple threads also contributing cost fact design optimized around concept background thread — concurrent threads implemented hardware might require state read written cycle forms temporal multithreading similar many ways simultaneous multithreading simultaneous process hardware must store complete set states per concurrent thread implemented hardware must also preserve illusion given thread processor resources fairness algorithms must included types multithreading situations prevent one thread dominating processor time and/or resources temporal multithreading advantage simultaneous multithreading causes lower processor heat output however allows one thread executed time
[ 7173, 9739, 2066, 7699, 5655, 10779, 10781, 6181, 8231, 6184, 3630, 6705, 7218, 2623, 2113, 7234, 3142, 2638, 2140, 1122, 4194, 3175, 5223, 8810, 4205, 8815, 630, 6774, 8822, 7802, 6268, 3197, 7313, 6815, 8352, 5793, 2210, 6818, 6821, 579...
None
4,287
5
Circuit-level_gateway:circuit-level gateway circuit-level gateway type firewall circuit-level gateways work session layer osi model shim-layer application layer transport layer tcp/ip stack monitor tcp handshaking packets determine whether requested session legitimate information passed remote computer circuit-level gateway appears originated gateway firewall technology supervises tcp handshaking among packets confirm session genuine firewall traffic cleaned based particular session rules may controlled acknowledged computers circuit-level firewalls conceal details protected network external traffic helpful interdicting access impostors circuit-level firewalls clean entity packets circuit-level gateways relatively inexpensive advantage hiding information private network protect hand filter individual packets
[ 3941, 2118, 8998, 11502, 9715, 3381, 1942, 5405, 4895 ]
None
4,288
7
Xactly_Corporation:xactly corporation xactly corporation pure-play saas company provides cloud-based enterprise software services offer tools allow sales performance management sales effectiveness sales compensation employee engagement xactly corporation headquartered san jose california company raised 116 million funding since inception 2005 investors include rembrandt venture partners alloy ventures key venture partners bay partners outlook ventures illuminate ventures silicon valley bank wellington financial salesforce.com xactly corp created march 1 2005 founder ceo christopher w. cabrera co-founder managing director satish k. palvai company headquartered san jose california xactly corp acquired centive automated incentive compensation management technology solutions company 2009 july 31 2017 company taken private vista equity partners delisted new york stock exchange
[ 10090, 467 ]
Test
4,289
7
GreenButton:greenbutton greenbutton new zealand-based software firm company specialized moving independent software vendors isvs enterprises cloud computing founded 2006 greenbutton based wellington new zealand additional offices palo alto california seattle greenbutton acquired microsoft 2 may 2014 technologies integrated azure service greenbutton founded intergrid 2006 wellington new zealand provide small scale customers access job processors company helped software vendors use cloud computing offering service called greenbutton july 2010 2011 company renamed greenbutton joined microsoft partner network 2011 greenbutton declared microsoft corp ’ windows azure isv partner year 2011 new zealand partner year award microsoft new zealand may 2011 greenbutton entered alliance microsoft included investment reported us 1 million adding mark canepa board directors greenbutton bizspark partner year software exporter year awards ms new zealand 2011 dave fellows greenbutton solutions architect year award year december 2011 greenbutton opened two offices united states office palo alto california functioned us headquarters second sales office seattle greenbutton finalists new zealand hi-tech awards company total turnover 1.5 million fiscal year 2011-12 greenbutton partnered pixar animation studios microsoft cloud computing platform windows azure rendering service renderman image generating software announced january 2012 service enhances renderman interface specification june 2012 greenbutton announced partnership gns science new zealand american based stillwater group cloud computing seismic processing company promoted software integrated seismic processing amazon web services aws cloud service seismic processing part oil natural gas exploration process requires heavy processing data 2012 greenbutton entered partnership numerix american company develops software risk analysis financial derivatives award 2012 wellington gold awards 2 may 2014 greenbutton announced acquisition microsoft technology integrated microsoft azure greenbutton stopped accepting new customers day acquisition greenbutton operates microsoft azure product line azure batch
[ 1539, 6150, 526, 4623, 3605, 10265, 5662, 5666, 9766, 39, 5159, 7215, 3121, 5681, 8757, 10820, 4683, 590, 1102, 7248, 5202, 9812, 4704, 4194, 10338, 5732, 617, 7796, 6265, 2170, 4236, 6797, 10893, 10900, 3224, 7838, 6307, 2217, 6827, 9906...
Test
4,290
7
Avature:avature avature privately held global human capital management software company sells software service company founded dimitri boylan co-founder former ceo hotjobs incorporated dublin ireland operating subsidiaries argentina australia china germany spain united kingdom united states avature platform designed support development strategic hr solutions talent acquisition talent management used 160 countries 24 languages company 650 customers including 110 fortune 500 well several government entities educational institutions 2018 company 600 employees originally founded recruiting outsourcing service provider new york buenos aires 2005 avature provided services large organizations global staffing firms september 2008 company commercially released flagship product avature crm flexible enterprise platform global talent acquisition market leader sourcing recruitment marketing candidate engagement 2012 avature sold recruiting services businesses korn ferry focused efforts development technology subsequent years company ’ product suite expanded include additional talent acquisition solutions applicant tracking campus events recruiting onboarding well talent management solutions including internal mobility performance management contingent workforce management october 2008 human resource executive magazine pointed avature crm top hr product 2010 identified gartner 'cool vendor´ innovations human capital management company also recognized hro today 2012 tektonic award talent management furthermore avature contingent workforce management solution avature cwm named 2018 top hr product human resource executive magazine october 2018 saas report named avature chief financial officer ana laura darino within annual top women leaders saas list
[ 467 ]
None
4,291
2
Nokia_E5-00:nokia e5-00 nokia e5-00 also called nokia e5 qwerty smartphone runs symbian os v9.3 operating system like phones nokia eseries targeted b2b comes business software applications including quickoffice office document editor released third quarter 2010 comes candybar form factor casing five color options e5-00 similar e72 dram memory e72 also important cost reductions one cost reduction technology lcds screen e5-00 transmissive lcd display e-72 transflective lcd e5 supports 256k display colors important cost reductions removal secondary camera accelerometer digital compass third full focus camera extends depth field without narrowing aperture instead autofocus e5-00 smaller battery 1200 mah e-72 1500 talk-time 8 hours stand time 10 days also features gps integrated assisted runs nokia maps 3.0 ovi maps nokia e5 supports mail exchange ibm lotus notes traveler corporate emails e5 supports hd voice nokia e5-00 features im instant messenger allowing access several chat services communities simultaneously include yahoo messenger google talk skype wechat whatsapp windows live messenger reception e5 generally positive cnet uk praised quality full qwerty keyboard criticized performance 320 x 240 pixel lcd quoting virtually impossible see direct sunlight softpedia contrast stated lcd worked perfectly sunlight softpedia wrote e5-00 all-rounder performs decent areas though also stated camera strong point
[ 1537, 8577, 3205, 11655, 9359, 1424, 529, 2449, 8083, 10770, 5143, 2072, 7063, 5274, 5019, 5659, 669, 8472, 11545, 4003, 4132, 6310, 167, 40, 3626, 5290, 10410, 10802, 7220, 821, 5175, 7866, 1083, 1728, 7617, 7877, 10053, 199, 967, 9292, ...
Validation
4,292
9
Starling_Framework:starling framework starling open source game framework used create 2d games run mobile desktop platforms recreates traditional flash display list architecture top accelerated graphics hardware several commercial games built starling including angry birds friends incredipede starling initiated 2011 adobe shortly introducing stage3d api air flash run-time systems stage3d allows utilizing gpu inside flash player via low-level api starling simplify transition developers providing accompanying high-level api built top stage3d framework seen rapid adoption years utilized many games independent commercial developers part adobe gaming sdk since starling introduction several open source libraries published 3rd party developers depend starling extend functionality
[ 803, 8071, 9579, 10097, 2804, 4378 ]
None
4,293
9
Syntax_Definition_Formalism:syntax definition formalism syntax definition formalism sdf metasyntax used define context-free grammars formal way describe formal languages express entire range context-free grammars current version sdf3 parser parser generator sdf specifications provided part free asf+sdf meta environment operate using sglr scannerless glr parser sdf parser outputs parse trees case ambiguities parse forests features sdf following example defines simple boolean expression syntax sdf2
[ 1956, 932, 4519, 2537, 2316, 11475, 5399, 1116 ]
Validation
4,294
4
Apache_SpamAssassin:apache spamassassin apache spamassassin computer program used e-mail spam filtering uses variety spam-detection techniques including dns-based fuzzy-checksum-based spam detection bayesian filtering external programs blacklists online databases released apache license 2.0 part apache foundation since 2004 program integrated mail server automatically filter mail site also run individual users mailbox integrates several mail programs apache spamassassin highly configurable used system-wide filter still configured support per-user preferences apache spamassassin created justin mason maintained number patches earlier program named filter.plx mark jeftovic turn begun august 1997 mason rewrote jeftovic code scratch uploaded resulting codebase sourceforge april 20 2001 summer 2004 project became apache software foundation project later officially renamed apache spamassassin spamassassin 3.4.2 release first well three years developers say project picked new set developers moving forward apache spamassassin perl-based application mail :spamassassin cpan usually used filter incoming mail one several users run standalone application subprogram another application milter sa-exim exiscan mailscanner mimedefang amavis client spamc communicates daemon spamd client/server embedded mode operation performance benefits certain circumstances may introduce additional security risks typically either variant application set generic mail filter program called directly mail user agent supports whenever new mail arrives mail filter programs procmail made pipe incoming mail apache spamassassin adjustment user .procmailrc file apache spamassassin comes large set rules applied determine whether email spam rules based regular expressions matched body header fields message apache spamassassin also employs number spam-fighting techniques rules called tests spamassassin documentation test score value assigned message matches test criteria scores positive negative positive values indicating spam negative ham non-spam messages message matched tests apache spamassassin combines results global score assigned message higher score higher probability message spam apache spamassassin internal configurable score threshold classify message spam usually message considered spam matches multiple criteria matching single test usually enough reach threshold apache spamassassin considers message spam rewritten default configuration content mail appended mime attachment brief excerpt message body description tests resulted mail classified spam score lower defined settings default information tests passed total score still added email headers used post-processing less severe actions tagging mail suspicious apache spamassassin allows per-user configuration behavior even installed system-wide service configuration read file database configuration users specify individuals whose emails never considered spam change scores certain rules user also define list languages want receive mail apache spamassassin assigns higher score mails appear written another language apache spamassassin based heuristics pattern recognition software exhibits false positives false negatives apache spamassassin also supports methods added reasonably easily writing perl plug-in apache spamassassin apache spamassassin reinforces rules bayesian filtering user administrator feeds examples good ham bad spam filter order learn difference two purpose apache spamassassin provides command-line tool sa-learn instructed learn single mail entire mailbox either ham spam typically user move unrecognized spam separate folder run sa-learn folder non-spam folder spam separately alternatively mail user agent supports sa-learn called individual emails regardless method used perform learning spamassassin bayesian test help score future e-mails based learning improve accuracy apache spamassassin free/open source software licensed apache license 2.0 versions prior 3.0 dual-licensed artistic license gnu general public license codice_1 utility distributed apache spamassassin compiles spamassassin ruleset deterministic finite automaton allows apache spamassassin use processor power efficiently apache spamassassin designed trigger gtube 68-byte string similar antivirus eicar test file string inserted rfc 5322 formatted message passed apache spamassassin engine apache spamassassin trigger weight 1000
[ 6161, 1047, 8217, 8224, 10276, 37, 11303, 8747, 9789, 7742, 7233, 7750, 7764, 7261, 8799, 8294, 6762, 8810, 2163, 6774, 5249, 5253, 10377, 11418, 8860, 6313, 4272, 4793, 6338, 10434, 1222, 4294, 10952, 5835, 5334, 8408, 11492, 2281, 8425, ...
Test
4,295
4
CBL_Index:cbl index cbl index ratio number ip addresses given ip subnet subnetwork number cbl composite blocking list listings subnet may used measure clean compromised computers given subnet higher number cleaner subnet cbl index may represented decibels db cidr suffix */xx note spam researchers prefer use percentage ips listed subnet using percentages better suited unclean subnets clean nets significantly less 1 addresses listed cbl dnsbl composite blocking list lists ip addresses compromised virus spam sending infection computer worm computer virus spamware cbl full zone data available publicly via rsync download cbl index reasonably good tool getting estimates subnet outgoing spam reputation treated caution subnets often contain ips radically different purposes assuming ips within subnet represent risk/reputation potentially dangerous cbl index may used estimation overall anti-spam performance isp operator cbl zone dated 2007-07-07t21:03+00:00 166_086 ip addresses listed 83.0.0.0/11 network cbl index net 2_097_152/166_086 12.6 */28.3 11.0 db 2_097_152 number ip addresses */11 network 2** 32-11
[ 8224, 7739, 119, 2041, 827 ]
None
4,296
6
Xarchiver:xarchiver xarchiver front-end various command line archiving tools linux bsd operating systems designed independent desktop environment default archiving application xfce lxde uses gtk+2 toolkit provide program interface therefore capable running system gtk+2 support exists large number applications also use toolkit support widespread among linux distributions irrespective specific desktop solution supported formats time version 0.5.2 appropriate installed program 7z arj bzip2 gzip lha lzma lzop rar rpm deb tar zip xarchiver uses direct save protocol xds drag drop file saving program acts front-end various commonly installed libraries dealing supported compression formats xarchiver ca n't create archives whose archiver installed currently xfce master branch xarchiver continued github
[ 6022, 10121, 1420, 1940, 5397, 3222, 9880, 3114, 10027, 7983, 950, 823, 6713, 9151, 2755, 11076, 1352, 10317, 10575, 4561, 722, 11614, 1631, 3296, 9953, 5858, 6759, 5096, 7529, 4459, 237, 1646, 7667, 6389, 4089, 2045, 894, 10623 ]
Train
4,297
5
MiNET:minet minet stimulus protocol carries keystroke information telephone set call control server also used carry information set control simple text displays mitel corporation designed 1980s signaling protocol proprietary digital tdm telephone sets later used control mitel ip sets encapsulated within tcp mitel uses alternative functional protocol sip maintain practical life pbx call control software
[ 3168, 10924, 10271 ]
None
4,298
6
Home_directory:home directory home directory file system directory multi-user operating system containing files given user system specifics home directory name location defined operating system involved example linux bsd fhs systems use /home/ username windows systems 2000 server 2003 keep home directories folder called documents settings user home directory intended contain user files including text documents music pictures videos etc may also include configuration files preferred settings software used might tailored liking web browser bookmarks favorite desktop wallpaper themes passwords external services accessed via given software etc user install executable software directory available users permission directory home directory organized use sub-directories content user home directory protected file system permissions default accessible authenticated users administrators user granted administrator privileges authority access protected location filesystem including users home directories separating user data system-wide data avoids redundancy makes backups important files relatively simple furthermore trojan horses viruses worms running user name privileges cases able alter files user home directory perhaps files belonging workgroups user part actual system files unix user automatically placed home directory upon login ~user shorthand variable refers user home directory allowing user navigate anywhere else filesystem use unix commands tilde character shorthand command refers particular user home directory unix superuser access directories filesystem hence access home directories users superuser home directory older systems many newer systems located /root linux bsd /var/root mac os x openvms operating system user home directory called root directory equivalent unix/dos/windows/amigaos root directory referred master file directory single-user operating systems simply single directory partition user files individual directory setup per user though users still setup maintain directories inside main working directory manually
[ 2432, 8962, 10756, 6797, 1810, 10394, 413, 2975, 2597, 7847, 7983, 4528, 823, 8631, 7739, 5435, 700, 3522, 9027, 10436, 10068, 9946, 9694, 2399, 10977, 1509, 10727, 4074, 3571, 9972, 2041 ]
Test
4,299
4
Take-grant_protection_model:take-grant protection model take-grant protection model formal model used field computer security establish disprove safety given computer system follows specific rules shows even though question safety general undecidable specific systems decidable linear time model represents system directed graph vertices either subjects objects edges labeled label indicates rights source edge destination two rights occur every instance model take grant play special role graph rewriting rules describing admissible changes graph total four rules preconditions formula_1 preconditions formula_2 using rules take-grant protection model one reproduce states system change respect distribution rights therefore one show rights leak respect given safety model
[ 3360, 3616, 8259, 10968, 8627, 3480, 10170, 2558 ]
None
4,300
2
WindowProc:windowproc win32 application programming windowproc window procedure user-defined callback function processes messages sent window function specified application registers window class named anything necessarily windowproc window procedure responsible handling messages sent window function prototype windowproc given hwnd handle window message sent umsg identifies actual message wparam lparam parameters whose meaning depends message application identify message take required action hundreds different messages produced result various events taking place system typically application processes small fraction messages order ensure messages processed windows provides default window procedure called defwindowproc provides default processing messages application process application usually calls defwindowproc end windowproc function whatever messages processed passed default procedure
[ 11672 ]
Validation
4,301
1
Open_Database_License:open database license open database license odbl copyleft share alike license agreement intended allow users freely share modify use database maintaining freedom others odbl published open data commons see also open data part open knowledge international foundation odbl created goal allowing users share data freely without worrying problems relating copyright ownership allows users make free use data database without worrying copyright creators add data use databases license establishes rights users database well correct procedure attributing credit credit due data make changes improvements data thus simplifying sharing comparison data users longer need worry repercussions violations copyright law stolen information using open database license openstreetmap osm project completed move creative commons license odbl september 2012 attempt legal security specific license databases rather creative works projects using odbl include opencorporates open food facts paris opendata
[ 385, 546, 4011, 2864, 2901 ]
Validation
4,302
2
Anaconda_(Python_distribution):anaconda python distribution anaconda free open-source distribution python r programming languages scientific computing data science machine learning applications large-scale data processing predictive analytics etc aims simplify package management deployment package versions managed package management system conda anaconda distribution used 15 million users includes 1500 popular data-science packages suitable windows linux macos anaconda distribution comes 1,500 packages well conda package virtual environment manager also includes gui anaconda navigator graphical alternative command line interface cli big difference conda pip package manager package dependencies managed significant challenge python data science reason conda exists pip installs python package dependencies required whether conflict packages installed previously working installation example google tensorflow suddenly stop working pip install different package needs different version numpy library insidiously everything might still appear work get different results data science unable reproduce results elsewhere n't pip install order conda analyzes current environment everything installed version limitations specify e.g want tensorflow 2.0 figures install compatible dependencies tell want ca n't done pip contrast install thing wanted dependencies even breaks things open source packages individually installed anaconda repository anaconda cloud anaconda.org private repository mirror using codice_1 command anaconda inc compiles builds packages anaconda repository provides binaries windows 32/64 bit linux 64 bit macos 64-bit also install anything pypi conda environment using pip conda knows installed pip installed custom packages made using codice_2 command shared others uploading anaconda cloud pypi repositories default installation anaconda2 includes python 2.7 anaconda3 includes python 3.7 however create new environments include version python packaged conda anaconda navigator desktop graphical user interface gui included anaconda distribution allows users launch applications manage conda packages environments channels without using command-line commands navigator search packages anaconda cloud local anaconda repository install environment run packages update available windows macos linux following applications available default navigator conda open source cross-platform language-agnostic package manager environment management system installs runs updates packages dependencies created python programs package distribute software language e.g. r including multi-language projects conda package environment manager included versions anaconda miniconda anaconda repository anaconda cloud package management service anaconda find access store share public private notebooks environments conda pypi packages cloud hosts useful python packages notebooks environments wide variety applications need log cloud account search public packages download install build new packages using anaconda client command line interface cli manually automatically upload packages cloud
[ 5130, 9487, 788, 1813, 8213, 10900, 8476, 4775, 6828, 7983, 823, 5819, 190, 8262, 9671, 5833, 5067, 3918, 463, 3667, 6361, 2010, 2401, 4961, 1379, 741, 231, 6119, 9063, 8554, 9320, 5612, 7293 ]
Validation
4,303
4
Rainbow_Series:rainbow series rainbow series sometimes known rainbow books series computer security standards guidelines published united states government 1980s 1990s originally published u.s. department defense computer security center national computer security center standards describe process evaluation trusted systems cases u.s. government entities well private firms would require formal validation computer technology using process part procurement criteria many standards influenced superseded common criteria books nicknames based color cover example trusted computer system evaluation criteria referred orange book book entitled applied cryptography security expert bruce schneier states ncsc-tg-021 ca n't even begin describe color cover books series hideously colored covers goes describe receive copy saying n't tell sent
[ 6494, 6593, 1315, 4067, 10055, 8904, 8302, 7887, 3924, 310, 10170, 2558 ]
Test
4,304
4
Dexter_(malware):dexter malware dexter computer virus point sale malware infects computers running microsoft windows discovered security firm seculert december 2012 infects pos systems worldwide steals sensitive information credit card debit card information december 2013 researchers discovered stardust major revision dexter compromised 20,000 cards active campaign hitting us merchants one first known botnets target point-of-sale pos terminals used stores restaurants process customers credit debit card payments
[ 1024, 5636, 4117, 8726, 535, 9761, 4644, 4133, 3116, 7739, 10309, 1608, 3657, 8779, 4703, 8288, 8292, 10875, 3711, 8320, 5764, 2187, 4240, 1688, 2717, 9375, 9904, 9395, 8886, 3789, 6360, 4314, 9435, 4830, 3807, 5349, 1254, 10477, 9460, 74...
Test
4,305
2
Series_30+:series 30+ series 30+ abbreviated s30+ software platform application user interface used nokia-branded mobile devices platform introduced nokia september 2013 first appearing nokia 108 main nokia feature phone operating system end series 30 series 40 platforms 2014 despite similar name user interface s30+ technically completely different unrelated s30 many s30+ devices support maui runtime environment mre developed mediatek later devices included support j2me applications even models n't support java j2me applications still capable running built-in online applications opera mini browser bing search msn weather skype groupme chat s30+ models also come online shop would allow downloading new apps games platform taken nokia microsoft mobile 2014 hmd global 2016 although devices still selling brand nokia following feature phones use series 30+ platform available single dual sim models maximum accepted video resolution 854×480
[ 1537, 10754, 11271, 529, 3089, 10770, 5143, 2072, 5659, 10273, 4132, 40, 3626, 8237, 9262, 7727, 10802, 7220, 5175, 9784, 1083, 9292, 7246, 1615, 5201, 7253, 3162, 5211, 6748, 607, 1633, 2658, 10855, 6763, 109, 1148, 8316, 8829, 11391, 67...
Validation
4,306
3
IBM_ThinkPad_310:ibm thinkpad 310 ibm thinkpad 310 notebook computer manufactured 1997 ibm corporation part thinkpad laptop 300 series models shipped windows 95 capable running windows 3.1 later versions windows far recent windows xp provided sufficient ram driver upgrades run properly well several linux variations features hardware varied model three models 310 lineup featured cd-rom standard none featured internal floppy drive bay capable housing floppy drive models feature port back allowed connection external floppy drive could boot models featured intel pentium processor running 166 mhz graphics hardware chips technologies 65550 pci system approximately 1 mb video memory dstn display capable 800x600 resolution models also featured 2 type ii cardbus slots models came either 16mb 32mb edo ram
[ 3304, 780, 6797, 8851, 823, 3323 ]
Validation
4,307
4
Arpwatch:arpwatch arpwatch computer software tool monitoring address resolution protocol traffic computer network generates log observed pairing ip addresses mac addresses along timestamp pairing appeared network also option sending email administrator pairing changes added network administrators monitor arp activity detect arp spoofing network flip-flops changed new stations address reuse arpwatch developed lawrence berkeley national laboratory network research group open-source software released bsd license
[ 5612, 6013, 7983, 2045, 4085, 6295, 5437, 2558 ]
None
4,308
3
Software_lockout:software lockout multiprocessor computer systems software lockout issue performance degradation due idle wait times spent cpus kernel-level critical sections software lockout major cause scalability degradation multiprocessor system posing limit maximum useful number processors mitigate phenomenon kernel must designed critical sections short possible therefore decomposing data structure smaller substructures multiprocessor systems processor schedules controls therefore supervisor processor kernel data structures globally shared sections code access shared data structures critical sections design choice made improve scaling reliability modularity examples kernel data structure ready list communication channels conflict happens one processor trying access resource memory portion time prevent critical races inconsistency one processor cpu given time allowed access particular data structure memory portion cpus trying access time locked-out waiting idle status three cases distinguished idle wait either necessary convenient convenient idle wait necessary access ready list low level scheduling operation idle wait necessary convenient case critical section synchronization/ipc operations require less time context switch executing another process avoid idle wait idle wait instead convenient case kernel critical section device management present monolithic kernels microkernel instead falls first two cases multiprocessor system conflicts kernel-level conflicts due access kernel level critical sections thus idle wait periods generated major impact performance degradation idle wait time increases average number idle processors thus decreases scalability relative efficiency taking parameters average time interval spent processor kernel level critical sections l time locked state average time interval spent processor tasks outside critical sections e ratio l/e crucial evaluating software lockout typical values l/e range 0.01 0.1 system l/e ratio 0.05 instance 15 cpus expected average 1 cpu always idle 21 cpus 2.8 idle 40 cpus 19 idle 41 cpus 20 idle therefore adding 40 cpus system would useless general l/e value threshold maximum number useful cpus reduce performance degradation software lockout reasonable levels l/e 0.05 0.1 kernel and/or operating system must designed accordingly conceptually valid solution decompose kernel data structure smaller independent substructures shorter elaboration time allows one cpu access original data structure many uniprocessor systems hierarchical protection domains estimated spend 50 time performing supervisor mode operations systems adapted multiprocessing setting lock access supervisor state l/e would easily greater 1 resulting system throughput uniprocessor despite number cpus
[ 785, 7313, 7187, 7699, 7446, 7963, 6815, 2210, 5798, 9126, 6184, 2345, 4909, 7218, 10675, 8501, 7483, 5948, 4286, 2113, 8514, 5956, 709, 3398, 4423, 1480, 6909, 330, 1866, 7497, 8523, 2008, 344, 2394, 731, 2140, 2264, 11487, 4194, 5090, ...
Validation
4,309
2
Installation_(computer_programs):installation computer programs installation setup computer program including device drivers plugins act making program ready execution installation refers particular configuration software hardware view making use able computer soft digital copy piece software program needed install different processes installing piece software program process varies program computer programs including operating systems often come installer specialized program responsible whatever needed see installation installation may part larger software deployment process installation typically involves code program copied/generated installation files new files local computer easier access operating system creating necessary directories registering environment variables providing separate program un-installation etc.. code generally copied/generated multiple locations uninstallation usually involves erasing program folder example registry files system code may need modified deleted complete uninstallation computer programs executed simply copying folder stored computer executing programs supplied form unsuitable immediate execution therefore need installation procedure installed program executed without need reinstall execution common operations performed software installations include operations may require charges free charge case payment installation costs means costs connected relevant incurred result installing drivers equipment customers premises installers may attempt trick users installing junkware various forms adware toolbars trialware software partnering companies prevent extra caution exactly asked installed needed installation additional software simply skipped unchecked may require user use custom detailed expert version installation procedure .such malicious conduct necessarily decision software developers company also issue external installers download.com installer cnet mentioned earlier computer programs need installation usual many programs run dos mac os atari tos amigaos computing environments grew complex fixed hard drives replaced floppy disks need tangible installation presented example commodore released installer amiga class modern applications need installation known portable applications may roamed around onto different computers run similarly live operating systems need installation run directly bootable cd dvd usb flash drive loaded network thin clients examples amigaos 4.0 various linux distributions morphos mac os versions 1.0 9.0 see live cd live usb finally web applications run inside web browser need installation windows systems common form installation installation process usually needs user attends make choices accepting declining end-user license agreement eula specifying preferences installation location supplying passwords assisting product activation graphical environments installers offer wizard-based interface common attended installers may ask users help mitigate errors instance disk computer program installed full installer may ask user specify another target path clear enough space disk common misconception unarchivation considered installation action include user choices accepting declining eula installation display messages windows progress silent installation unattended installation see silent installations unattended unattended installations silent reason behind silent installation may convenience subterfuge malware almost always installed silently installation performed without user interaction progress user present one reasons use approach automate installation large number systems unattended installation either require user supply anything received necessary input prior start installation input may form command line switches answer file file contains necessary parameters windows xp linux distributions examples operating systems installed answer file unattended installation assumed user help mitigate errors instance installation medium faulty installer fail installation user fix fault replace medium unattended installers may record errors computer log later review installation performed without using computer monitor connected attended forms headless installation another machine connects target machine instance via local area network takes display output since headless installation need user location target computer unattended headless installers may used install program multiple machines time installation process runs preset time predefined condition transpires opposed installation process starts explicitly user command instance system administrator willing install later version computer program used schedule installation occur program running operating system may automatically install device driver device user connects see plug play malware may also installed automatically example infamous conficker installed user plugged infected device computer clean installation one done absence interfering elements old versions computer program installed leftovers previous installation particular clean installation operating system installation target disk partition erased installation since interfering elements absent clean installation may succeed unclean installation may fail may take significantly longer network installation shortened netinstall installation program shared network resource may done installing minimal system proceeding download packages network may simply copy original media software publishers offer site licenses institutional customers may provide version intended installation network installation program installer computer program installs files applications drivers software onto computer installers specifically made install files contain installers general-purpose work reading contents software package installed differences package management system installer installation computer programs sometimes necessary update installer package manager make possible technique called bootstrapping used common pattern use small executable files update installer starts real installation update small executable called bootstrapper sometimes bootstrapper installs prerequisites software bootstrapping process cross-platform installer builders produce installers run windows macos linux example installanywhere flexera software windows nt family includes installation api associated service called windows installer microsoft provides minimum level tools required create installers using windows installer freely available windows sdk instead focusing api allow developers third parties leverage creating custom installers third party tools may supporting create installers using api speed process examples include installshield flexera software wix outercurve foundation installation authoring tools rely windows installer include wise installation studio wise solutions inc. installer vise mindvision software visual installer samlogic nsis clickteam innosetup installsimple macos includes installer native package manager macos also includes separate software updating application software update supports apple system software included dock 10.6.6 mac app store shares many attributes successful app store ios devices similar app approval process use apple id purchases automatic installation updating although apple preferred delivery method macos previously purchased licenses transferred mac app store downloading automatic updating commercial applications macos may also use third-party installer mac version installer vise mindvision software installermaker stuffit system installer software used set install operating system onto device examples system installers linux ubiquity wubi ubuntu anaconda centos fedora debian-installer debian-based versions linux yast suse-based projects another example found haiku operating system uses utility called haiku installer install onto device booting live cd live usb
[ 2432, 11521, 516, 2310, 8710, 8976, 8466, 1555, 4755, 3735, 6679, 6680, 9112, 8347, 4637, 11680, 5155, 5923, 6566, 7847, 6697, 811, 7983, 304, 9140, 6837, 2486, 823, 440, 4279, 1083, 5819, 10172, 10817, 1992, 5067, 6731, 4174, 463, 722, ...
Test
4,310
5
OmniWeb:omniweb omniweb proprietary internet web browser developed marketed omni group exclusively apple macos operating system though longer maintained still available free download omniweb originally developed omni group nextstep platform released lighthouse design march 17 1995 one month development time nextstep evolved openstep mac os x omniweb updated run platforms omniweb also able run microsoft windows yellow box openstep frameworks lighthouse design bought sun microsystems omni group released product version 2.5 onwards version 4.0 onwards omniweb developed solely os x platform omniweb developed using cocoa api allowed take full advantage os x features used quartz render images smooth text use multiple processors available featured interface made use aqua ui features drawers sheets customizable toolbars omniweb originally employed proprietary html layout engine used standard api nstext components however engine slow particularly scrolling fully compatible recent web standards cascading style sheets omniweb version 4.5 omni group adopted apple khtml-based webcore rendering engine created apple safari browser august 11 2004 omni group released version 5.0 omniweb included number new features notable feature unusual implementation tabbed browsing tabs displayed vertically drawer side window including optional thumbnail pictures pages despite certain amount controversy merits tab drawer tab toolbar feature persisted final version september 7 2006 version 5.5 released major new features included use custom version webkit instead webcore universal binary support saving web archive support user-defined style sheets select next link feature ftp folder display ad-blocking improvements updated localizations many small changes bug fixes omniweb omni group flagship app os x web browsers improved—apple eventually bundled safari os x— omni successfully introduced products omnigraffle omnioutliner omniweb importance diminished omniweb price successively lowered first 39.95 february 24 2009 omni group announced omniweb would made available free change previous price 14.95 omni group official website states browser longer active development omniweb popular early 2000s omnigroup experience developing openstep became foundation mac os x gave edge developers apple safari omniweb best support mac os x technologies among competition chiefly mozilla firefox internet explorer mac john siracusa technology journalist critic writing ars technica said finding level functionality proper mac os x application respected developer proven track record like finding perfect 1/10,000th scale replica eiffel tower box crackerjacks tower transforms tiny robot makes lunch
[ 513, 6657, 9736, 2579, 6171, 2076, 9757, 7713, 3110, 10791, 9770, 559, 4661, 3639, 10808, 3643, 9275, 64, 5707, 10834, 5205, 6231, 8281, 2139, 6747, 6237, 2149, 1642, 9834, 8303, 9841, 115, 2676, 9843, 3191, 119, 4728, 124, 637, 1664, 2...
Test
4,311
2
Pac-Man_Championship_Edition:pac-man championship edition game designed tōru iwatani creator original 1980 arcade game pac-man iwatani final game retirement originally released xbox live arcade service xbox 360 later released android ios j2me roku maemo 5 s60 platforms playstation network playstation portable playstation 3 consoles nintendo 3ds part retail game pac-man galaga dimensions part downloadable game compilation pac-man museum xbox 360 playstation 3 steam pc pac-man championship edition received two successors—an indirect follow-up pac-man championship edition dx released 2010 featuring new gameplay elements—and direct sequel pac-man championship edition 2 released playstation 4 xbox one pc 2016 like original pac-man basic game play pac-man championship edition consists entirely navigating pac-man maze eating dots power pellets bonus items fruits keys objects avoiding four ghosts roam maze well pac-man caught ghost player loses life eating power pellet causes ghosts turn blue allowing pac-man eat send back home re-emerge original form however several major differences original counterpart making pac-man c.e faster paced game maze divided two halves eating dots one half causes bonus item appear side eating item causes new maze appear half players also collect additional power pellets increase powered time continue earning maximum points eating ghosts longer player stays alive faster game gets points earned opposed levels game played within certain time limit players attempting get highest score possible game features six modes championship basic five-minute mode two challenge modes affect stage increasing power pellet pickups putting maze darkness three extra modes featuring different mazes game also supports online leader boards game originally released xbox live arcade service june 6 2007 announcement game spurred purchases xbox 360 japan pac-man c.e also available disc titled xbox live arcade compilation bundled xbox 360 arcade console bundle well compilation package namco museum virtual arcade latter however ca n't accessed within nmva must accessed game library ports ios j2me android psp minis released december 10 2009 middle 2009 late 2010 december 1 2010 respectively follow-up pac-man championship edition dx released xbox live arcade november 17 2010 playstation network november 23 2010 original pac-man championship edition ported nintendo 3ds part retail game titled pac-man galaga dimensions 2011 included downloadable game titled pac-man museum 2014 june 5 2007 first pac-man world championship held new york city brought together ten competitors eight countries play new pac-man championship edition prior release xbox live arcade top two scorers robert glashuettner austria carlos daniel borrego romero mexico competed championship single five-minute round borrego named pac-man world champion xbox 360 console specially decorated pac-man artwork signed tōru iwatani participants pac-man championship edition received mostly positive reviews critics reviewers stating gameplay fresh exciting one best 'exclusive pieces downloadable/casual entertainment available nice see classic remade instead simply repackaged jared rea joystiq called first true sequel pac-man since ms pac-man criticisms include lack multiplayer mode apparent relapse patterns original game metacritic aggregator score 83 user average 8.5/10 ios port criticised microtransaction strategy android port criticised poor controls ign criticised pspminis version due absence online leaderboards inferiority sequel
[ 8199, 3561, 8937, 7246, 4856, 3039 ]
Test
4,312
3
Congo_Bongo:congo bongo also known isometric platform arcade game released sega 1983 player takes role red-nosed safari hunter tries catch ape named bongo hunter seeks bongo exact revenge apparent practical joke bongo set fire hunter tent giving literal hot foot game named peter w. gorrie cfo sega time game rom contains message indicating likely coded least part company ikegami tsushinki congo bongo gameplay similar donkey kong frogger levels viewed isometric perspective oblique perspective ports protagonist offensive abilities must move jump avoid enemies obstacles complete level first level player must avoid coconuts thrown bongo climb series cliffs reach time shaking monkeys try throw hunter mountain second player crosses swamp riding backs swimming hippopotamuses dodging snakes scorpions third level requires player cross plain duck holes avoid charging rhinoceroses fourth involves second swamp crossing lily pads fish hippos player completes four levels hunter gives sleeping bongo hot foot retaliation prank bongo played game begins increased difficulty despite commercial failure initially released congo bongo ported nearly every major gaming platform day including sg-1000 msx intellivision colecovision commodore 64 twice first cartridge later disk ibm pc atari 2600 atari 5200 atari 8-bit family texas instruments ti-99/4a sega ports atari 2600 5200 8-bits commodore 64 cartridge version featured two four levels arcade original colecovision release missing level snake lake intellivision port features 4 game original levels ahoy 1984 stated congo bongo commodore 64 vic-20 fraught problems gameplay repetitive frustrating tedious inconsistent times confusing music got nerves stomped plus whole thing derivative 1984 st. game readers named game worst atari program 1983 even worse notorious e.t extra-terrestrial emulated version original arcade release featured unlockable playstation portable version sega genesis collection sega mega drive collection pal regions version also featured sonic ultimate genesis collection sega mega drive ultimate collection pal regions xbox 360 playstation 3 enhanced remake released playstation 2 sega ages label part sega ages 2500 series vol 23 sega memorial selection
[ 8937, 10316, 9006, 10576, 10931, 10644, 8151 ]
Test
4,313
4
Wireless_identity_theft:wireless identity theft wireless identity theft also known contactless identity theft rfid identity theft form identity theft described act compromising individual ’ personal identifying information using wireless radio frequency mechanics numerous articles written wireless identity theft broadcast television produced several investigations phenomenon according marc rotenberg electronic privacy information center wireless identity theft pretty serious issue contactless wireless card design inherently flawed wireless identity theft relatively new technique gathering individual ’ personal information rf-enabled cards carried person access control credit debit government issued identification cards cards carry radio frequency identification chip responds certain radio frequencies tags come contact radio waves respond slightly altered signal response contain encoded personal identifying information including card holder ’ name address social security number phone number pertinent account employee information upon capturing ‘ harvesting ’ data one able program cards respond identical fashion ‘ cloning ’ many websites dedicated teaching people well supplying necessary equipment software financial industrial complex migrating use magnetic stripes debit credit cards technically require swipe magnetic card swipe reader number transactions per minute increased transactions processed shorter time therefore making arguably shorter lines cashier academic researchers ‘ white-hat ’ hackers analysed documented covert theft rfid credit card information met denials criticisms rfid card-issuing agencies nevertheless public disclosure information could stolen low-cost jerry-rigged detectors used scan cards mailing envelopes studies also even via drive-by data attacks design security features various cards upgraded remove card owners ’ names data additionally number completely unencrypted card designs converted encrypted data systems issues raised 2006 report importance due tens millions cards already issued credit debit card data could stolen via special low cost radio scanners without cards physically touched removed owner ’ pocket purse carry bag among findings 2006 research study vulnerabilities first-generation rfid-enabled credit cards reports white-hat hackers related issue privacy groups individuals also raised big brother concerns threat individuals aggregated information even tracking movements either card issuing agencies third party entities even governments industry observers stated ‘ ... rfid certainly potential invasive consumer technology ever ’ credit card issuing agencies issued denial statements regarding wireless identity theft fraud provided marketing information either directly criticized implied release study results credit card companies contacted new york times investigative report said removing card holder names data transmitted new second generation rfid cards certain official identification documents issued u.s. government u.s passports passport cards also enhanced driver ’ licenses issued states new york washington contain rfid chips purpose assisting policing u.s. border various security issues identified use including ability black hats harvest identifier numbers distance apply blank counterfeit documents cards thus assuming people ’ identifiers various issues potential issues use identified including privacy concerns although rfid identifier number associated document supposed include personal identification information ... numbers evolve time uses evolve time eventually things reveal information initially expect stated tadayoshi kohno assistant professor computer science university washington participated study government issued documents
[ 2737, 1381, 10685, 8839 ]
Test
4,314
4
FinFisher:finfisher finfisher also known finspy surveillance software marketed lench solutions plc markets spyware law enforcement channels finfisher covertly installed targets computers exploiting security lapses update procedures non-suspect software company criticized human rights organizations selling capabilities repressive non-democratic states known monitoring imprisoning political dissidents egyptian dissidents ransacked offices egypt secret police following overthrow egyptian president hosni mubarak reported discovered contract gamma international €287,000 license run finfisher software 2014 american citizen sued ethiopian government surreptitiously installing finspy onto computer america using wiretap private skype calls monitor entire family ’ every use computer period months lench solutions plc uk-based branch gamma international ltd andover england germany-based branch gamma international gmbh munich gamma international subsidiary gamma group specializing surveillance monitoring including equipment software training services reportedly owned william louthean nelson shell corporation british virgin islands shell corporation signed nominee director order withhold identity ultimate beneficiary nelson common system companies established offshore august 6 2014 finfisher source code pricing support history related data retrieved gamma international internal network made available internet addition spyware finfisher suite offered gamma intelligence community includes monitoring ongoing developments updating solutions techniques complement developed intelligence agencies software suite company calls remote monitoring deployment solutions ability take control target computers capture even encrypted data communications using enhanced remote deployment methods install software target computers intrusion training program offered includes training methods techniques use company-supplied software suite marketed arabic english german french portuguese russian offered worldwide trade shows offering intelligence support system iss training products law enforcement intelligence agencies finfisher malware installed various ways including fake software updates emails fake attachments security flaws popular software sometimes surveillance suite installed target accepts installation fake update commonly used software code install malware also detected emails software designed evade detection antivirus software versions work mobile phones major brands security flaw apple itunes allowed unauthorized third parties use itunes online update procedures install unauthorized programs gamma international offered presentations government security officials security software trade shows described covertly install finfisher spy software suspects computers using itunes update procedures security flaw itunes finfisher reported exploited first described 2008 security software commentator brian krebs apple patch security flaw three years november 2011 apple officials offered explanation flaw took long patch promotional videos used firm trade shows illustrate infect computer surveillance suite released wikileaks december 2011 2014 ethiopian government found installed finspy computer american citizen via fake email attachment appeared microsoft word document finfisher also found engage politically motivated targeting ethiopia instance photos political opposition group used bait infect users technical analysis malware methods infection persistence techniques published code security blog four parts 12 march 2013 reporters without borders named gamma international one five corporate enemies internet “ digital era mercenaries ” selling products used governments violate human rights freedom information finfisher technology used bahrain reporters without borders together privacy international european center constitutional human rights ecchr bahrain centre human rights bahrain watch filed organisation economic co-operation development oecd complaint asking national contact point united kingdom investigate gamma ’ possible involvement bahrain since research shown finfisher technology used australia austria bahrain bangladesh britain brunei bulgaria canada czech republic estonia ethiopia germany hungary india indonesia japan latvia lithuania macedonia malaysia mexico mongolia netherlands nigeria pakistan panama qatar romania serbia singapore south africa turkey turkmenistan united arab emirates united states venezuela vietnam finfisher capable masquerading legitimate programs mozilla firefox april 30 2013 mozilla announced sent gamma cease-and-desist letter trademark infringement gamma created espionage program entitled firefox.exe even provided version number trademark claims appear legitimate firefox software article pc magazine bill marczak member bahrain watch computer science phd student university california berkeley research finfisher said finspy mobile gamma mobile spyware saw respect desktop version finfisher antivirus alone n't enough bypassed antivirus scans article author sara yin analyst pc magazine predicted antivirus providers likely updated signatures detect finspy mobile according announcements eset finfisher finspy detected eset antivirus software win32/belesak.d trojan security vendors claim products block spyware know detect regardless may launched eugene kaspersky head security company kaspersky lab stated detect malware regardless purpose origin two years statement eugene kaspersky 2012 description technique used finfisher evade kaspersky protection published part 2 relevant blog code security
[ 1024, 3072, 5636, 10245, 10756, 9233, 3092, 4117, 8726, 535, 9761, 4644, 4133, 9256, 3643, 7739, 9791, 1088, 4165, 1608, 3657, 2634, 8779, 4703, 8288, 8292, 8805, 107, 3192, 10875, 5245, 3711, 8320, 7809, 6786, 131, 5764, 2187, 9356, 8333...
Test
4,315
1
BBC_Archives:bbc archives bbc archives collections documenting bbc ’ broadcasting history including copies television radio broadcasts internal documents photographs online content sheet music commercially available music press cuttings artefacts historic equipment original copies collections permanently retained process digitised collections uploaded onto bbc archives website bbc online viewers see archive one largest broadcast archives world 15 million items bbc archives encompass numerous different archives containing different materials produced acquired bbc earliest material dates back 1890 consists 1 million hours playable material addition documents photographs equipment archives contain 15 million items 60 miles shelving spread several sites stock managed using bar code system help locate material shelves also track material lent bbc says budget managing protecting digitising archive accounts small part bbc overall spend bbc engaging ongoing project digitise archived programme material converting recordings made older analogue formats audio tape videotape film electronic formats compatible modern computer systems much audio-visual material originally recorded formats obsolete incompatible modern broadcast equipment due fact machines used reproduce many formats longer manufactured additionally film audio formats slowly disintegrating digitisation also serves digital preservation programme bbc archive website relaunched online 2008 provided newly released historical material regularly since bbc works partnership british film institute bfi national archives partners working using materials 2012 bbc archive development produced book primarily aimed bbc staff titled 'bbc archive collections archive use book describes bbc archive collections offers guidance around items collections reused online 1963 2010 majority television material nationally networked programmes bbc archive housed archive centre windmill road brentford west london television programmes also stored open university milton keynes bbc nations regional libraries around country late 1990s early 2000s material radio side bbc also stored site condition three windmill road buildings deteriorated years suffered occasional flooding incidents eventually archive relocated new centre perivale park perivale three miles north old site new bbc archive centre opened summer 2010 material successfully moved march 2011 material stored thirteen vaults controlled match best climate material inside named different bbc personality depending content contained addition vaults new editing workrooms added material easily transferred formats well viewed restored building also fitted fire suppression systems protect archive event incident centre total loss archive avoided april 2019 bbc archives employs around 200 staff based archive centre perivale bbc television archive contains 1.5 million tape items well 600,000 cans film material archive holds extensive material approximately mid-1970s onwards important recordings broadcaster retained future recordings date less comprehensively preserved process telerecording originally invented 1947 videotape recording gradually introduced late 1950s onwards due expense tapes recording seen production use recordings subsequently wiped telerecordings junked exceptions early years usually occasions great importance coronation queen elizabeth ii addition numerous programmes time broadcast 'live utilised recording procedure production process earliest item collection 1936 today majority programmes kept including news entertainment drama selection long-running programmes quiz shows remaining material television archive offered british film institute prior disposed bbc sound archive contains archived output bbc radio output widespread recordings exist archive mid-1930s recording programmes speeches kept rebroadcast catalyst launch bbc empire service 1932 subsequent rebroadcast speeches political leaders time convenient different time zones prior broadcast recordings seen false listener avoided recordings made frequently disposed efforts marie slocombe founded sound archive 1937 retained recordings prominent figures country archive became officially appointed sounds recording librarian 1941 today bbc radio output recorded re-use approximately 66 output preserved archives programmes involving guests live performances artists kept whereas programmes dj plays commercially available music sampled kept entirely prior material disposed material offered british library sound archive archive consists number different formats including wax cylinders numerous gramophone records made shellac vinyl well numerous recordings tape cd digital audio tape dat difficulty different formats availability machines required play vinyl records archive 16 inches size require large phonograph units play players wax cylinders dats longer production also 700,00 vinyl records 180,000 78 records 400,000 lp record 350,000 cd archive radio digital archive capturing radio programmes broadcast quality wav files since 2008 1.5 million recordings growing daily wax cylinder collection donated british library sound archive based new bbc archive centre perivale along television archive previously based windmill road brentford bbc written archive contains internal written documents communications corporation launch 1922 present day collections shed light behind scenes workings corporation also elaborate difficulties getting television radio programme air case may archive guidelines state access files post-1980 restricted due current nature files general exception rule documents scripts programme broadcast records written archives located bbc written archive centre caversham berkshire near reading centre houses archive four half miles shelving along reading rooms centre different bbc archives centre opens writers academic researchers higher education bbc photographic library responsible approximately 7 million images dating back 1922 created publicity purposes subsequently kept future use addition programme promotion large number images historic events often incorporate daily news bulletins result half photographic library team work specifically images images kept originals archive digitisation utilised specific image required use image sent digital format copies images also used case images damaged notable due vinegar syndrome popular images archive include colin firth pride prejudice michael parkinson interviewing muhammad ali martin bashir interviewing diana princess wales picture delia derbyshire work radiophonic workshop bbc turn millennium bbc launched bbc archive treasure hunt public appeal recover pre-1980s lost bbc radio television productions original material featuring several popular programmes lost due practice wiping copyright issues technological reasons resolution appeal one hundred productions recovered including men ministry something shout man superman doctor dilemma 'm sorry 'll read hancock half hour 'm sorry n't clue ronnie corbett thing addition recording sessions elton john ringo starr paul simon also peter sellers estate collection donated numerous recordings featuring peter sellers bbc together british film institute open university channel 4 teachers tv formed collaboration named creative archive licence group create copyright licence re-release archived material licence trial launched 2005 notable re-release part bbc news archive programmes made bbc natural history unit creative use public artists teachers encouraged use content create works terms licence restrictive compared copyleft licences use creative archive content commercial endorsement campaigning defamatory derogatory purposes forbidden derivative works released licence content used within uk trial ended 2006 following review bbc trust works released licence withdrawn voices archives former bbc project launched partnership bbc four provided free access audio interviews various notable people professions variety political religious social backgrounds website ceased updated june 2005 concept instead adopted bbc radio 4 collection film interviews various programmes bbc heritage collection newest bbc archives holds variety historic broadcast technology art props merchandise collection created personal collections bequeaths former staff members bbc formal policy heritage collection c.2003 collection includes amongst items bbc one noddy globe clock bbc-marconi type microphone early crystal radio made british broadcasting company marconi/emi camera used early bbc television experiments bbc micro computer selection items used create foley addition broadcast technology art also kept namely portraits bbc director generals well props including original tardis doctor children television puppet gordon gopher heritage collection one permanent home majority objects display either around bbc properties loan museums collections notable museum housing collection national science media museum bradford years bbc used various programme catalogue databases keep record programmes archives internal databases include infax fabric publicly accessible databases include bbc genome bbc programmes
[ 525 ]
None
4,316
3
Windows_Server_2019:windows server 2019 windows server 2019 latest version server operating system microsoft part windows nt family operating systems windows server 2019 announced march 20 2018 first windows insider preview version released day released general availability october 2 2018 october 6 2018 distribution windows version 1809 build 17763 paused microsoft investigated issue user data deleted in-place upgrade affected systems user profile folder e.g documents music pictures moved another location data left original location windows server 2019 based windows version 1809 codebase removed distribution time re-released november 13 2018 software product life cycle server 2019 reset accordance new release date windows server 2019 version 1903 following new features
[ 8576, 641, 10624, 2179, 3463, 651, 6797, 4240, 2193, 3857, 6675, 2196, 7057, 8080, 8976, 10896, 4505, 11283, 4515, 11301, 3496, 6441, 6697, 1581, 7983, 11184, 3250, 3890, 9910, 823, 9655, 1978, 6462, 7615, 321, 7106, 582, 1098, 10957, 847...
Test
4,317
3
Metal_Gear_2:_Solid_Snake:metal gear 2 solid snake metal gear 2 solid snake overhead action-adventure stealth video game tagline tactical espionage game initially released konami 1990 msx2 computer platform sequel msx2 version original metal gear solid snake designed written series creator hideo kojima learned existence snake revenge sequel nes developed specifically north american european markets solid snake would officially available japan north american european release playstation 2 2006 included full ports msx2 metal gear games additional content also included metal gear solid 3 released playstation 3 xbox 360 playstation vita given stand-alone re-release japan downloadable game mobile phones wii virtual console set 1999 years events original game solid snake must infiltrate heavily defended territory known zanzibar land rescue kidnapped scientist destroy revised metal gear game significantly evolved stealth-based game system predecessor almost every way introduced complex storyline dealing themes nature warfare nuclear proliferation considered one best 8 bit games ever made metal gear 2 builds upon stealth-based gameplay system predecessor original metal gear player objective infiltrate enemy stronghold avoiding detection soldiers cameras infrared sensors surveillance devices biggest change game done enemy abilities instead remaining stationed one screen like first game enemy soldiers patrol different screens across single map moreover guards expanded field vision 45 degrees along ability turn heads left right see diagonally enemy also detect sounds enemy able hear noise made player punch wall gunshots made without suppressor investigate source sound made also detect sounds made player walking certain surfaces means players need careful surfaces walk player discovered enemy counter displayed upper right side screen go enemy lost track player counter reaches zero alert phase go game return normal player given variety new maneuvers tools help remain undetected complete game example player kneel crawl addition walking allowing player avoid making noise certain terrains pick land mines hide tight spaces desks inside air ducts radar 3x3 grid upper right screen shows player current area center grid red dot enemy soldiers white dots allowing player determine ahead however radar disabled game enters alert phase radar also used mine detector equipped determine locations enemy mines launch stinger missiles onto airborne target many weapons equipment first game brought along new items robotic mice used distract enemies camouflaged mat three different types rations special attributes health carrying capacity increased time boss defeated transceiver also greatly revamped first game well conversations context-sensitive rather simply area-oriented transceiver screen displays faces snake radio contact currently communicating player also talk children living fortress gain new information player penalized loss health kills child areas varied previous msx2 game number puzzles must fulfilled complete game luring carrier pigeon specific kind ration chasing female spy ladies lavatory deciphering secret tap codes gain new frequency numbers msx2 version required use either floppy disk game master ii sram memory save player progress passwords used well absence either complexities eliminated later ports due standardization storage devices memory cards internal hard drives save data solid snake formerly retired foxhound agent hero original metal gear returns playable character new mission rescue kidnapped czechoslovak biologist dr. kio marv forces zanzibarland assisted radio support crew consisting roy kyanbel roy campbell later versions new commanding officer mcdonnell miller survival coach drill instructor george kesler george kasler later versions military strategist yozev norden renamed johan jacobsen later revised versions wildlife expert also assisting on-site horry white holly white later versions cia agent posing journalist natasha marcova gustava heffner later versions stb agent dr. marv bodyguard dr. petrovich madnar drago pettrovich madnar newer versions metal gear designer first game captured along dr. marv also appearing game big boss renegade former commander foxhound grey fox gray fox later versions disappeared following events outer heaven incident bosses installment consist black color black ninja later versions experimental drug-enhanced ninja disbanded nasa project revealed kyle schneider original metal gear running man former olympic runner turned terrorist red blaster explosive expert spetsnaz ultra box four horsemen later version assassination squad specializing confined spaces predator jungle evil later versions jungle warfare expert south african reconnaissance command night sight night fright later versions assassin vietnam uses state art stealth suit renders invisible radar human eye major oil crisis seriously affects global economy late 1990s petrol deposits running faster previous estimates efforts adopt alternative energy sources attempts drill oil fails take slack counter problem czech scientist dr. kio marv bio-engineers new species algae oilix could produce petroleum-grade hydrocarbons little expense effort unveils algae world energy conference prague way demonstration united states kidnapped soldiers zanzibarland central asian country established 1997 successful independence war soviet union nato discovers zanzibarland leaders plan hold world hostage controlling supply oil oilix nuclear warheads pillaged old stockpiles marked dismantling light global efforts toward nuclear disarmament foxhound new commander roy campbell brings solid snake retirement sends zanzibarland rescue dr. marv christmas eve 1999 course mission snake teams holly white cia operative posing journalist gustava heffner stb agent dr. marv bodyguard also reunited dr. drago pettrovich madnar metal gear inventor outer heaven claims kidnapped forced work another metal gear project named metal gear zanzibarland well oversee mass-production smaller non-nuclear-equipped metal gear units snake learns dr. madnar big boss snake former superior survived events first game leads zanzibarland snake heffner dr. madnar head toward zanzibarland main prison heffner killed missile fired metal gear dr. madnar recaptured enemy new metal gear pilot revealed gray fox determined finish mission snake fights zanzibarland elite mercenary force manages reach dr. marv cell snake arrives late finds dr. marv corpse oilix data holly later tips actually died dr. madnar torture addition snake learns madnar volunteered services zanzibarland finish work metal gear revenge scientific community shunning events first game snake incapacitates madnar latter attempts attack snake faces gray fox metal gear eventually destroys mech men later fight hand-to-hand minefield snake finishes tries escape snake meets big boss lost equipment weapons disposal snake forced improvise using items find lighter aerosol fashioning makeshift flamethrower snake defeats big boss second time snake holly escape together deliver oilix formula campbell following success nes version metal gear sold million units north america konami began development sequel platform titled snake revenge designed specifically overseas market hideo kojima directed first msx2 game involved either nes versions plans develop sequel time became reacquainted coworker assigned work snake revenge train ride tokyo coworker revealed involvement project encouraged kojima create sequel end train ride kojima already envisioned basic premise game undergoing business trip sales division konami kojima successfully convinced superiors approve development metal gear 2 solid snake msx division msx2 version metal gear 2 released japan july 20 1990 unlike first msx2 game official english localization produced konami already discontinued sales msx games europe although fan translation later produced 1997 msx hobbyist group g international first port metal gear 2 another platform japanese feature phone version released october 1 2004 downloadable app i-mode ezweb yahoo mobile services version features additions original msx2 version easy mode unlockable boss rush mode clearing main game also include adjustments changes notably replacement portraits used conversation sequences portraits msx2 version modeled real life celebrities new portraits instead designed closely resemble metal gear solid illustrator yoji shinkawa character designs later installments changes would also implemented version included playstation 2 expanded edition released japan 2005 included full ports msx2 metal gear games part newly-added content subsistence would later released north america europe 2006 full english localizations msx2 games marking first time metal gear 2 given international release two msx2 games would later included metal gear solid 3 released playstation 3 xbox 360 2011 playstation vita 2012 metal gear 2 also released wii virtual console exclusively japan march 30 2010 like virtual console games metal gear 2 emulated original msx2 hardware rather ported mobile phone version like subsistence hd edition ports although version game patched use revised character portraits rather original ones game music written konami kukeiha club members tsuyoshi sekito masahiro ikariko mutsuhiko izumi yuko kurahashi tomoya tomita kazuhiko uehara yuji takenouchi cartridge msx2 version carried custom sound chip scc previously employed games nemesis 2 snatcher enhanced music sound effects beyond msx basic capabilities arranged music based metal gear 2 solid snake used vr training disc metal gear solid integral released north america metal gear solid vr missions additionally integral features two hidden tunes based metal gear 2 available via secret codec frequency main game one arranged version theme solid snake arrangement zanzibar breeze listenable contacting codec frequency 140.66 certain locations theme solid snake also made appearance nintendo 2008 crossover fighting game super smash bros. brawl initial release metal gear 2 ranked msx magazine top 30 best selling msx games list six months premiering 1 spot october 1990 issue metal gear 2 solid snake would later receive near universal-acclaim retro game reviewers according paul soth gamespy game surpassed predecessor metal gear every way addition praising gameplay also praised game gripping well written storyline rich characterization quality storytelling made mgs compelling concluded players disappointed great gameplay story remains one best 8 bit games ever made game informer critical game however giving 7 10 wrote order reach pivotal moments game story must endure ridiculous situations solid snake ever seen game focus constant backtracking keycard acquisition makes repetitive concluded diehard fans find experience rewarding best way play game bonus disc metal gear solid 3 subsistence game mechanics sequel metal gear solid despite transition 3d remained largely similar 2d predecessor included plot summaries first two msx2 games accessible special mode previous operations retro gamer regarded metal gear 2 close anyone get playing metal gear solid 2d putting game boy color game released decade later 2000 retro gamer also included among top ten msx games jeremy parish 1up.com referred metal gear solid basically high-spec remake metal gear 2 nickolai adkins 1up also noted much scenario plot elements metal gear 2 recycled metal gear solid ranging snake emerging retirement rescue kidnapped non-soldier personnel beginning escape sequence snake accompanied female accomplice/love interest end ign notes metal gear 2 introduced stealth mechanics making noise attract guards crouching crawling ground disarming mines enemies view cones
[ 5762, 8232, 8937, 10316, 9005, 9006, 2096, 8819, 10931 ]
Test
4,318
5
IMessage:imessage imessage instant messaging service developed apple inc launched 2011 supported messages application ios 5 later os x mountain lion later imessage announced scott forstall wwdc 2011 keynote june 6 2011 version messages app ios support imessage included ios 5 update october 12 2011 february 16 2012 apple announced new messages app replacing ichat would part os x mountain lion mountain lion released july 25 2012 october 23 2012 apple ceo tim cook announced apple device users sent 300 billion messages using imessage apple delivers average 28,000 messages per second february 2016 eddy cue announced number imessages sent per second grown 200,000 may 2014 lawsuit filed apple issue user switches apple device non-apple device messages delivered imessage would reach destination november 2014 apple addressed problem providing instructions online tool deregister imessage federal court dismissed suit apple favor march 21 2016 group researchers johns hopkins university published report demonstrated attacker possession imessage ciphertexts could potentially decrypt photos videos sent via service researchers published findings vulnerability patched apple may 3 2016 independent open-source project named piemessage announced app developer eric chee consisting code os x communicates imessage connects android client allowing android client send receive messages june 13 2016 apple announced addition apps imessage service accessible via messages apps apps create share content add stickers make payments within imessage conversations without switch standalone apps one could develop standalone imessage apps extension existing ios apps publishers also create standalone stickers apps without writing code according sensor tower march 2017 imessage app store features nearly 5,000 message-enabled apps imessage allows users send texts documents photos videos contact information group messages internet ios macos users imessage alternative sms mms messaging users devices running ios 5 later send sms setting messages cause message sent via sms sender active internet connection receiver internet connection message stored server connection restored imessage accessible messages app iphone ipad ipod touch running ios 5 later mac running os x mountain lion later owners devices register one email addresses apple additionally iphone owners register phone numbers apple provided carrier supported message sent mobile number messages check apple mobile number set imessage message seamlessly transition imessage sms messages user sent communication aligned right replies people left user see imessage user typing message pale gray ellipsis appears text bubble user reply started also possible start conversation one ios device continue another iphones green buttons text bubbles indicate sms-based communication ios devices blue buttons text bubbles indicate imessage communication imessages encrypted tracked using delivery receipts recipient enables read receipts sender able see recipient read message imessage also allows users set chats two people—a group chat launch ios 10 users send messages accompanied range bubble screen effects holding send button force range effects surfaced users select effect sent receiver imessage protocol based apple push notification service apns —a proprietary binary protocol sets keep-alive connection apple servers every connection unique code acts identifier route used send message specific device connection encrypted tls using client-side certificate requested device activation imessage november 12 2012 chetan sharma technology strategy consulting firm published us mobile data market update q3 2012 noting decline text messaging united states suggested decline may attributed americans using alternative free messaging services imessage 2017 google announced would compete imessage messaging service android messaging november 4 2014 electronic frontier foundation eff listed imessage secure messaging scorecard giving score 5 7 points received points communications encrypted transit communications encrypted keys provider n't access end-to-end encryption past communications secure keys stolen forward secrecy security designs well-documented recent independent security audit missed points users verify contacts identities source code open independent review september 2015 matthew green noted imessage display key fingerprints out-of-band verification users unable verify man-in-the-middle attack occurred post also noted imessage uses rsa key exchange means opposed eff scorecard claims imessage feature forward secrecy august 7 2019 researchers project zero presented 6 “ interaction-less ” exploits imessage could used takeover control user ’ device 6 exploits fixed ios 12.4 released july 22 2019 however stil undisclosed exploits patched future update
[ 10242, 10755, 9732, 4615, 1036, 1549, 5647, 7697, 1042, 11289, 3610, 10271, 3105, 6186, 4139, 6700, 1074, 8754, 8758, 9784, 8253, 576, 6208, 8783, 5713, 4180, 3670, 1623, 3672, 4184, 10838, 2141, 4702, 3681, 9826, 2149, 5733, 8806, 3691, ...
Test
4,319
4
Runa_Sandvik:runa sandvik runa sandvik computer security expert known proponent strong encryption hired new york times senior director information security march 2016 proponent smartphone messaging application signal acquired first computer fifteen years old studied computer science norwegian university science technology 2014 sandvik married michael auger pair made home washington d.c. sandvik early developer tor anonymity network cooperative facility helps individuals obfuscate internet protocol using access internet sandvik technical advisor freedom press foundation serves review board black hat europe sandvik interviewed edward snowden may 2014 february 2015 sandvik documented efforts retrieve information foia reqests.. sandvik husband auger demonstrated smart rifles remote access remotely hacked 13,000 trackingpoint sniper rifle equipped embedded linux computer according wired magazine used according specifications aiming computer enable novice hit remote targets would otherwise require skilled marksman however manufacturers designed aiming computer wifi capabilities shooter could upload video shots sandvik auger found could initiate unix shell command line interpreter use alter parameters aiming computer relies always miss targets found knowledgeable hacker could use shell acquire root access acquiring root access allowed interloper erase aiming computer software— bricking aiming computer sandvik led efforts make new york times tor onion service allowing times employees readers access newspaper site ways impede intrusive government monitoring
[ 11442, 3495 ]
Train
4,320
6
Mkstemp:mkstemp computing codice_1 posix function creating temporary file computer file usually ceases exist program opened file closes terminates accepts argument determines location temporary file prefix generated filename codice_1 added single unix specification function codice_3 deprecated latter carried risk temporary file name could created another thread process within time caller obtains temporary filename attempts create codice_1 suffer problem codice_5 following code example usage codice_1 local variable codice_13 modified codice_1 contain path new file unspecified codice_1 sets errno values errno set event failure codice_1 function generates filename according supplied argument template attempts create repeats process file successfully created opens file returns file descriptor caller data buffer passed function template containing new filename file deleted immediately codice_1 call returns prevent processes opening file still used calling process still valid file descriptor older versions codice_1 created file umask 0666 resulting temporary files readable writable users thus presenting security vulnerability mitigated setting umask manually calling codice_1 newer versions function create file umask 600 owner file may read write
[ 2432, 11067, 8516, 8975, 592, 1746, 3571, 52, 1336, 1114, 10555, 6813 ]
None
4,321
2
DirectShow:directshow directshow sometimes abbreviated ds dshow codename quartz multimedia framework api produced microsoft software developers perform various operations media files streams replacement microsoft earlier video windows technology based microsoft windows component object model com framework directshow provides common interface media across various programming languages extensible filter-based framework render record media files demand request user developer directshow development tools documentation originally distributed part directx sdk currently distributed part windows sdk formerly known platform sdk microsoft plans completely replace directshow gradually media foundation future windows versions one reason cited microsoft provide much robust support content protection systems see digital rights management microsoft msft becky weiss also confirms 'll notice working media foundation requires work slightly lower level working directshow would still directshow features n't yet media foundation described media foundation article windows vista windows 7 applications use media foundation instead directshow several media related tasks direct predecessor directshow activemovie codenamed quartz originally chartered provide mpeg-1 file playback support windows also intended future replacement media processing frameworks like video windows never designed handle codecs put video frames different order compression process media control interface never fully ported 32-bit environment utilize com quartz team started existing project called clockwork clockwork modular media processing framework semi-independent components worked together process digital media streams previously used several projects including microsoft interactive television mitv project another project named tiger activemovie announced march 1996 released may 1996 bundled beta version internet explorer 3.0 march 1997 microsoft announced activemovie would become part directx 5 suite technologies around july started referring directshow reflecting microsoft efforts time consolidate technologies worked directly hardware common naming scheme directshow became standard component windows operating systems starting windows 98 however available windows 95 installing latest available directx redistributable directx version 8.0 directshow became part mainline distribution directx sdk placed alongside directx apis october 2004 directshow removed main directx distribution relocated directx extras download april 2005 directshow removed entirely directx moved windows sdk starting windows server 2003 sp1 version sdk directx sdk however still required build directshow samples since november 2007 directshow apis part windows sdk includes several new enhancements codecs filter updates enhanced video renderer evr dxva 2.0 directx video acceleration directshow divides complex multimedia task e.g video playback sequence fundamental processing steps known filters filterwhich represents one stage processing datahas input and/or output pins may used connect filter filters generic nature connection mechanism enables filters connected various ways implement different complex functions implement specific complex task developer must first build filter graph creating instances required filters connecting filters together three main types filters rendering process filter graph searches windows registry registered filters builds graph filters based locations provided connects filters together developer request executes i.e. plays pauses etc created graph directshow filter graphs widely used video playback filters implement functions file parsing video audio demultiplexing decompressing rendering well video audio recording editing encoding transcoding network transmission media interactive tasks dvd navigation may also controlled directshow example left right graph contains source filter read mp3 file stream splitter decoder filters parse decode audio rendering filter play raw audio samples filter one pins used connect filter filters every pin functions either output input source data flow one filter another depending filter data either pulled input pin pushed output pin order transfer data filters pin connect one pin agree kind data sending filters built using set c++ classes provided directshow sdk called directshow base classes handle much creation registration connection logic filter filter graph use filters automatically need registered separate directshow registry entry well registered com registration managed directshow base classes however application adds filters manually need registered unfortunately difficult modify graph already running usually easier stop graph create new graph scratch starting directshow 8.0 dynamic graph building dynamic reconnection filter chains introduced help alter graph running however many filter vendors ignore feature making graph modification problematic graph begun processing default directshow includes number filters decoding common media file formats mpeg-1 mp3 windows media audio windows media video midi media containers avi asf wav splitters/demultiplexers multiplexers source sink filters static image filters since associated patented technologies licensed windows license fees required e.g. fraunhofer mp3 codecs mpeg-4 advanced simple profile aac h.264 vorbis containers mov mp4 available 3rd parties incorporating support additional codecs involve paying licensing fees involved codec technology developer patent holder however directshow standard format repertoire easily expanded means variety filters filters enable directshow support virtually container format audio video codec example filters developed ogg vorbis musepack ac3 finally bridge filters simultaneously support multiple formats well functions like stream multiplexing exposing functionality underlying multimedia apis vlc amount work required implement filter graph depends several factors simplest case directshow create filter graph automatically source file url possible developer may able manually create filter graph source file possibly addition custom filter let directshow complete filter graph connecting filters together next level developer must build filter graph scratch manually adding connecting desired filter finally cases essential filter unavailable developer must create custom filter filter graph built unlike main c api quicktime necessary call moviestask loop load media file directshow handles transparent way creates several background threads smoothly play requested file url without much work required programmer also contrast quicktime nothing special required loading url instead local file diskdirectshow filter graph abstracts details programmer although recent developments quicktime including activex control reduced disparity directshow editing services des introduced directx 8.0/windows xp api targeted video editing tasks built top core directshow architecture directshow editing services introduced microsoft windows movie maker includes apis timeline switching services resizing cropping video audio effects well transitions keying automatic frame rate sample rate conversion features used non-linear video editing allowing creation composite media number source audio video streams directshow editing services allow higher-level run-time compositing seeking support graph management still allowing applications access lower-level directshow functions original api c++ directshow editing services accessible microsoft .net compatible language including microsoft visual c microsoft visual basic using third-party code library called directshownet library alternatively entire directshow api including directshow editing services accessed borland delphi 5 6 7 c++ builder 6 later versions minor modifications using third party software library called dspack march 2012 apparently early 2009 microsoft stated directshow editing services api supported may altered unavailable future originally windows 9x directshow used video renderer filter drew images using directdraw 3 could also fall back gdi overlay drawing modes circumstances depending upon visibility video window video card capabilities limited access video window video windows plagued deadlocks caused applications incorrect handling video windows early directshow releases handle playback window hidden applications also reliable way draw caption text graphics top video directshow 6.0 released part directx media introduced overlay mixer renderer designed dvd playback broadcast video streams closed captioning subtitles overlay mixer uses directdraw 5 rendering downstream connection video renderer required window management overlay mixer also supports video port extensions vpe enabling work analog tv tuners overlay capability sending video directly video card via analog link rather via pci bus overlay mixer also supports dxva connections always renders overlay full-screen video tv-out always activated windows xp introduced new filter called video mixing renderer 7 vmr-7 sometimes referred vmr number 7 vmr-7 used directdraw version 7 render video option use gdi drawing main new feature vmr-7 ability mix multiple streams graphics alpha blending allowing applications draw text graphics video support custom effects also featured windowless mode access composited image rendered fixed problems access window handle vmr-7 officially released windows xp directx 9 included vmr-9 version uses direct3d 9 instead directdraw allowing developers transform video images using direct3d pixel shaders available windows platforms part directx 9 redistributable vmr-7 provides windowless mode however unlike overlay mixer vmr-7 support video ports using /3gb boot option may cause vmr-9 fail windows vista windows 7 ship new renderer available media foundation component directshow filter called enhanced video renderer evr evr designed work desktop window manager supports dxva 2.0 available windows vista windows 7 offers better performance better quality according microsoft january 8 2007 microsoft received emmy award streaming media architectures components 58th annual technology engineering emmy awards commanding directshow play file relatively simple task however programming advanced customizations commanding directshow display certain windows messages video window creating custom filters many developers complain difficulties regarded one microsoft complex development libraries/apis developers rarely create directshow filters scratch rather employ directshow base classes base classes often simplify development allowing programmer bypass certain tasks however process may remain relatively complex code found base classes nearly half size entire mfc library result even base classes number com objects directshow contains often overwhelms developers cases directshow api deviates traditional com rules particularly regard parameters used methods overcome difficulties directshow unique com rules developers often turn higher level api uses directshow notably windows media player sdk api provides developer activex control fewer com interfaces deal although directshow capable dynamically building graph render given media type certain instances difficult developers rely functionality need resort manually building filter graphs resulting filter graph variable possible filter graphs change time new filters installed computer directshow also criticized support digital rights management drm however directshow minimal support drm api windows media player sdk significantly reflects microsoft adherence drm codec hell term derived dll hell multiple directshow filters conflict performing task large number companies develop codecs form directshow filters resulting presence several filters decode media type issue exacerbated directshow merit system filter implementations end competing one another registering increasingly elevated priority microsoft ted youmans explained directshow based merit system idea using combination filter ’ merit specific media type/sub type one could reasonably pick right codec every time n't really designed competing merit nuclear arms race tool help troubleshooting codec hell issues usually referenced gspot codec information appliance useful determining codec used render video files avi containers graphedit also help understanding sequence filters directshow using render media file codec hell resolved manually building filter graphs using media player supports ignoring overriding filter merits using filter manager changes filter merits windows registry directshow developer-centric framework api directly offer end-user control encoding content incorporate user interface encoding using installed codecs different formats instead relies developers develop software using api contrast multimedia frameworks quicktime video windows allow end-users perform basic video-related tasks re-encoding using different codec editing files streams convenience offered end-user gui apparent since avi format codecs used video windows still remain use example virtualdub
[ 10243, 10769, 9234, 1043, 1055, 2083, 8227, 1577, 10282, 4143, 9263, 11316, 1077, 8246, 8262, 1098, 4174, 4178, 9813, 603, 2145, 5225, 1656, 10360, 5754, 9340, 5761, 9348, 5765, 10886, 2183, 651, 5259, 653, 6797, 3224, 4771, 7846, 2221, 1...
Test
4,322
0
Natural_Language_Engineering:natural language engineering natural language engineering bimonthly peer-reviewed academic journal published cambridge university press covers research software natural language processing aim bridge gap traditional computational linguistics research implementation practical applications potential real-world use original publication theoretical applied aspects computational linguistics journal also contains industry watch emerging trends columns tracking developments field editor-in-chief ruslan mitkov university wolverhampton according journal citation reports journal 2016 impact factor 1.065
[ 11056, 1890, 7780 ]
Validation
4,323
4
Expertization:expertization expertization process authentication object usually sort collected individual authority committee authorities expert expert committee examines collectible issues certificate typically including experts apply mark signature item attesting genuineness expertization particularly common valuable philatelic items often forged may unsaleable without
[ 5433 ]
Test
4,324
2
Nokia_N93:nokia n93 nokia n93 smartphone nokia part multimedia nseries introduced 25 april 2006 released july 2006 runs symbian os v9.1 s60 3rd edition interface advanced camera phone nokia time release particularly marketed camcorder packed unique swivel design like predecessor nokia n90 n93 improved upon camera capabilities n90 phone 3.2-megapixel camera carl zeiss optics 3x optical zoom first nokia phone well 30 fps 640×480 vga mpeg-4 video recording capability succeeded nokia n93i well coming 2 colors pearl black silver also nokia n93 golf edition preloaded pro session golf software help improve golf skills also edition included memory card preloaded movie mission impossible iii theme although nokia planned release n-gage application n93 alongside n73 n93i never made due memory issues
[ 1537, 4609, 8577, 3205, 11655, 9359, 1424, 529, 2449, 8083, 10770, 5143, 2072, 7063, 5274, 5019, 5659, 669, 8472, 11545, 4003, 4132, 6310, 167, 40, 3626, 5290, 10410, 9262, 690, 10802, 7220, 821, 5175, 7866, 1083, 1728, 7617, 4291, 7877, ...
Test
4,325
4
Mailwasher:mailwasher mailwasher email filtering software windows detect delete spam user email mail server downloaded user computer mailwasher developed new zealand based company firetrust uses combination user defined filters spam databases bayesian filtering filter works small portion email allows unwanted emails directly deleted user pop3 inbox without downloading email client user computer approach intended prevent downloading spam messages infected malware two versions program free version access single mail account contain bayesian learning filter pro version access multiple accounts additional features
[ 6762, 8747, 6797, 7983, 4272, 3032, 9053 ]
Test
4,326
2
Microsoft_Edge:microsoft edge microsoft edge web browser developed microsoft first released windows 10 xbox one 2015 android ios 2017 macos 2019 edge includes integration cortana extensions hosted microsoft store unlike internet explorer edge support legacy activex bho technologies originally built microsoft edgehtml chakra engines 2019 edge rebuilt chromium-based browser using blink v8 engines part change codenamed anaheim microsoft intends add support windows 7 8 8.1 macos according statcounter edge still lower market share internet explorer market share combined microsoft browsers place second chrome traditional pcs microsoft edge default web browser windows 10 windows 10 mobile xbox one consoles replacing internet explorer 11 internet explorer mobile development release dependent model windows service included windows 10 enterprise long-term servicing branch ltsb builds microsoft initially announced edge would support legacy trident mshtml layout engine backwards compatibility later said due strong feedback edge would use new engine internet explorer would continue provide legacy engine favorites reading list browsing history downloads viewed hub sidebar providing functionality similar internet explorer ’ downloads manager favorites center browser includes integrated adobe flash player internal whitelist allowing flash applets facebook websites load automatically bypassing security controls requiring user activation pdf reader also supports asm.js edge support legacy technologies activex browser helper objects instead uses extension system internet explorer 11 remains available alongside edge windows 10 compatibility remains nearly identical windows 8.1 version use edge engine previously announced edge integrates microsoft online platforms order provide voice control search functionality dynamic information related searches within address bar users make annotations web pages stored shared onedrive ca n't save html pages computers also integrates reading list function provides reading mode strips unnecessary formatting pages improve legibility preliminary support browser extensions added march 2016 build 14291 three extensions initially supported microsoft indicated delay allowing extensions small number due security concerns edgehtml proprietary layout engine developed edge fork trident removed legacy code older versions internet explorer rewritten majority source code support web standards interoperability modern browsers edgehtml written c++ rendering engine first released experimental option internet explorer 11 part windows 10 preview 9926 build edgehtml meant fully compatible webkit layout engine used safari chrome browsers microsoft stated edge–webkit differences bugs ’ interested fixing review engine beta windows 10 build anandtech found substantial benchmark improvements trident particularly javascript engine performance come par google chrome benchmarks focusing performance webgl api found edgehtml perform much better google chrome mozilla firefox edge originally lacked support open media standards webm opus later added edge 14.14291. edge 17 scored 492/555 html5test comparable firefox 59 scored 491/555 lagging behind chrome 66 scored 528/555 chromium-based microsoft edge four channels overall canary dev short developer beta stable microsoft collectively calls canary dev beta channels microsoft edge insider channels december 2014 writing zdnet technology writer mary jo foley reported microsoft developing new web browser codenamed spartan windows 10 said spartan would treated new product separate internet explorer internet explorer 11 retained alongside compatibility early january 2015 verge obtained details surrounding spartan sources close microsoft including reports would replace internet explorer desktop mobile versions windows 10 microsoft officially unveiled spartan windows 10-focused keynote january 21 2015 described separate product internet explorer final name announced spartan first made publicly available default browser windows 10 technical preview build 10049 released march 30 2015 new engine used spartan available windows 10 builds part internet explorer 11 microsoft later announced internet explorer would deprecated windows 10 would use spartan engine april 29 2015 build conference keynote announced spartan would officially known microsoft edge browser logo branding designed maintain continuity branding internet explorer project spartan branding used versions released build 2015 june 25 microsoft released version 19.10149 windows 10 mobile included new brand june 28 version 20.10158 followed desktop versions also including updated branding july 15 microsoft released version 20.10240 final release insiders version rolled consumers july 29 august 12 microsoft started preview program next version microsoft edge released version 20.10512 mobile-users 6 days later followed version 20.10525 desktop users preview received multiple updates november 5 2015 microsoft released version 25.10586 final release edge second public release desktop users november 12 update rolled desktop users xbox one users part new xbox experience update november 18 update windows 10 mobile finally november 19 update also made available part windows server 2016 technical preview 4 november 2017 microsoft released ports edge android ios apps feature integration synchronization desktop version windows 10 pcs due platform restrictions factors ports use layout engine desktop version instead use os-native webkit-based engines april 2018 edge added tab audio muting june 2018 support web authentication specifications added windows insider builds support windows hello external security tokens december 6 2018 microsoft announced intent base edge chromium source code using rendering engine google chrome enhancements developed microsoft also announced versions edge available windows 7 windows 8 macos versions updated frequent basis january 6 2019 microsoft integrated newsguard internet news trustworthiness extension beta version microsoft edge ios android april 8 2019 first chromium-based builds edge windows released public may 20 2019 first chromium-based preview builds edge macos released public marking first time 13 years microsoft browser available mac platform last time microsoft browser available mac platform microsoft internet explorer mac withdrawn january 2006 june 2019 iama post reddit edge developer stated theoretically possible linux version developed future work actually started possibility june 19 2019 microsoft made chromium-powered edge browser available windows 7 windows 8 testing early benchmarks edgehtml engine—included first beta release edge windows 10 build 10049—had drastically better javascript performance trident 7 internet explorer 11 similar performance google chrome 41 mozilla firefox 37 sunspider benchmark edge performed faster browsers benchmarks operated slower google chrome mozilla firefox opera later benchmarks conducted version included 10122 showed significant performance improvement compared ie11 edge back 10049 according microsoft benchmark result iteration edge performed better chrome firefox google octane 2.0 apple jetstream benchmark july 2015 edge scored 377 555 points html5test chrome 44 firefox 42 scored 479 434 respectively internet explorer 11 scored 312 august 2015 microsoft released windows 10 build 10532 insiders included edge 21.10532.0 beta version scored 445 555 points html5test release windows 10 build 14390 insiders july 2016 html5test score browser development version 460 555 points chrome 51 scored 497 firefox 47 scored 456 safari 9.1 scored 370 june 2016 microsoft published benchmark results prove superior power efficiency edge comparison major web browsers opera questioned accuracy provided test results opera came top independent testing pc world confirmed microsoft results however tests conducted linus sebastian contradicted microsoft results instead showing chrome best battery performance august 2015 review windows 10 dan grabham techradar microsoft edge praised performance despite feature-complete state launch andrew cunningham ars technica praised browser tremendously promising much better browser internet explorer ever criticized lack functionality launch thom holwerda osnews criticized edge august 2015 hidden url bar lack user friendliness poor design tab system utterly broken never shipped final release described browser implemented features sort cosmic joke saying infuriating n't even begin describe data august 2015 weeks release showed user uptake edge low 2 overall computer users using new browser among windows 10 users usage peaked 20 dropped 14 august 2015 october 2015 security researcher published report outlining bug edge inprivate mode causing data related visited sites still cached user profile directory theoretically making possible others determine sites visited bug gained mainstream attention early february 2016 fixed cumulative update february 9 microsoft planned switch chromium edge engine faced mixed reception move increase consistency web platform compatibility major browsers reason move attracted criticism reduces diversity overall web browser market increases influence google developer blink layout engine overall browser market microsoft ceding independently-developed browser engine
[ 513, 6657, 517, 11270, 9736, 5643, 4624, 2579, 537, 6171, 540, 9757, 1054, 3102, 7713, 9762, 8227, 8740, 10791, 9768, 1577, 9770, 10281, 7212, 559, 2101, 4661, 3639, 10808, 3643, 2108, 9275, 10812, 64, 3648, 582, 10310, 1098, 5707, 7754, ...
Validation
4,327
0
MeaningCloud:meaningcloud meaningcloud software service product enables users embed text analytics semantic processing application system previously branded textalytics meaningcloud extends concept semantic api cloud-based framework makes integration semantic processing system something close plug-and-play experience meaningcloud available saas mode on-premises advanced apis provide functionality optimized diverse applications ease use addition customization integration capabilities offer fast learning curve short time obtain results meaningcloud brand meaningcloud llc wholly owned subsidiary meaningcloud europe s.l. previously known daedalus daedalus founded 1998 jose c gonzalez colleagues spin-off artificial intelligence research lab technical university madrid
[ 1890, 4194, 7780, 8554, 2059, 5677, 847, 467 ]
Validation
4,328
3
Empire_City:_1931:empire city 1931 also known street fight shooting gallery game originally released arcades 1986 game players taking mafia 1931 new york city gunning mobsters one one versions game released family computer 1987 msx 1988 acclaim advertised release nintendo entertainment system western regions console version remained exclusive japan seibu kaihatsu eventually released follow-up game dead angle game set 1931 new york city player controls young man must avenge family members killed gang shootout period several months targets mobsters culminating mafia boss players move crosshair around screen aim shoot mobsters one time lurk around various areas including street windows arrow appears helps direct players location next mobster onscreen players set amount time find shoot enemy time running speech bubble appears counting last seconds timer timer reaches zero player shot screen pans location enemy defend button available last resort avoid shot players replenish ammo shooting hidden ammunition boxes get bonus points shooting gold bars levels cleared set number mobsters eliminated game final level player one opportunity assassinate mob boss walks front windows building final level completed game loops back beginning famicom version largely player progress restored time famicom version using password system four numbers and/or letters review computer video games said game fast moving lots action called unusual addictive game bound winner
[ 10931, 9006 ]
Test
4,329
0
Artificial_Solutions:artificial solutions artificial solutions multinational technology company develops technology enable enterprises rapidly build conversational ai systems allow users converse applications electronic devices free-format natural language using speech text touch gesture delivered teneo conversational ai development analytics platform company ’ technology allows business users developers collaborate creating conversational applications 35 languages running os device without need specialist linguistic skills company natural language solutions deployed wide range industries including automotive finance energy entertainment telecoms public sector retail travel company founded 2001 went public 2019 reverse takeover indentive ab artificial solutions listed nazdaq first north stock exchange ticker asai artificial solutions founded stockholm 2001 friends johan åhlund johan gustavsson michael söderström create interactive web assistants using combination artificial intelligence natural language processing though åhlund initially took persuading thought sounded ridiculous talking virtual agent internet company expanded development online customer service optimization products 2005 several offices throughout europe supporting development sales online virtual assistants artificial solutions placed visionary latest gartner magic quadrant crm web customer service applications 2006 artificial solutions acquired kiwilogic german software house creating virtual assistants elbot artificial solutions ’ test-bed explore psychology human-machine communication loebner prize 2008 closest contestant annual competition based turing test reach 30 threshold fooling 25 human judges change management 2010 company started focus basis technology natural language interaction launched teneo platform allows people hold humanlike intelligent conversations applications services running electronic devices 2013 artificial solutions launched indigo mobile personal assistant able operate remember context conversation across different platforms operating systems new round funding announced june 2013 9.4m used support expansion us market february 2014 artificial solutions announced teneo network knowledge patented intelligent framework enables users interact using natural language private shared public ecosystem devices also known internet things lawrence flynn remains ceo chris bushnell cfo
[ 6208 ]
None
4,330
4
Certified_Senders_Alliance:certified senders alliance certified senders alliance initiated eco german direct marketing association ddv constitutes central whitelist since 2004 csa whitelist positive list email bulk senders isps email-providers participating whitelist solicited email need enter isps spamfilter longer chances false positives legitimate email erroneously tagged spam reduced bulk email senders apply certification whitelist comply admission criteria closed-loop authentication providing masthead revocation unsubscribe functions clear identity sole technological control servers used send emails applicants submit samples services prove csa criteria implemented also pay fee applications reviewed certification committee date 100 providers participate whitelist csa cooperates eco complaints office internet users report breaches csa criteria csa frequently discloses members breached csa criteria excluded whitelist among providers joined csa whitelist aol arcor freenet host europe group microsoft vodafone kabel deutschland pironet united internet companies gmx 1 1 internet web.de well yahoo yandex year csa holds congress csa summit current legal requirements regarding email marketing discussed general data protection regulation well technical challenges trends
[ 488, 7834, 9901 ]
None
4,331
5
CompuServe:compuserve compuserve compuserve information service also known initialism cis first major commercial online service provider united states described 1994 oldest big three information services others prodigy america online dominated field 1980s remained major influence mid-1990s peak early 1990s cis known online chat system message forums covering variety topics extensive software libraries computer platforms series popular online games notably megawars iii island kesmai also known introduction gif format pictures gif exchange mechanism 1997 17 years h r block acquired cis parent announced desire sell company complex deal worked worldcom acting broker resulting cis sold aol 2015 verizon acquired aol including compuserve division 2017 verizon completed acquisition yahoo compuserve became part verizon newly formed oath inc. subsidiary compuserve founded 1969 compu-serv network inc. columbus ohio subsidiary golden united life insurance focus business customers though golden united founder harry gard sr. son-in-law jeffrey wilkins widely miscredited first president compuserve first president john r. goltz wilkins replaced goltz ceo within first year operation goltz wilkins graduate students electrical engineering university arizona early recruits university included sandy trevor inventor compuserve cb simulator chat system doug chinnock larry shelley company objectives twofold provide in-house computer processing support golden united life insurance develop independent business computer time-sharing industry renting time pdp-10 midrange computers business hours spun separate company 1975 trading nasdaq symbol cmpu concurrently company recruited executives shifted focus offering time-sharing services customers wrote applications one focused packaged applications first new executives robert tillson left service bureau corporation subsidiary control data corporation originally formed division ibm become compuserve executive vice president marketing recruited charles mccall followed jeff wilkins ceo later became ceo medical information firm hbo co. maury cox became ceo departure mccall robert massey followed cox ceo 1977 compuserve board changed company name compuserve incorporated 1979 began offering dial-up online information service consumers 1980 h r block acquired compuserve aol entry pc market 1991 marked beginning end cis aol charged 2.95 hour versus 5.00 hour compuserve aol used freely available gui-based client compusserve n't free supported subset system functionality response cis lowered hourly rates several occasions subsequently aol switched monthly subscription instead hourly rates active users aol much less expensive late 1994 compuserve offering unlimited use standard services including news sports weather ... limited electronic mail 8.95 per month new york times called probably best deal cis number users grew peaking april 1995 3 million worldwide point aol 20 million users united states alone peak 27 million due customers leaving lower-cost offerings 1997 number users leaving online services dialup internet service providers reaching climax original 1969 dial-up technology fairly simple—the local phone number cleveland example line connected time-division multiplexer connected via leased line matched multiplexer columbus connected time-sharing host system earliest buildups line terminated single machine compuserve host different numbers used reach different computers later central multiplexers columbus replaced pdp-8 minicomputers pdp-8s connected dec pdp-15 minicomputer acted switches phone number tied particular destination host finally compuserve developed packet switching network implemented dec pdp-11 minicomputers acting network nodes installed throughout us later countries interconnected time compuserve network evolved complicated multi-tiered network incorporating asynchronous transfer mode atm frame relay fr internet protocol ip x.25 technologies 1981 times explained compuserve technology one sentence compuserve offering video-text-like service permitting personal computer users retrieve software mainframe computer telephone lines new york times described international big three noted reached local phone call 700 cities compuserve also world leader commercial services one financial services group collected consolidated financial data myriad data feeds including compustat disclosure i/b/e/s well price/quote feeds major exchanges compuserve developed extensive screening reporting tools used many investment banks wall street 1979 radio shack marketed residential information service micronet home users accessed computers evening hours compuserve computers otherwise idle success prompted compuserve drop micronet name favor compuserve origin approximately concurrent source services operating early 1979 first online services micronet made popular issue 2 commodore disk user included instructions connect run micronet programs mid-1980s compuserve one largest information networking services companies largest consumer information service operated commercial branches 30 us cities selling primarily network services major corporations throughout united states consumer accounts could bought computer stores box instruction manual trial account login awareness service extremely high 1987 consumer side would 50 compuserve revenues corporate culture entrepreneurial encouraging skunkworks projects alexander sandy trevor secluded weekend writing cb simulator chat system soon became one cis popular features instead hiring employees manage forums contracted sysops received compensation based success forum boards libraries chat areas july 1980 working associated press compuserve began hosting text versions columbus dispatch new york times virginian-pilot ledger star washington post san francisco examiner san francisco chronicle los angeles times added 1981 additional newspapers followed although accessing articles newspapers made 5 compuserve traffic reading entire newspaper using method impractical text 0.20 print edition newspaper would take two six hours download cost 5 per hour 6 p.m. another major unit compuserve compuserve network services formed 1982 generate revenue selling connectivity nationwide packet network compuserve built support time-sharing service compuserve designed manufactured network processors based dec pdp-11 wrote software ran network often erroneously called x.25 network compuserve network implemented mixture standardized proprietary layers throughout network one proprietary layers called adaptive routing adaptive routing system implemented two powerful features one network operated entirely self-discovery mode new switch added network connecting neighbor via leased telephone circuit new switch discovered absorbed network without explicit configuration change network configuration needed add remove connections network would automatically reconfigure second feature implemented adaptive routing often talked network engineering circles implemented cns establishing connection paths basis real-time performance measurements one circuit became busy traffic diverted alternative paths prevent overloading poor performance users cns network based x.25 protocol network presented standard x.25 interface outside world providing dialup connectivity corporate hosts allowing compuserve form alliances private networks tymnet telenet among others gave compuserve largest selection local dial-up phone connections world era network usage charges expensive still lower long distance charges networks permitted compuserve access still locations including international locations usually substantial connect-time surcharges common early 1980s pay 30-per-hour charge connect compuserve time cost 5 6 per hour factoring connect-time surcharges resulted company nicknamed compuspend compu erve ci cns primary supplier dial-up communications credit-card authorizations 20 years competence developed long relationship visa international peak line business compuserve carried millions authorization transactions month representing several billion dollars consumer purchase transactions many businesses always-on connection extravagance dialup option made better sense today service remains operation deeply embedded within verizon see competitors remaining market company notable introducing number online services personal computer users compuserve began offering electronic mail capabilities technical support commercial customers 1978 name infoplex also pioneer real-time chat market cb simulator service introduced february 21 1980 first public commercial multi-user chat program compuserve also introduced number online games around 1981 compuserve introduced compuserve b protocol file-transfer protocol allowing users send files later expanded higher-performance b+ version intended downloads cis although b+ protocol widely supported software used default time cis b+ protocol later extended include host-micro interface hmi mechanism communicating commands transaction requests server application running mainframes hmi could used front end client software present gui-based interface cis without use error-prone cli route commands compuserve began expand reach outside united states entered international arena japan 1986 fujitsu nissho iwai developed japanese-language version compuserve called nifty-serve 1989 1993 compuserve hong kong launched joint venture hutchison telecom able acquire 50,000 customers dialup isp frenzy 1994 1995 fujitsu compuserve co-developed worldsaway interactive virtual world 2014 original world launched compuserve 1995 known dreamscape still operating late 1980s possible log compuserve via worldwide x.25 packet switching networks bridged onto compuserve existing us-based network gradually introduced direct dial-up access network many countries economical solution network expansion compuserve also extended marketing commercial services opening branches london munich compuserve first online service offer internet connectivity albeit limited access early 1989 connected proprietary e-mail service allow incoming outgoing messages exchanged internet-based e-mail addresses early 1990s compuserve hundreds thousands users visiting thousands moderated forums forerunners discussion sites web like web many forums managed independent producers administered forum recruited moderators called sysops among many hardware software companies offered customer support broadened audience primarily business users technical geek crowd migrated byte magazine apos bix online service special forums special groups many relatively large premiums premium data bases charges 7.50 time enter search request 1992 compuserve hosted first known wysiwyg e-mail content forum posts fonts colors emoticons encoded 7-bit text-based messages via third party product navcis dvorak development running dos windows 3.1 windows 95 operating systems navcis included features offline work similar offline readers used bulletin board systems allowing users connect service exchange new mail forum content largely automated fashion run complete user edited messages locally offline mode system also allowed interactive navigation system support services like chat system many services remained text based compuserve later introduced compuserve information manager cim compete directly aol unlike navigator cim tuned online work used point-and-click interface similar aols later versions interacted hosts using hmi communications protocol areas service support hmi older text-based interface could used wincim also allowed caching forum messages news articles e-mail reading posting could performed off-line without incurring hourly connect costs previously luxury navcis autosig tapcis applications power users one big advantages cis internet users could purchase services software compuserve members using compuserve account early 1990s hourly rate fell 10 hour 1.95 hour march 1992 launched online signups credit card based payments desktop application connect online check emails april 1995 compuserve topped three million members still largest online service provider launched netlauncher service providing www access capability via spry mosaic browser aol however introduced far cheaper flat-rate unlimited-time advertisement-supported price plan us compete compuserve hourly charges conjunction aol marketing campaigns caused significant loss customers compuserve responded similar plan 24.95 per month late 1997 world wide web grew popularity general public company company closed once-busy compuserve customer support forums offer customer support larger audience directly company websites area compuserve forums time could address yet introduced universal www access 1992 compuserve acquired mark cuban company microsolutions 1997 compuserve began converting forums proprietary host-micro interface hmi html web standards 1997 change discontinued text based access forums forums accessible web well thorough compuserve proprietary hmi protocol 2004 compuserve discontinued hmi converted forums web access forums remained active compuserve.com end 2017 compuserve made number acquisitions history acquired h r block compuserve special military section help veterans military brats members non-members 1994-founded military brats america mba connect later mba established bulletin board within vietnam veterans america aol portal widespread adoption internet world wide web united kingdom first national major-brands online shopping service developed uk arm compuserve/cis part proprietary closed-system collection consumer services andrew gray set compuserve uk operations european arm us company back late 1980s later became company european general manager david gilroy compuserve uk director customer services service continued grow offered technical support managed suzanne gautier sales managed colin campbell service proposed paul stanfield independent business-to-consumer electronic commerce consultant martin turner product marketing director cis uk august 1994 turner agreed project started september rapid market research product development sales online space major uk retail catalogue companies included wh smith tesco virgin/our price great universal stores/gus interflora dixons retail past times pc world retailer innovations service launched thursday 27 april 1995 paul stanfield purchase book wh smith shop repeat first formal test service 9 february 1995 included secure payment subsequent fulfilment order royal mail postal delivery interactive media retail group imrg uk industry association e-retailing believes uk first national shopping service secure online transaction purchase wh smith book compuserve centre approximately 1,000,000 uk customers access shops time british retailers first major exposure medium retailers joined service soon included sainsbury wine jaguar cars branded lifestyle goods compuserve uk commissioned writer sue schofield produce 'retail pack including new uk compuserve book free cd-rom containing cis software access service compuserve closed private network system slow react rapid development open world wide web long major uk retailers started develop web sites independently compuserve original compuserve user ids consisted seven octal digits form 7xxxx xx legacy pdp-10 architecture later eight nine octal digits form 7xxxx xxx 7xxxx xxxx finally ten octal digits form 1xxxxx xxxx generated advance issued printed snap paks 1989 compuserve users email access internet using user id form xxxxx.xxxx compuserve.com comma original id replaced period 1996 users allowed create alias internet e-mail address could also used personal web page longest-term members allowed first choice new addresses 1998 users offered option switching mailbox newer system provided pop3 access via internet internet mail program could used current compuserve email addresses look like xxxxxx cs.com users compuserve 2000 service compuserve long history offering custom portal compuserve information service airline industry beginning 1970s compuserve offered customized version service allows pilots flight attendants bid flight schedules airline compuserve offered customized solutions industries well including service called compuserve lawyers another african-american culture arts forum long largest online service provider 1987 compuserve 380,000 subscribers compared 320,000 dow jones news/retrieval 80,000 source 70,000 genie compuserve 3 million worldwide users peak compared aol 27 million early 1999 many home uses switched standard dial-up internet access compuserve slipped 2 million largely business professional users one popular use compuserve 1980s file exchange particularly pictures indeed 1985 hosted perhaps first online comic world witches stitches compuserve introduced simple black-and-white image format known rle run-length-encoding standardize images could shared among different microcomputer platforms introduction powerful machines universally supporting color compuserve introduced much capable gif format invented steve wilhite gif went become de facto standard 8-bit images internet early mid-1990s compuserve outside telecommunications attorney randy may led appeals federal communications commission fcc exempt data networks pay common carrier access charge ccac levied telephone local exchange carriers primarily baby bell companies long distance carriers primary argument data networking brand new industry country would better served exposing important new industry aberrations voice telephone economics ccac mechanism used subsidize cost local telephone service long distance revenue fcc agreed compuserve position consequence dial-up networking united states whether private networks public internet much less expensive otherwise would 1991 compuserve sued defamation one early cases testing application traditional law internet cubby v. compuserve although defamatory content posted one forums compuserve liable content unaware content exercise editorial control forum november 1993 copyright infringement lawsuit regarding 900 songs settled two years later payment divided among publishers whose songs involved 1995 compuserve blocked access sex-oriented newsgroups pressured bavarian prosecutors 1997 compuserve reopened newsfeeds felix somm former managing director compuserve germany charged violating german child pornography laws material compuserve network carrying germany first convicted november 1997 another hearing sentenced two years probation may 28 1998 cleared appeal november 17 1999 wow styled wow online service run compuserve starting march 1996 closure announced november year effective end january 1997 among promised features first internet service offered monthly 'unlimited rate 17.95 software bugs random shutdowns service loss email messages limited service small loyal fan base closed january 31 1997 several class-action lawsuits filed claiming wow sold stockholders false misleading information wow supposed make company competitive aol proprietary service aimed families novice computer users late-1995 announced wow information service supposed commence microsoft windows 95 sr2 first include internet explorer knowing bundling browser would considered anti-competitive microsoft also planned bundle installers several major isps windows compuserve software ready aol retained wow.com domain name since acquired compuserve kept dormant shutdown wow 2007 mid-2007 aol considered moving digg-style news aggregator hosted netscape.com wow.com ultimately moving propeller.com toward end year aol reportedly working using domain social networking service focused popular online role-playing game world warcraft october 2010 2015 shutdown moved subdomain joystiq wow.com domain simultaneously relaunched deal day site similar groupon however site also short-lived shutting late 2011 january 2019 wow.com search engine powered bing using back-end aol search part oath inc battle customers aol compuserve became one handing customers back forth using free hours enticements technical problems—the thousands new generation u.s. robotics dialup modems deployed network would crash high call volumes first time decades compuserve began losing money prodigious rate effort code-named red-dog initiated convert compuserve long-time pdp-10 based technologies servers based intel x86 architectures microsoft windows nt operating system parent h r block going management changes time beginning retirement ceo henry bloch series successors ensured 1997 h r block announced intention divest compuserve number potential buyers came forefront terms offered unacceptable management aol likely buyer made several offers purchase compuserve using aol stock h r block management sought cash least higher quality stock february 1998 john w. sidgmore vice chairman worldcom former ceo uunet devised complex transaction ultimately met goals parties step one worldcom purchased shares compuserve 1.2 billion wcom stock next day worldcom sold compuserve information service portion company aol retaining compuserve network services portion aol turn sold networking division advanced network services ans worldcom sidgmore said point world balance accountants taxes aol information services worldcom networks worldcom newly acquired compuserve network services renamed worldcom advanced networks continued operate discrete company within worldcom combined aol network subsidiary ans existing worldcom networking company called gridnet 1999 worldcom acquired mci became mci worldcom worldcom advanced networks briefly became mci worldcom advanced networks mci worldcom advanced networks ultimately absorbed uunet soon thereafter worldcom began spiral bankruptcy re-emerging mci 2006 mci sold verizon result organization networking business within compuserve part verizon business process splitting compuserve two major businesses compuserve information services compuserve network services worldcom aol desired make use compuserve name trademarks consequently jointly owned holding company formed purpose hold title various trademarks patents intellectual property license intellectual property cost worldcom verizon aol 2015 verizon acquired aol compuserve original properties reunited verizon september 2003 compuserve information service become division aol added compuserve basic product lines selling via netscape.com cis positioned value market-provider several million customers part aol web products group recent u.s. versions compuserve client software — essentially enhanced web browser — used gecko layout engine developed mozilla within derivative aol client using aol dialup network previous compuserve service offering re-branded compuserve classic remained available us also countries compuserve 2000 offered uk germany compuserve 2000 introduced 1999 withdrawn 2001 failure german market compuserve classic service remained compuserve germany introduced products dialup dsl internet access client software called compuserve 4.5 light january 2007 compuserve e-mail members windows vista supported suggested switching aol-branded service like many older programs however compuserve client software run windows vista compatibility mode july 2007 compuserve pacific announced cessation august 31 2007 september 2007 announced compuserve france would close operations november 30 2007 pacific region australia new zealand etc fujitsu australia ran compuserve pacific franchise 1998 35,000 customers towards end operations area thought far fewer compuserve pacific pricing plans changed since 1998 e.g. 14.95 2 hours per month july 2008 compuserve germany informed customers would close operations july 31 2008 legacy service compuserve classic would affected decision compuserve forums tightly linked compuserve channels compuserve.com currently runs slightly trimmed-down version now-defunct netscape.com web portal latter shut 2006 compuserve announced april 15 2009 compuserve classic would longer operate internet service provider would close june 30 2009 compuserve classic services including ourworld web pages taken offline date compuserve classic e-mail users would able continue using compuserve e-mail addresses via new e-mail system aol used compuserve brand compuserve 2000 rebranded low-cost offering closed 2011 including mac compuserve dialer low-cost dialup isp became web portal compuserve announced november 2017 compuserve forums would shut december 15 2017 36 years since compuserve forums begun 1981 moved forumania elsewhere time several graphical user interfaces written accessing compuserve unlike aol gave free new york times wrote compuserve ought give away among names wincim tapcis navcis time subscribers paid timed access well long distance calls countries spend time online reading replying messages goal bypass compuserve wincim interface streamline sending pre-written email forum postings user written offline receiving new messages downloading requested files logging compuserve tapcis access program compuserve information service automated ms-dos-based software application sped access management compuserve email accounts forum memberships pc users 1981 2004 advances compuserve technology rendered obsolete described archaic-looking .. remains powerful tool accessing compuserve forums tapcis written borland turbo pascal howard banner marketing executive wilmington delaware joined compuserve 1981 died melanoma june 1990 aged 44 software shareware retailed community users continued maintain website since able issue administrative commands tapcis preferred tool dozens compuserve system operators sysops regarding wincim predecessor cim pc magazine wrote give broader view available using easily navigate service explicitly caution unlike tapcis wo n't save money ... could actually take longer retrieve answer messages ... without although ozcis ozwin windows-based successor described free personal use pc magazine shareware like wincim tapcis navcis programming done steve sneed using pascal-like delphi software published ozarks west software inc. like tapcis sysop features moving deleting messages administering file libraries flagging users giving/denying sysop rights unlike offline readers tapcis navcis added proprietary ways formatting text colors fonts attributes ozwin always remained plain text never displayed custom styles may 2005 compuserve discontinued access ozcis tapcis forums compuserve autosig free unlike wincim tapcis navcis ozcis/ozwin
[ 1664, 641, 6657, 3971, 11269, 7943, 8584, 9736, 4490, 9993, 1804, 6028, 1178, 667, 6171, 8092, 8474, 8732, 8735, 7713, 8987, 9757, 10142, 10910, 10791, 3884, 10668, 9137, 9908, 4661, 3639, 4921, 314, 9019, 5054, 3137, 835, 11075, 10057, 1...
Test
4,332
2
High-Level_Shading_Language:high-level shading language high-level shader language high-level shading language hlsl proprietary shading language developed microsoft direct3d 9 api augment shader assembly language went become required shading language unified shader model direct3d 10 higher hlsl analogous glsl shading language used opengl standard similar nvidia cg shading language developed alongside hlsl shaders enable profound speed detail increases well many special effects 2d 3d computer graphics hlsl programs come six forms pixel shaders fragment glsl vertex shaders geometry shaders compute shaders tessellation shaders hull domain shaders raytracing shaders ray generation shaders intersection shaders hit/closest hit/miss shaders vertex shader executed vertex submitted application primarily responsible transforming vertex object space view space generating texture coordinates calculating lighting coefficients vertex tangent binormal normal vectors group vertices normally 3 form triangle come vertex shader output position interpolated form pixels within area process known rasterization pixels comes pixel shader whereby resultant screen colour calculated optionally application using direct3d 10/11/12 interface direct3d 10/11/12 hardware may also specify geometry shader shader takes input vertices primitive triangle/line/point uses data generate/degenerate tessellate additional primitives change type primitives sent rasterizer d3d11.3 d3d12 introduced shader model 5.1 later 6.0 gpus listed hardware first supported given specifications manufacturers generally support lower shader models drivers note games may claim require certain directx version n't necessarily require gpu confirming full specification version developers use higher directx api version target lower-direct3d-spec hardware instance directx 9 exposes features directx7-level hardware directx7 targeting fixed-function l pipeline 32 64 executed instructions means 32 texture instructions 64 arithmetic instructions
[ 8514, 936, 7978, 876, 9741, 6032, 8438, 11130, 2943 ]
Test
4,333
2
STREAMS:streams computer networking streams native framework unix system v implementing character device drivers network protocols inter-process communication framework stream chain coroutines pass messages program device driver pair programs streams originated version 8 research unix streams capitalized streams design modular architecture implementing full-duplex i/o kernel device drivers frequent uses developing terminal i/o line discipline networking subsystems system v release 4 entire terminal interface reimplemented using streams important concept streams ability push drivers custom code modules modify functionality network interface device together form stack several drivers chained together order streams based streams i/o subsystem introduced eighth edition research unix v8 dennis ritchie used terminal i/o subsystem internet protocol suite version yet called streams capitals fit new functionality existing device i/o system calls open close read write ioctl application limited terminal i/o protocols providing pipe-like i/o semantics i/o system ported system v release 3 robert israel gil mcgrath dave olander her-daw che maury bach part wider framework intended support variety transport protocols including tcp iso class 4 transport sna lu 6.2 npack protocol used rfs first released network support utilities nsu package unix system v release 3 port added putmsg getmsg poll system calls nearly equivalent purpose send recv select calls berkeley sockets putmsg getmsg system calls originally called send recv renamed avoid namespace conflict system v release 4 streams extended used terminal i/o framework pipes providing useful new functionality like bidirectional pipes file descriptor passing port unicos also produced eric s. raymond quotes ritchie saying complexity system v streams compared v8 streams streams means something different shouted concurrent system v release 3 port developed protocol-independent streams message passing guidelines link network transport layers osi model layers 2-4 due typically close implementation coupling network transport protocols given protocol stack typical practice implementing layers 5-7 outside kernel link transport layer streams service interfaces later standardized x/open conjunction transport message passing model transport layer interface later adopted x/open transport interface defined provide transport protocol-independent api application development also library supporting session presentation application layers defined later standardized open group streams required conformance single unix specification versions 1 unix 95 2 unix 98 result refusal bsd linux developers provide streams marked optional posix compliance austin group version 3 unix 03 posix.1-2008 tc1 ieee std 1003.1 2013 edition designated streams 'marked obsolescent meaning said functionality may removed future version specification however specific definition 'obsolescent used also says strictly conforming posix applications 'shall use obsolescent features version 7 unix command connected terminal keyboard screen keyboard printer mechanism called line discipline would buffer single line input i.e. wait user press return key sending input program processing allowed simple error correction streams replaced set processing modules organized linear chain allowed bidirectional communication neighboring modules programs could push new module onto one end chain change behavior terminal character device ritchie gives example chain terminal module chained datakit network module achieve remote login network aside characters bytes going program device vice versa streams could carry control messages hangup drop connection ioctl messages streams could also used inter-process communication connecting two processes pseudoterminals possibility mpx window system blit graphics terminal could display multiple terminal emulator windows window process communicated window system pseudoterminal line discipline driver installed sending typed characters receiving text graphics display control signals designated user wish switch windows close actual streams modules live kernel space unix installed pushed removed popped ioctl system call example install aforementioned line discipline file descriptor codice_1 referring terminal device one would write c perform input/output stream one either uses codice_2 codice_3 system calls regular file descriptors set streams-specific functions send control messages ritchie admitted regretting implement streams kernel rather processes felt compelled reasons efficiency later plan 9 implementation implement modules user-level processes streams mostly used system v unix world however implementations exist linux include streams functionality without third-party add-ons caldera pushed streams included linux ca 1998 support netware linux rejected outright linux kernel developers technical grounds mainly performance compatibility layers linux operating systems convert streams operations sockets early possible implementation used caldera lis company called gcom later figured legal battles caldera successor sco group linux sco claiming linux streams infringed believed copyrights system v
[ 8975, 8976, 10005, 7319, 5531, 6813, 7204, 5029, 2995, 5815, 823, 9151, 576, 7872, 10436, 2521, 8414, 6624, 6369, 9444, 5864, 636, 2045 ]
Test
4,334
3
Overclocking:overclocking computing overclocking practice increasing clock rate computer exceed certified manufacturer commonly operating voltage also increased maintain component operational stability accelerated speeds semiconductor devices operated higher frequencies voltages increase power consumption heat overclocked device may unreliable fail completely additional heat load removed power delivery components meet increased power demands many device warranties state overclocking and/or over-specification voids warranty purpose overclocking increase operating speed given component normally modern systems target overclocking increasing performance major chip subsystem main processor graphics controller components system memory ram system buses generally motherboard commonly involved trade-offs increase power consumption heat fan noise cooling targeted components components designed margin safety deal operating conditions outside manufacturer control examples ambient temperature fluctuations operating voltage overclocking techniques general aim trade safety margin setting device run higher end margin understanding temperature voltage must strictly monitored controlled user examples operating temperature would need strictly controlled increased cooling part less tolerant increased temperatures higher speeds also base operating voltage may increased compensate unexpected voltage drops strengthen signalling timing signals low-voltage excursions likely cause malfunctions higher operating speeds modern devices fairly tolerant overclocking devices finite limits generally given voltage parts maximum stable speed still operate correctly past speed device starts giving incorrect results cause malfunctions sporadic behavior system depending pc context usual result system crash subtle errors go undetected long enough time give unpleasant surprises data corruption incorrectly calculated results worse writing storage incorrectly system failing certain specific tasks general usage internet browsing word processing appear fine application wanting advanced graphics crashes system point increase operating voltage part may allow headroom increases clock speed increased voltage also significantly increase heat output point limit imposed ability supply device sufficient power user ability cool part device maximum voltage tolerance achieves destructive failure overzealous use voltage and/or inadequate cooling rapidly degrade device performance point failure extreme cases outright destroy speed gained overclocking depends largely upon applications workloads run system components overclocked user benchmarks different purposes published conversely primary goal underclocking reduce power consumption resultant heat generation device trade-offs lower clock speeds reductions performance reducing cooling requirements needed keep hardware given operational temperature knock-on benefits lowering number speed fans allow quieter operation mobile devices increase length battery life per charge manufacturers underclock components battery-powered equipment improve battery life implement systems detect device operating battery power reduce clock frequency accordingly underclocking almost always involved latter stages undervolting seeks find highest clock speed processor stably operate given voltage overclocking seeks maximize clock speed temperature power constraints underclocking seeks find highest clock speed device reliably operate fixed arbitrary power limit given device may operate correctly stock speed even undervolted case underclocking would employed reductions voltage finally destabilizes part point user would need determine last working voltage speed satisfactorily lowered power consumption needs – performance must sacrificed lower clock chosen underclock testing progressively lower voltages would continue point lower bound device fails function and/or supporting circuitry reliably communicate part underclocking undervolting would attempted desktop system operate silently home entertainment center potentially offering higher performance currently offered low-voltage processor offerings would use standard-voltage part attempt run lower voltages attempting keep desktop speeds meet acceptable performance/noise target build also attractive using standard voltage processor low voltage application avoided paying traditional price premium officially certified low voltage version however like overclocking guarantee success builder time researching given system/processor combinations especially time tedium performing many iterations stability testing need considered usefulness underclocking like overclocking determined processor offerings prices availability specific time build underclocking also sometimes used troubleshooting overclocking become accessible motherboard makers offering overclocking marketing feature mainstream product lines however practice embraced enthusiasts professional users overclocking carries risk reduced reliability accuracy damage data equipment additionally manufacturer warranties service agreements cover overclocked components incidental damages caused use overclocking still option increasing personal computing capacity thus workflow productivity professional users importance stability testing components thoroughly employing production environment overstated overclocking offers several draws overclocking enthusiasts overclocking allows testing components speeds currently offered manufacturer speeds officially offered specialized higher-priced versions product general trend computing industry new technologies tend debut high-end market first later trickle performance mainstream market high-end part differs increased clock speed enthusiast attempt overclock mainstream part simulate high-end offering give insight over-the-horizon technologies perform officially available mainstream market especially helpful users considering plan ahead purchase upgrade new feature officially released hobbyists enjoy building tuning hot-rodding systems competitive benchmarking competitions competing like-minded users high scores standardized computer benchmark suites others purchase low-cost model component given product line attempt overclock part match expensive model stock performance another approach overclocking older components attempt keep pace increasing system requirements extend useful service life older part least delay purchase new hardware solely performance reasons another rationale overclocking older equipment even overclocking stresses equipment point failure earlier little lost already depreciated would needed replaced case technically component uses timer clock synchronize internal operations overclocked efforts computer components however focus specific components processors a.k.a cpu video cards motherboard chip sets ram modern processors derive effective operating speeds multiplying base clock processor bus speed internal multiplier within processor cpu multiplier attain final speed computer processors generally overclocked manipulating cpu multiplier option available processor components also overclocked increasing base speed bus clock systems allow additional tuning clocks system clock influence bus clock speed multiplied processor allow finer adjustments final processor speed oem systems expose user adjustments needed change processor clock speed voltage precludes overclocking warranty support reasons processor installed different motherboard offering adjustments allow user change given component ultimately stop operating reliably past certain clock speed components generally show sort malfunctioning behavior indication compromised stability alerts user given speed stable always possibility component permanently fail without warning even voltages kept within pre-determined safe values maximum speed determined overclocking point first instability accepting last stable slower setting components guaranteed operate correctly rated values beyond different samples may different overclocking potential end-point given overclock determined parameters available cpu multipliers bus dividers voltages user ability manage thermal loads cooling techniques several factors individual devices semiconductor clock thermal tolerances interaction components rest system several things considered overclocking first ensure component supplied adequate power voltage sufficient operate new clock rate supplying power improper settings applying excessive voltage permanently damage component professional production environment overclocking likely used increase speed justifies cost expert support required possibly reduced reliability consequent effect maintenance contracts warranties higher power consumption faster speed required often cheaper costs considered buy faster hardware electronic circuits produce heat generated movement electric current clock frequencies digital circuits voltage applied increase heat generated components running higher performance levels also increases relationship clock frequencies thermal design power tdp linear however limit maximum frequency called wall overcome issue overclockers raise chip voltage increase overclocking potential voltage increases power consumption consequently heat generation significantly proportionally square voltage linear circuit example requires cooling avoid damaging hardware overheating addition digital circuits slow high temperatures due changes mosfet device characteristics conversely overclocker may decide decrease chip voltage overclocking process known undervolting reduce heat emissions performance remains optimal stock cooling systems designed amount power produced non-overclocked use overclocked circuits require cooling powerful fans larger heat sinks heat pipes water cooling mass shape material influence ability heatsink dissipate heat efficient heatsinks often made entirely copper high thermal conductivity expensive aluminium widely used good thermal characteristics though good copper significantly cheaper cheaper materials steel good thermal characteristics heat pipes used improve conductivity many heatsinks combine two materials achieve balance performance cost water cooling carries waste heat radiator thermoelectric cooling devices actually refrigerate using peltier effect help high thermal design power tdp processors made intel amd early twenty-first century thermoelectric cooling devices create temperature differences two plates running electric current plates method cooling highly effective generates significant heat elsewhere must carried away often convection-based heatsink water cooling system cooling methods forced convection phase transition cooling used refrigerators adapted computer use liquid nitrogen liquid helium dry ice used coolants extreme cases record-setting attempts one-off experiments rather cooling everyday system june 2006 ibm georgia institute technology jointly announced new record silicon-based chip clock rate rate transistor switched cpu clock rate 500 ghz done cooling chip using liquid helium cpu frequency world record 8.794 ghz november 2012 extreme methods generally impractical long term require refilling reservoirs vaporizing coolant condensation form chilled components moreover silicon-based junction gate field-effect transistors jfet degrade temperatures roughly eventually cease function freeze since silicon ceases semiconducting using extremely cold coolants may cause devices fail submersion cooling used cray-2 supercomputer involves sinking part computer system directly chilled liquid thermally conductive low electrical conductivity advantage technique condensation form components good submersion liquid fluorinert made 3m expensive another option mineral oil impurities water might cause conduct electricity overclocked component operates outside manufacturer recommended operating conditions may function incorrectly leading system instability another risk silent data corruption undetected errors failures might never correctly diagnosed may instead incorrectly attributed software bugs applications device drivers operating system overclocked use may permanently damage components enough cause misbehave even normal operating conditions without becoming totally unusable large-scale 2011 field study hardware faults causing system crash consumer pcs laptops showed four 20 times increase depending cpu manufacturer system crashes due cpu failure overclocked computers eight-month period general overclockers claim testing ensure overclocked system stable functioning correctly although software tools available testing hardware stability generally impossible private individual thoroughly test functionality processor achieving good fault coverage requires immense engineering effort even resources dedicated validation manufacturers faulty components even design faults always detected particular stress test verify functionality specific instruction sequence used combination data may detect faults operations example arithmetic operation may produce correct result incorrect flags flags checked error go undetected complicate matters process technologies silicon insulator soi devices display hysteresis—a circuit performance affected events past without carefully targeted tests possible particular sequence state changes work overclocked rates one situation another even voltage temperature often overclocked system passes stress tests experiences instabilities programs overclocking circles stress tests torture tests used check correct operation component workloads selected put high load component interest e.g graphically intensive application testing video cards different math-intensive applications testing general cpus popular stress tests include prime95 everest superpi occt aida64 linpack via linx intelburntest guis sisoftware sandra boinc intel thermal analysis tool memtest86 hope functional-correctness issues overclocked component show tests errors detected test component deemed stable since fault coverage important stability testing tests often run long periods time hours even days overclocked computer sometimes described using number hours stability program used prime 12 hours stable overclockability arises part due economics manufacturing processes cpus components many cases components manufactured process tested manufacture determine actual maximum ratings components marked rating chosen market needs semiconductor manufacturer manufacturing yield high higher-rated components required may produced manufacturer may mark sell higher-performing components lower-rated marketing reasons cases true maximum rating component may exceed even highest rated component sold many devices sold lower rating may behave ways higher-rated ones worst case operation higher rating may problematical notably higher clocks must always mean greater waste heat generation semiconductors set high must dump ground often cases means chief drawback overclocked part far heat dissipated maximums published manufacturer pentium architect bob colwell calls overclocking uncontrolled experiment better-than-worst-case system operation benchmarks used evaluate performance become kind sport users compete highest scores discussed stability functional correctness may compromised overclocking meaningful benchmark results depend correct execution benchmark benchmark scores may qualified stability correctness notes e.g overclocker may report score noting benchmark runs completion 1 5 times signs incorrect execution display corruption visible running benchmark widely used test stability prime95 built-in error checking fails computer unstable using benchmark scores may difficult judge difference overclocking makes overall performance computer example benchmarks test one aspect system memory bandwidth without taking consideration higher clock rates aspect improve system performance whole apart demanding applications video encoding high-demand databases scientific computing memory bandwidth typically bottleneck great increase memory bandwidth may unnoticeable user depending applications used benchmarks 3dmark attempt replicate game conditions commercial system builders component resellers sometimes overclock sell items higher profit margins seller makes money overclocking lower-priced components found operate correctly selling equipment prices appropriate higher-rated components equipment normally operate correctly practice may considered fraudulent buyer unaware overclocking sometimes offered legitimate service feature consumers manufacturer retailer tests overclocking capability processors memory video cards hardware products several video card manufactures offer factory-overclocked versions graphics accelerators complete warranty usually price intermediate standard product non-overclocked product higher performance speculated manufacturers implement overclocking prevention mechanisms cpu locking prevent users buying lower-priced items overclocking measures sometimes marketed consumer protection benefit often criticised buyers many motherboards sold advertised extensive facilities overclocking implemented hardware controlled bios settings cpu locking process permanently setting cpu clock multiplier amd cpus unlocked early editions model locked later editions nearly intel cpus locked recent models resistant unlocking prevent overclocking users amd ships unlocked cpus opteron fx ryzen black series line-up intel uses monikers extreme edition x-series intel usually one two extreme edition cpus market well x series k series cpus analogous amd black edition amd majority desktop range black edition users unlock cpus allow underclocking overclocking front side bus speed older cpus compatibility certain motherboards unlocking invalidates manufacturer warranty mistakes cripple destroy cpu locking chip clock multiplier necessarily prevent users overclocking speed front-side bus pci multiplier newer cpus still changed provide performance increase amd athlon athlon xp cpus generally unlocked connecting bridges jumper-like points top cpu conductive paint pencil lead cpu models determinable serial number require different procedures increasing front-side bus northbridge/pci clock overclock locked cpus throws many system frequencies whack since ram pci frequencies modified well one easiest ways unlock older amd athlon xp cpus called pin mod method possible unlock cpu without permanently modifying bridges user could simply put one wire new multiplier/vcore socket unlock cpu overclocking components noticeable benefit component critical path process bottleneck disk access speed internet connection limit speed process 20 increase processor speed unlikely noticed overclocking cpu benefit game limited speed graphics card graphics cards overclocked utilities achieve evga precision rivatuner amd overdrive amd cards msi afterburner zotac firestorm zotac cards peg link mode asus motherboards overclocking gpu often yield marked increase performance synthetic benchmarks usually reflected game performance sometimes possible see graphics card pushed beyond limits permanent damage done observing on-screen artifacts two discriminated warning bells widely understood green-flashing random triangles appearing screen usually correspond overheating problems gpu white flashing dots appearing randomly usually groups screen often mean card ram overheating common run one problems overclocking graphics cards symptoms time usually means card severely pushed beyond heat clock rate voltage limits seen overclocked indicate faulty card clock speed excessive without overheating artifacts different general rule usually core pushed hard black circles blobs appear screen overclocking video memory beyond limits usually results application entire operating system crashing reboot video settings reset standard values stored graphics card firmware maximum clock rate specific card known overclockers apply potentiometer graphics card manually adjust voltage invalidates warranty results much greater flexibility overclocking software graphics cards rarely able adjust voltage excessive voltage increases may destroy graphics card flashing unlocking used improve performance video card without technically overclocking flashing refers using firmware different card core compatible firmware effectively making higher model card difficult may irreversible sometimes standalone software modify firmware files found e.g nibitor geforce 6/7 series well regarded aspect without using firmware better model video card example video cards 3d accelerators two voltage clock rate settings one 2d one 3d designed operate three voltage stages third somewhere aforementioned two serving fallback card overheats middle-stage going 2d 3d operation mode therefore could wise set middle-stage prior serious overclocking specifically fallback ability card drop clock rate reducing sometimes dozen depending setting percent efficiency cool without dropping 3d mode afterwards return desired high performance clock voltage settings cards abilities directly connected overclocking example nvidia geforce 6600gt agp flavor temperature monitor used internally card invisible user standard firmware used modifying firmware display 'temperature tab unlocking refers enabling extra pipelines pixel shaders 6800le 6800gs 6800 agp models first cards benefit unlocking models either 8 12 pipes enabled share 16x6 gpu core 6800gt ultra pipelines shaders beyond specified disabled gpu may fully functional may found faults affect operation lower specification gpus found fully functional unlocked successfully although possible sure undiscovered faults worst case card may become permanently unusable overclocked processors first became commercially available 1983 amd sold overclocked version intel 8088 cpu 1984 consumers overclocking ibm version intel 80286 cpu replacing clock crystal
[ 3586, 3077, 5637, 7305, 3210, 6797, 6549, 4886, 3352, 11417, 10139, 1309, 799, 3615, 4128, 10658, 10019, 8102, 10664, 3882, 3630, 4270, 1849, 3140, 966, 1480, 10440, 8394, 2383, 7247, 3281, 2516, 2901, 10966, 10715, 2525, 8035, 1000, 8552, ...
Validation
4,335
5
FX.25_Forward_Error_Correction:fx.25 forward error correction fx.25 protocol extension ax.25 link layer protocol fx.25 provides forward error correction fec capability maintaining legacy compatibility non-fec equipment fx.25 created stensat group 2005 presented technical paper 2006 tapr digital communications conference tucson az fx.25 intended complement ax.25 protocol replace provides encapsulation mechanism alter ax.25 data functionalities error correction capability introduced bottom layer 2 osi model ax.25 link layer protocol extensively used amateur radio communications packets validated 16-bit crc discarded one errors detected many cases space-to-earth telemetry packets broadcast unidirectionally back-channel may available request retransmission errored elements consequently ax.25 links inherently intolerant errors fx.25 protocol extension provides error correction wrapper around ax.25 packet allowing removal errors receiving end data fields carefully chosen allow reception ax.25 packet data within fx.25 frame non-fec decoder composite fx.25 entity called frame distinguishing ax.25 packet contained within fx.25 frame contains following elements preamble correlation tag ax.25 packet ax.25 packet start ax.25 packet body ax.25 packet frame check sequence fcs ax.25 packet end pad bit-to-byte alignment fec check symbols postamble fec codeblock contains elements except preamble correlation tag postamble three elements exist outside correction-space fec algorithm preamble postamble blocks variable length included account delays typically found radio links transmitter key stable operation receiver squelch latency etc correlation tag gold code contains inherent error tolerance necessary provide start frame marker without requiring dependency fec capability fec frame currently implements reed solomon error correction algorithms restricted performance improvement function ax.25 packet size combined noise characteristics transmission channel initial performance testing involved transmission 61 fx.25 frames interval 15 minutes 9 frames received without errors 19 frames received correctable errors 33 frames received uncorrectable errors 15 ax.25 packets 9/61 decodable without fec capability 46 ax.25 packets 9+19 /61 decodable fec capability
[ 1192, 6152, 2306 ]
Validation
4,336
4
Joint_source_and_channel_coding:joint source channel coding information theory joint source–channel coding encoding redundant information source transmission noisy channel corresponding decoding using single code instead conventional steps source coding followed channel coding joint source–channel coding proposed implemented variety situations including speech videotransmission
[]
Test
4,337
2
List_of_computers_running_CP/M:list computers running cp/m many microcomputer makes models could run version derivation cp/m disk operating system eight-bit computers running cp/m 80 built around intel 8080/8085 zilog z80 compatible cpu cp/m 86 ran intel 8086 8088 computers suitable cp/m delivered others needed hardware modifications memory expansion modification new boot roms addition floppy disk drive popular home computers using processors supported cp/m plug-in z80 compatible processors allowing use cp/m retaining base machine keyboard peripherals sometimes video display memory following alphabetical list computers running cp/m
[ 11008, 10113, 5384, 6921, 9998, 3216, 9363, 2840, 664, 2201, 2729, 7849, 11562, 9006, 178, 4409, 7999, 4548, 7495, 10067, 10083, 5220, 1776, 2672, 3056, 9329, 2933, 4727, 11513, 6778, 1919 ]
None
4,338
2
Bliss_(image):bliss image bliss default computer wallpaper microsoft windows xp operating system unedited photograph green hill blue sky clouds los carneros american viticultural area california wine country charles o'rear made photo 1996 microsoft bought rights 2000 former national geographic photographer charles o'rear resident nearby napa valley took photo film medium-format mamiya rz67 camera way visit girlfriend 1996 widely believed later image digitally manipulated even created software adobe photoshop o'rear says never sold corbis use stock photo several years later microsoft engineers chose digitized version image licensed o'rear next decade claimed viewed photograph world time january 1996 former national geographic photographer charles o'rear way home st. helena california napa valley north san francisco visit girlfriend daphne irwin later married city every friday afternoon working irwin book wine country particularly alert photo opportunity day since storm passed recent winter rains left area especially green driving along sonoma highway california state route 12 121 saw hill free vineyards normally covered area pulled years earlier following phylloxera infestation god grass perfect green sun clouds remembered thinking stopped somewhere near napa–sonoma county line pulled road set mamiya rz67 medium-format camera tripod choosing fujifilm velvia film often used among nature photographers known saturate colors o'rear credits combination camera film success image made difference think helped 'bliss photograph stand even said think shot 35 mm would nearly effect setting camera said possible clouds picture came everything changing quickly time took four shots got back truck according o'rear image digitally enhanced manipulated way since pertinent wine-country book o'rear made available corbis stock photo available use interested party willing pay appropriate licensing fee 2000 microsoft windows xp development team contacted o'rear corbis believes used instead larger competitor getty images also based seattle former company owned microsoft founder bill gates idea looking recalls looking image peaceful looking image tension microsoft said wanted license image use xp default wallpaper buy rights offered o'rear says second-largest payment ever made photographer single image however signed confidentiality agreement disclose exact amount reported low six figures o'rear needed send microsoft original film sign paperwork however couriers delivery services became aware value shipment declined since higher insurance would cover software company bought plane ticket seattle personally delivered offices idea going go said n't think engineers anybody microsoft idea would success microsoft gave photo name made key part marketing campaign xp although o'rear manipulated image way company admitted cropping original image slightly left order better fit desktop making greens stronger photographer estimates image seen billion computers worldwide based number copies xp sold since november 2006 goldin+senneby visited site sonoma valley bliss image taken re-photographing view full grapevines pictured work microsoft first shown exhibition paris yesterday gallery la vitrine april 2007 later exhibited 300m³ gothenburg o'rear concedes despite photographs took national geographic probably remembered bliss anybody age 15 rest life remember photograph said since origins image widely known several years xp release considerable speculation landscape guesses included locations france england switzerland north otago region new zealand southeastern washington dutch users believed photograph shot ireland county kerry since image named ireland dutch release software similarly image named alentejo portuguese version leading users speaking language believe taken eponymous region portugal users speculated image real location sky came separate image spliced together hill o'rear adamant microsoft minor alterations digitized version nothing darkroom contrasting adams monolith 2012 david clark british magazine amateur photographer commented bliss nowiki /nowiki aesthetic qualities critics might argue image bland lacks point interest supporters would say evocation bright clear day beautiful landscape subject wrote notes dreamlike quality created filtered sunlight hillside distinguishing image made microsoft choose image others asked although company never told o'rear anyone else clark thought could guess attractive easy eye n't detract items might screen contributing factors may also chosen unusually inviting image verdant landscape one promotes sense wellbeing desk-bound computer users
[ 200, 7983 ]
Test
4,339
5
Network_allocation_vector:network allocation vector network allocation vector nav virtual carrier-sensing mechanism used wireless network protocols ieee 802.11 wi-fi ieee 802.16 wimax virtual carrier-sensing logical abstraction limits need physical carrier-sensing air interface order save power mac layer frame headers contain duration field specifies transmission time required frame time medium busy stations listening wireless medium read duration field set nav indicator station long must defer accessing medium nav may thought counter counts zero uniform rate counter zero virtual carrier-sensing indication medium idle nonzero indication busy medium shall determined busy station sta transmitting ieee 802.11 nav represents number microseconds sending sta intends hold medium busy maximum 32,767 microseconds sender sends request send receiver waits one sifs sending clear send sender wait one sifs sending data receiver wait sifs sending ack nav duration first sifs ending ack time medium considered busy wireless stations often battery-powered conserve power stations may enter power-saving mode station decrements nav counter becomes zero time awakened sense medium nav virtual carrier sensing mechanism prominent part csma/ca mac protocol used ieee 802.11 wlans nav used dcf pcf hcf
[ 5092, 8708 ]
Validation
4,340
4
Biometric_device:biometric device biometric device security identification authentication device devices use automated methods verifying recognising identity living person based physiological behavioral characteristic characteristics include fingerprints facial images iris voice recognition biometric devices used man long period time non-automated biometric devices used us since 500 bc seen babylonian business transactions recorded clay tablets included fingerprints automation biometric devices first seen 1960s federal bureau investigation fbi 1960s introduced indentimat started checking fingerprints maintain criminal records first systems measured shape hand length fingers although discontinued 1980s system set precedent future biometric devices characteristic human body used access information users according characteristics sub-divided groups biometrics used establish better accessible records hours employee work increase buddy punching case employees clocked coworkers fraudulently inflated work hours employers looked towards new technology like fingerprint recognition reduce fraud additionally employers also faced task proper collection data entry exit times biometric devices make largely foul proof reliable ways enabling collect data employees present enter biometric details unique demand air travel grows people travel modern day airports implement technology way long queues biometrics implemented airports enable quick recognition passengers hence lead lower volume people standing queue one example dubai international airport plans make immigration counters relic past implement iris move technology iom help seamless departures arrivals passengers airport fingerprint sensors found mobile devices fingerprint sensor used unlock device authorize actions like money file transfers example used prevent device used unauthorized person one highly recognised acceptable biometrics corporate surroundings verification taken one step capturing signature taking account many parameters revolving around like pressure applied signing speed hand movement angle made surface pen used make signature system also ability learn users signature styles vary user hence taking sample data system able increase accuracy iris recognition involves device scanning retina subject cross referencing data stored database one secure forms authentication fingerprints left behind surfaces iris prints extremely hard stolen iris recognition widely applied organisations dealing masses one aadhaar identification carried government india keep records population reason iris recognition makes use iris prints humans hardly evolve one lifetime extremely stable biometric spoofing method fooling biometric identification management system counterfeit mold presented front biometric scanner counterfeit mold emulates unique biometric attributes individual confuse system artifact real biological target gain access sensitive data/materials one high-profile case biometric spoofing came limelight found german defence minister ursula von der leyen fingerprint successfully replicated chaos computer club group used high quality camera lenses shot images 6 feet away used professional finger software mapped contours ministers thumbprint although progress made stop spoofing using principle pulse oximetry- liveliness test subject taken account measure blood oxygenation heart rate reduces attacks like ones mentioned although methods n't commercially applicable costs implementation high reduces real world application hence makes biometrics insecure methods commercially viable accuracy major issue biometric recognition passwords still extremely popular password static nature biometric data subject change one voice becoming heavier due puberty accident face could lead improper reading facial scan data testing voice recognition substitute pin-based systems barclays reported voice recognition system 95 percent accurate statistic means many customers voices might still recognised even correct uncertanity revolving around system could lead slower adoption biometric devices continuing reliance traditional password-based methods researchers targeting drawbacks present-day biometric devices developing reduce problems like biometric spoofing inaccurate intake data technologies developed are-
[ 651, 2901, 8735 ]
Test
4,341
9
Modula-3:modula-3 modula-3 programming language conceived successor upgraded version modula-2 known modula-2+ influential research circles influencing designs languages java c python adopted widely industry designed luca cardelli james donahue lucille glassman mick jordan olivetti software technology laboratory bill kalsow greg nelson digital equipment corporation dec systems research center src olivetti research center orc late 1980s modula-3 main features simplicity safety preserving power systems-programming language modula-3 aimed continue pascal tradition type safety introducing new constructs practical real-world programming particular modula-3 added support generic programming similar templates multithreading exception handling garbage collection object-oriented programming partial revelation explicit mark unsafe code design goal modula-3 language implements important features modern imperative languages quite basic forms thus allegedly dangerous complicating features multiple inheritance operator overloading omitted modula-3 project started november 1986 maurice wilkes wrote niklaus wirth ideas new version modula wilkes working dec prior point returned england joined olivetti research strategy board wirth already moved oberon problems wilkes team continuing development modula name language definition completed august 1988 updated version january 1989 compilers dec olivetti soon followed 3rd party implementations design heavily influenced work modula-2+ language use src acorn computers research center arc later orc olivetti bought acorn time language operating system dec firefly multiprocessor vax workstation written acorn compiler acorn c modula execution library camel arc arx operating system project arm based acorn archimedes range computers written revised modula-3 report states language influenced languages mesa cedar object pascal oberon euclid 1990s modula-3 gained considerable currency teaching language never widely adopted industrial use contributing may demise dec key modula-3 supporter especially ceased maintain effectively dec sold compaq 1998 case spite modula-3 simplicity power appears little demand procedural compiled language restricted implementation object-oriented programming time commercial compiler called cm3 maintained one chief implementors prior dec src hired dec sold compaq integrated development environment called reactor extensible java virtual machine licensed binary source formats buildable reactor offered critical mass inc. company ceased active operations 2000 gave sources products software solutions gmbh modula-3 taught universities mostly comparative programming language courses textbooks print essentially corporate supporter modula-3 software solutions gmbh inherited sources critical mass since made several releases cm3 system source binary form reactor ide open source released several years new name cm3-ide march 2002 also took repository another active modula-3 distribution pm3 maintained école polytechnique de montréal later continued work hm3 improved years later obsoleted common example language syntax hello world program programs modula-3 least module file also include interface file used clients access data module like languages modula-3 program must export main module either file named main.m3 file call codice_1 export main module module file names suggested actual module name compiler warn different conventions syntax include naming exported type interface codice_2 since types usually qualified full names type codice_2 inside module named foo named codice_4 aids readability another similar convention naming public object codice_5 oop examples first foremost compilation units either codice_6 implementation codice_7s one flavor another interface compilation unit beginning keyword codice_6 defines constants types variables exceptions procedures implementation module beginning keyword codice_7 provides actual code constants types variables needed implement interface default implementation module implement interface name module may explicitly codice_1 module name example main program exports implementation module main interface compilation unit may codice_11 interfaces although circular imports forbidden may resolved import implementation module entities within imported module may imported instead module name using codice_12 syntax typically one imports interface uses 'dot notation access items within interface similar accessing fields within record typical usage define one data structure record object per interface along support procedures main type get name 't one uses codice_13 event name collision imported module entity within module reserved word codice_14 used codice_15 capability deemed unsafe compiler longer guarantee results consistent example interfacing c programming language keyword codice_16 prefixed front codice_6 codice_7 may used tell compiler enable certain low level features language example unsafe operation bypassing type system using codice_19 copy bits integer floating point codice_20 number interface imports unsafe module must unsafe safe interface may exported unsafe implementation module typical usage interfacing external libraries two interfaces built one unsafe safe generic interface corresponding generic module prefix codice_6 codice_7 keyword codice_23 take formal arguments interfaces thus like c++ templates one easily define use abstract data types unlike c++ granularity module level interface passed generic interface implementation modules actual arguments compiler generate concrete modules example one could define genericstack instantiate interfaces codice_24 codice_25 even interfaces objects long interfaces defines properties required generic modules note bare types codice_26 codice_20 ca n't used modules system generics based upon using modules arguments comparison c++ template bare type would used file integerelem.i3 file genericstack.ig file genericstack.mg file integerstack.i3 file integerstack.m3 identifier traced back originated unlike 'include feature languages compilation unit must import identifiers compilation units using codice_11 statement even enumerations make use 'dot notation used accessing field record modula-3 supports allocation data runtime two kinds memory allocated codice_29 codice_30 difference whether garbage collector see new used allocate data either classes memory codice_16 module codice_32 available free untraced memory object-oriented programming techniques may used modula-3 use required many features provided modula-3 modules generics usually take place object orientation object support intentionally kept simplest terms object type termed class object oriented languages introduced codice_33 declaration essentially syntax codice_34 declaration although object type reference type whereas records modula-3 similar structs c exported types usually named convention create separate public type expose methods data instance defines interface codice_35 two types codice_2 codice_5 defined object two methods codice_38 codice_39 codice_2 defined subtype codice_5 use codice_42 operator create new codice_43 object use built procedure codice_44 method codice_39 modula-3 codice_46 construct provides conceptually simple clean yet powerful mechanism hiding implementation details clients arbitrarily many levels friendliness use codice_46 show full implementation codice_35 interface note use codice_49 keyword brands objects make unique avoid structural equivalence codice_49 also take string argument omitted unique string generated modula-3 one programming languages requires external references module strictly qualified reference module codice_51 object codice_52 exported module codice_53 must take form codice_54 possible modula-3 import exported names module language requirements name qualification method overriding impossible break working program simply adding new declarations interface interface makes possible large programs edited concurrently many programmers without worries naming conflicts also makes possible edit core language libraries firm knowledge existing programs broken process exception handling based codice_55 ... codice_56 block system since become common one feature adopted languages notable exceptions delphi python scala visual basic.net codice_56 construct defined form switch statement possible exception case except clause modula-3 also supports codice_58 ... codice_59 ... codice_60 construct loops codice_59 occurs structure equivalent simple loop inside codice_55 ... codice_56 clause language supports use multi-threading synchronization threads standard module within runtime library m3core named thread supports use multi-threaded applications fact modula-3 runtime may make use separate thread internal tasks garbage collection built-in data structure codice_64 used synchronize multiple threads protect data structures simultaneous access possible corruption race conditions codice_65 corresponding codice_66 statements lock unlock codice_64 codice_64 object objects may derived example i/o section libm3 library readers writers rd.t wr.t derived mutex lock accessing modifying internal data buffers summary language features modula-3 one rare languages whose evolution features documented systems programming modula-3 four essential points language design intensively discussed topics structural vs. name equivalence subtyping rules generic modules parameter modes like codice_69 continuing trend started c programming language many features required write real programs left language definition instead provided via number standard libraries interfaces described detail standard libraries providing following features called standard interfaces required must provided language recommended interfaces implemented available implementations required c i/o also provided via libraries modula-3 called codice_72 codice_73 object-oriented design rd wr readers writers respectively libraries covered detail book greg nelson interesting aspect modula-3 one programming languages whose standard libraries formally verified contain various types bugs including locking bugs done auspices larch/modula-3 see larch family extended static checking projects dec systems research center several compilers available open source since aspect c data structures missing modula-3 union type existing modula-3 implementations able provide good binary compatibility c language type declarations arrays structs none books still print although used copies obtainable digitized partially digitized chapters one previous posterior versions obtainable research reports web although modula-3 gain mainstream status several parts dec-src m3 distribution arguably influential part network objects library formed basis java first rmi implementation including actual network protocol sun moved corba standard iiop based protocol dropped java documentation garbage collection remote objects still refer pioneering work done modula-3 network objects python implementation classes also inspired class mechanism found c++ modula-3
[ 512, 2304, 1145, 9345, 11010, 9224, 2830, 6414, 8082, 11411, 7067, 3613, 6558, 5663, 1952, 1572, 428, 5677, 7983, 9008, 2481, 7479, 8510, 9535, 323, 963, 8262, 3144, 8524, 11219, 11604, 10075, 7775, 9441, 4069, 11625, 8554, 5612, 9964, 10...
Test
4,342
4
DRDO_NETRA:drdo netra netra network traffic analysis software network developed india centre artificial intelligence robotics cair defence research development organisation drdo laboratory used intelligence bureau india domestic intelligence agency research analysis wing raw country external intelligence agency intercept analyse internet traffic using pre-defined filters program tested smaller scales various national security agencies reported deployed nationwide soon january 2014 security agencies looking build system could monitor internet traffic real time basis due rapidly escalating threat posed terrorist criminal elements using data communication brought service providers like blackberry skype gmail focus law enforcement agencies two systems designed one drdo centre artificial intelligence robotics national technical research organisation ntro india technical intelligence agency inter-ministerial committee staffed members ministry home affairs intelligence bureau department telecom department national investigation agency formed evaluate systems select one internet monitoring system ntro system designed help paladion international private company netra designed team 40 scientists cair committee selected cair netra multiple issues ntro system serious security reservations involvement international private company sensitive project doubts ntro ability operate maintain upgrade system independently also raw tested ntro system happy ntro solution reported crashed frequently committee favoured netra indigenous solution involving government scientists personnel component solution outsourced outside agency agency testing netra ib also pleased performance committee observed cair continuously investing r keep fast-changing web technologies unlike ntro system first demonstrated premises sify technologies capture entire internet traffic passing probes netra analyse voice traffic passing software skype google talk intercept messages keywords 'attack 'bomb 'blast 'kill real-time enormous number tweets status updates emails instant messaging transcripts internet calls blogs forums even images generated internet obtain desired intelligence system raw analyses large amount international data crosses internet networks india three security agencies include ib raw allotted maximum 300 gigabytes gb per node totaling 1000 nodes storing intercepted internet traffic 1000 nodes x 300gb 300,000gb total space initially decided set extra 100 gb per node assigned remaining law enforcement agencies internet scanning coordination centre use system monitor internet similar ones used usa uk china iran many nations initially raw current user monitoring system 2013 ministry home affairs recommended use second netra system domestic law enforcement agencies done intelligence gathered external intelligence agency largely irrelevant use law enforcement agencies could handle data note department telecommunications dot stated system provide access multiple security agencies netra deployment discussed 2013 apex inter-ministerial group headed dot included representative cabinet secretariat ministry home affairs drdo cair intelligence bureau c-dot computer emergency response team cert-in drdo scientist dr. g. athithan cair team awarded 'agni award excellence self-reliance 2008 developing netra team comprised scientists indian institute science g.ravindra rahul m. kharge
[ 2208, 6344 ]
Train
4,343
3
Zenji_(video_game):zenji video game zenji puzzle game designed matthew hubbard published activision 1984 released atari 5200 atari 8-bit family colecovision commodore 64 msx zx spectrum hubbard previously wrote dolphin atari 2600 zenji maze-based game wherein player controls disembodied mandarin-style head challenge connect series randomly rotated maze-segments attempt align glowing artifact known source acts maze focal point player moves segment maze attempts rotate portion source green light shine region signifying correct alignment portions maze connected successfully end timer player awarded points moves next stage successive mazes introduce greater complexity hazards player survival conclusion review commodore 64 edition zenji author compute gazette stated although final understanding source remains elusive zenji undeniably enjoyable game note last paragraph review also stated zenji appears multiplayer game ... 8 acolytes time ... documentation concerning however
[ 9006 ]
None
4,344
4
Form_grabbing:form grabbing form grabbing form malware works retrieving authorization log-in credentials web data form passed internet secure server allows malware avoid https encryption method effective keylogger software acquire user ’ credentials even input using virtual keyboard auto-fill copy paste sort information based variable names email account name password additionally form grabber log url title website data gathered method invented 2003 developer variant trojan horse called downloader.barbew attempts download backdoor.barbew internet bring local system execution however popularized well known type malware attack emergence infamous banking trojan zeus 2007 zeus used steal banking information man-in-the-browser keystroke logging form grabbing like zeus barbew trojan initially spammed large numbers individuals e-mails masquerading big-name banking companies form grabbing method first advanced iterations zeus allowed module detect grabbed form data also determine useful information taken later versions form grabber also privy website actual data submitted leaving sensitive information vulnerable trojan known tinba tiny banker trojan built form grabbing able steal online banking credentials first discovered 2012 another program called weyland-yutani bot first software designed attack macos platform work firefox web injects templates weyland-yutani bot different existing ones zeus spyeye another known version british airways breach september 2018 british airways ’ case organizations ’ servers appeared compromised directly attackers modifying one javascript files modernizr javascript library version 2.6.2 include pii/credit card logging script would grab payment information send information server controlled attacker hosted “ baways com ” domain ssl certificate issued “ comodo ” certificate authority british airways mobile application also loads webpage built css javascript components main website including malicious script installed magecart thus payments made using british airways mobile app also affected due recent increase keylogging form grabbing antivirus companies adding additional protection counter efforts key-loggers prevent collecting passwords efforts taken different forms varying antivirus companies safepay password manager others counter form grabbing users privileges become limited would prevent installing browser helper objects bhos form grabbing software administrators create list malicious servers firewalls
[ 3072, 6786, 5764, 7044, 10245, 10756, 9227, 9356, 9102, 7441, 8978, 4863, 4883, 4245, 278, 9233, 10392, 1690, 3867, 9242, 10141, 5281, 9761, 2213, 8998, 9256, 2857, 939, 300, 3629, 9771, 1970, 4023, 10297, 3643, 6588, 7739, 9791, 1088, 33...
Validation
4,345
2
MacTCP:mactcp mactcp standard tcp/ip implementation classic mac os version 7.5.1 first application-independent implementation tcp stack non-unix platform predates winsock 5 years released 1988 considered obsolete reliability issues incomplete features sometimes prevent operating properly modern internet addition api unique mac os least one developer released berkeley sockets-derived api make porting platforms easier originally substantial purchase carrying 2,500 price tag site license additional 2,500 fee commercial use price lowered mid-1990s sold 60 mactcp included free mac os system 7.5 rising popularity internet made necessity apple replaced 1995 open transport improved interface user configuration although mactcp remained use older systems due generally lower system requirements
[ 576, 5601, 5864, 6377, 942, 1807, 5492 ]
Test
4,346
4
McAfee_Institute:mcafee institute mcafee institute llc. best known professional certification body administers several board certifications intelligence investigative sectors topics available training include cryptocurrency investigations cyber intelligence investigations counterintelligence human trafficking workplace violence active shooter organized retail crime leadership incident response digital forensics fraud deception detection founded 2010 mcafee institute professional certification training organization focused intelligence investigative sectors 2018 mcafee institute grown offer several industry recognized board certifications governing board mcafee institute oversees certification affairs organization contributes global standards certifications helps institute policy actions membership meetings ballot governing board consists world best federal local state law enforcement intelligence loss prevention cyber security private investigation around globe mcafee institute partnered dept homeland securities national initiative cybersecurity careers studies niccs listed site provider professional certifications space mcafee institute also partner recognized ileeta international law enforcement educators trainers association mcafee institute certified operate missouri dept education proprietary school central focus proprietary school certification program consumer protection accomplished establishment standards school operation monitoring operations ensure students treated fair equitable manner receive education training consistent published objectives instructional programs school mcafee institute cpe sponsor national registry cpe sponsors program offered national association state boards accountancy nasba recognize cpe program sponsors provide continuing professional education cpe programs accordance nationally recognized standards mcafee institutes resident based in-person certification training programs approved veterans administration g.i bill benefits effective november 12 2018 mcafee institute exams approved reimbursement va eligible limit number exams may take number times may take exam va pay exams even fail mcafee institute programs approved post continuing education credits following post missouri peace officer standards training clee mcafee institute headquartered chesterfield missouri teaching faculty organized three different levels independent certified instructors adjunct instructors senior instructors led director training certification michael simmons institute provides following certifications retired credentials 2018
[]
None
4,347
1
Garant:garant garant complex services based legal information resource developed « garant-service-universitet » scientific-production enterprise limited liability company first large-scale commercial legal information system russia since 1990 containing legislation russian federation also english language garant comprehensive fully cross-referenced legal information resource following elements garant system – legal information database updated daily providing quick precise searches complex analysis legal situation keeping abreast changes legislation online format prime – daily individualised information feed contains legal news hundreds thousands commentaries legal acts court practice enables creating overviews changes legislation legal consulting – access unique body knowledge experts legal consulting solutions tens thousands real practical situations option receiving individual written consultations all-russia satellite online-seminars – interactive participation seminars given authoritative specialists moscow broadcast towns cities throughout russia incorporating possibility getting answers questions asked system electronic express – service providing electronic digital signatures participation electronic trading state municipal procurement initiatives garant vesti garant news – colour publication succinctly informing users important changes legislation interesting court practice new developments field legal information provision effective applications work legal information professional journals – « aktualnaya bukhgalteria » « current bookkeeping » pertinent reliable information bookkeepers « zakonadatelstvo » « legislation » authoritative legal analysis lawyers consultations efficient use system – assistance specialists plus clearly arranged resource materials allowing quick easy retrieval analysis information professional-user certificates also obtainable www.garant.ru legal portal – source timely legal information legislation news just-released documents consultations internet conferences senior state officials dialogue popular trade forum service – assistance solving technical questions working garant legal information resource hot-line dedicated personal managers present garant system contains 30 million documents acts official bodies including laws presidential decrees codes rules regulations court practice materials constantly updated interactive encyclopedias library trade press articles books commentaries legislation official bookkeeping statistical accounting forms economic legal terms explanatory dictionaries six european languages economic reference information business enquiries bookkeeping calendar contact details official bodies etc. system presents legislation 85 regions russian federation also included directory medicines medicine manufacturers garant system primarily intended bookkeepers accountants lawyers managers banking employees specialists including foreign ones whose job duties include solving issues legal character new documents appear electronic garant legal enquiry system l.e.s database direct contracts federal regional governmental bodies every day garant l.e.s gets updated approximately ten thousand documents « garant-maximum russia » electronic texts correspond exactly official texts undergo careful legal processing respective commentaries references schemes hypertext links applied accurately consistently garant l.e.s provides different types information searches main type search « basic search » one line created specially working legal information internet connection available « legal information online » function allows one get access shell system services « legal information support hotline » « legal consulting » user sends question gets answer back expert directly system « time machine » function enables searching texts documents effect particular moment time past « document checking » function allows track histories changes documents « similar documents » function lets one instantly create list documents court practice questions answers theme similar given document « version comparison » function compares two versions document example version latest amendments previous version « news online » function allows loading online within system shell legal news information « online meeting » function provides users network version exchange instant messages like internet messengers incorporate hypertext links documents system system fully integrated internet free-of-charge internet version containing main regulatory documents russia fuller internet version accessible commercial basis « mobile garant online » gives access legal information system convenient flash memory stick internet connection available allows working legal information is/was current given moment time document applicability check function also possibility working internet version system higher patent chamber federal service intellectual property patents trademarks rospatent recognized garant well-known trademark russian federation since january 1 1998 quality management system developer complies iso 9001-2008 standard delivery installation garant legal information resource handled 250 partner organisations 500 towns cities russia
[ 1632, 6797, 7983, 2901, 11350, 823 ]
None
4,348
4
Laptop_theft:laptop theft laptop theft significant threat users laptop netbook computers many methods protect data prevent theft developed including alarms laptop locks visual deterrents stickers labels victims laptop theft lose hardware software essential data backed thieves also may access sensitive data personal information systems authorize access based credentials stored laptop including mac addresses web cookies cryptographic keys stored passwords according fbi losses due laptop theft totaled 3.5 million 2005 computer security institute/fbi computer crime security survey found average theft laptop cost company 31,975 study surveying 329 private public organizations published intel 2010 7.1 employee laptops lost stolen end usefulness lifespan furthermore determined average total negative economic impact stolen laptop 49,256—primarily due compromised data efforts retroactively protect organizations people potential consequences compromised data total cost lost laptops organizations involved study estimated 2.1 billion 48b lost u.s. economy result data breaches 28 resulted stolen laptops portable devices 2011 bureau brief prepared nsw bureau crime statistics research reported thefts laptops increase last 10 years attributed part increase ownership also attractive proposition thieves opportunists 2001 2,907 laptops stolen new south wales dwellings 2010 risen 6,492 second cash items taken thieves bureau reports one four break-ins 2010 resulted laptop stolen startling trend burglaries lends increase identity theft fraud due personal financial information commonly found laptops statistics take account unreported losses figures could arguably much higher businesses much lose unencrypted poorly secured laptop misappropriated yet many adequately assess risk take appropriate action loss sensitive company information significant risk businesses measures taken adequately protect data survey conducted multiple countries suggested employees often careless deliberately circumvent security procedures leads loss laptop according survey employees likely lose laptop travelling hotels airports rental cars conference events behling wood examined issue laptop security theft survey employees southern new england highlighted security measures fundamentally basic training employees security measures limited inadequate concluded trends laptop thefts needed monitored assess intervention measures required passwords longer adequate protect laptops many solutions improve strength laptop protection full disk encryption fde increasingly popular cost-effective approach full disk encryption taken software-based approach hardware-based approach end-based approach fde provides protection operating system starts pre-boot authentication however precautions still need taken cold boot attacks number tools available commercial open source enable user circumvent passwords windows mac os x linux one example truecrypt allows users create virtual encrypted disk computer passwords provide basic security measure files stored laptop though combined disk encryption software reliably protect data unauthorized access remote laptop security rls available confidently secure data even laptop owner possession remote laptop security owner laptop deny access rights stolen laptop computer internet access number computer security measures emerged aim protecting data kensington security slot along locking cable provides physical security thefts opportunity cord attached something heavy moved locked case laptop 100 secure noble security lock slot different way attach security cable stop security plates stoplock kits offer additional physical security measures along secure online registry 24/7 toll-free recovery hotline service another possible approach limiting consequences laptop theft issue thin client devices field employees instead conventional laptops data reside server therefore may less liable loss compromise thin client lost stolen easily inexpensively replaced however thin client depends network access server available aboard airliners location without network access approach coupled strong authentication single sign-on sso 2006 laptop custody data analyst stolen contained personal health data 26.5 million active duty troops veterans agency estimated cost 100 million 500 million prevent cover possible losses data theft 2007 united states department veterans affairs agreed pay 20 million current former military personnel settle class action lawsuit 2007 financial services authority fsa fined uk ’ largest building society nationwide £980,000 inadequate procedures employees ’ laptop stolen domestic burglary laptop details 11 million customers ’ names account numbers whilst device password protected information unencrypted fsa noted systems controls fell short given took nationwide three weeks take steps investigate content missing laptop substantial fine invoked reinforce fsa ’ commitment reducing financial crime 2010 va reported theft laptop unidentified contractor computer contained personally identifiable information 644 veterans including data va medical centers records learning unencrypted laptop va investigated many va contractors might complying encryption requirement learned 578 vendors refused sign new contract clauses required encrypt veteran data computers apparent violation rules lojack laptops compiled list top ten places laptops stolen provide context ponemon institute released study indicates 600,000 laptops lost stolen us airports every year 65-69 remaining unclaimed
[ 3552, 1251, 612, 3366, 4262, 11368, 7024, 2737, 5681, 4435, 3572, 7411, 7794, 2558, 9791 ]
None
4,349
5
TCP_Wrappers:tcp wrappers tcp wrappers also known tcp_wrappers host-based networking acl system used filter network access internet protocol servers unix-like operating systems linux bsd allows host subnetwork ip addresses names and/or ident query replies used tokens filter access control purposes original code written wietse venema 1990 monitor cracker activities unix workstations department math computer science eindhoven university technology maintained 1995 june 1 2001 released bsd-style license tarball includes library named libwrap implements actual functionality initially services spawned connection super-server inetd got wrapped utilizing tcpd program however common network service daemons today linked libwrap directly used daemons operate without spawned super-server single process handles multiple connections otherwise first connection attempt would get checked acls compared host access control directives often found daemons configuration files tcp wrappers benefit runtime acl reconfiguration i.e. services n't reloaded restarted generic approach network administration makes easy use anti-worm scripts denyhosts fail2ban add expire client-blocking rules excessive connections and/or many failed login attempts encountered originally written protect tcp udp accepting services examples usage filter certain icmp packets exist 'pingd – userspace ping request responder january 1999 distribution package eindhoven university technology primary distribution site day replaced modified version replacement contained trojaned version software would allow intruder access server installed author spotted within hours upon relocated primary distribution personal site
[ 3717, 6664, 5397, 11413, 5402, 5531, 11293, 8224, 10016, 4772, 3750, 10924, 6189, 8877, 7983, 2737, 823, 5433, 2747, 9151, 2884, 7364, 5468, 9320, 5357, 2804, 5492, 8692, 2041 ]
Test
4,350
0
Statistical_parsing:statistical parsing statistical parsing group parsing methods within natural language processing methods common associate grammar rules probability grammar rules traditionally viewed computational linguistics defining valid sentences language within mindset idea associating rule probability provides relative frequency given grammar rule deduction probability complete parse sentence probability associated grammar rule may induced application grammar rule within parse tree computation probability parse tree based component rules form deduction using concept statistical parsers make use procedure search space candidate parses computation candidate probability derive probable parse sentence viterbi algorithm one popular method searching probable parse search context application search algorithms artificial intelligence example think sentence hold water reader would instantly see object called object performing action 'can i.e able thing object able hold thing object able hold water using linguistic terminology noun phrase composed determiner followed noun hold water verb phrase composed verb followed verb phrase interpretation sentence certainly perfectly valid noun-phrase referring type dance hold water also valid verb-phrase although coerced meaning combined sentence non-obvious lack meaning seen problem linguists discussion point see colorless green ideas sleep furiously pragmatic point view desirable obtain first interpretation rather second statistical parsers achieve ranking interpretations based probability number methods statistical parsing algorithms frequently use algorithms use give good overview general field statistical parsing algorithms based modified form chart parsing modifications necessary support extremely large number grammatical rules therefore search space essentially involve applying classical artificial intelligence algorithms traditionally exhaustive search examples optimisations searching likely subset search space stack search optimising search probability baum-welch algorithm discarding parses similar treated separately viterbi algorithm
[ 1890, 7780, 9288, 2831, 1490, 11318, 5399 ]
None
4,351
7
TreadMarks:treadmarks treadmarks distributed shared memory system created rice university 1990s
[ 2264 ]
None
4,352
1
Realm_(database):realm database realm open source object database management system initially mobile android/ios also available platforms xamarin react native others including desktop applications windows licensed apache license 2016 september realm mobile platform announced followed first stable release january 2017 allows two-way synchronization realm object server client side databases belong given logged-in user developer commercial edition released along business license integrating database management systems postgresql april 24th 2019 realm announced entered definitive agreement acquired mongodb realm development began end 2010 alexander stigsen along bjarne christiansen name tightdb company started 2011 combinator promoted nosql configurable durability ability share groups data across multiple processes also even multiple devices clusters tightdb renamed product realm september 2014 released public testing march 2015 funding 20 million disclosed realm mentioned trade press including firms ibm realm announced version 1.0 june 2016 released platform real-time two-way synchronization beta 2016 september release 2017 january provided nodejs sdk server-side applications may 2017 uwp support announced notable features realm following realm developed mostly open-source github source code language-specific bindings core database available aspects realm related sync feature however proprietary closed-source
[ 3462, 10470, 3881, 8201, 5677, 8539, 7292 ]
None
4,353
2
InstantGo:instantgo instantgo formerly connected standby microsoft specification windows 8 hardware software aims bring smartphone-type power management capabilities pc platform well increasing physical security specification describes microsoft proprietary standard windows 8 software hardware developers hardware vendors optionally comply meet user requirements devices able turned instantly mode also allows operating system continue performing background tasks updating content apps devices must able turn less 500 milliseconds hardware requirements extend battery life systems must drain 5 battery capacity idle 16-hour period requires following additional security-specific requirements example memory soldered motherboard prevent cold boot attack vectors involve removing memory machine well support secure boot windows 8.1 supporting instantgo trusted platform module tpm 2.0 chip allow device use passive device encryption system systems support specification incapable booting legacy bios operating systems pcs connected standby also manually enter sleep hibernate power states
[ 7106, 2416, 4505, 7354, 10079 ]
Validation
4,354
9
Programming_domain:programming domain programming domain defines specific kind use programming language examples programming domains
[ 9345, 7780, 8262, 9926, 9780, 987 ]
Test
4,355
2
Nitix:nitix nitix properly pronounced /nitiks/ retail linux distribution produced canada software developed net integration technologies inc. acquired ibm january 2008 currently operates ibm lotus foundations nitix originally named weaver first created september 1997 linux-based server required little configuration primarily built pre-configured hardware platforms named net integrators nitix first became standalone operating system capable deployment third-party hardware january 2004 programming earliest versions weaver done primarily avery pennarun dave coombs students university waterloo nitix claimed linux-based os autonomic features june 2004 ibm press released new book autonomic computing mentions nitix nitix one first companies deliver promise autonomic technology complete set intelligent networking solutions smb market june 2005 nitix virtual server released allowed hosting applications system architecture application services nitix allowed applications run virtual server environment completely separated controlled os environment virtual server rpm based filesystem incorporates yellow dog updater modified application retrieval tool simultaneously net integration technologies began sponsoring ready nitix program encouraged independent software vendors certify applications nitix also june 2005 nitix began support ns3 scalable services structure allows centralized user management across multiple servers well dns propagation march 2007 nitixblue released new flavor nitix nitixblue supports nearly hands-free installation ibm lotus domino touting administrative headaches complete automation maintenance tasks considered large step small medium businesses previously realistic stepping stone towards enterprise-level functionality provided ibm lotus domino january 2008 ibm announced acquire net integration technologies functions separate entity lotus software group nitix includes automated installation process installs onto hard disks performs proper partitioning system setup process also performs network scan determines whether enable dhcp server finds gateway internet access automatically configures firewall modifications installation process keyboard monitor attached server changes made console modifications made web interface web interface designed access needed configuration modifications cases interface set users teams file access email collaboration exchangeit antivirus antispam web sites ftp rsync services nfs samba appletalk nitix offers multi-layer security protection based anti-virus technology kaspersky anti-spam technology vircom engate nitix claim fame proprietary intelligent disk backup idb automatically backs files emails databases incrementally often every 15 minutes backups made hard drive located system rotated provide off-site redundancy restoring files done individually user entire system web-based interface u.s. patent 7,165,154 nitix includes many open source applications provide lot functionality january 18 2008 ibm announced intention purchase net integrations technologies ibm merged products offering known ibm lotus foundations lotus foundations offered software-only application server platform well hardware appliance known net integrator july 2 2008 ibm officially started offering lotus foundations opposed nitix blue ibm lotus foundations products withdrawn marketing march 14 2013 longer available purchase support ibm lotus foundations products withdrawn september 30 2014 nitix discontinued favour ibm lotus foundations start nitix currently sold distribution channel either software-only net integrator software-only versions nitix sb nitix se nitix pe come 1 cd geared towards partners complement third party hardware systems nitix differences number client access licenses included software assurance prices nitix also pre-configured hardware systems named micro micro 2 mark mark ii hardware selection depends number hard drives form factor nitix discontinued sale distribution channels favor latest lotus foundations start support active value added resellers purchase lotus foundations resell end users part complete solution usually involving services custom made applications
[ 8837, 7435, 10127, 2321, 5397, 4887, 10394, 673, 3745, 10530, 9253, 10149, 11305, 7854, 8622, 2738, 2996, 4790, 439, 56, 59, 7483, 3903, 4673, 7364, 2375, 2887, 4039, 8907, 2005, 1110, 9693, 2914, 485, 3685, 9064, 4841, 5482, 6890, 7020, ...
None
4,356
4
Microsoft_Digital_Crimes_Unit:microsoft digital crimes unit microsoft digital crimes unit dcu microsoft sponsored team international legal internet security experts employing latest tools technologies stop interfere cyber crime cyber threats microsoft digital crimes unit assembled 2008 shortly 2013 cybercrime center dcu opened redmond washington 100 members dcu stationed redmond washington original cybercrime center members dcu include lawyers data scientists investigators forensic analysts engineers dcu international offices located major cities beijing berlin bogota delhi dublin hong kong sydney washington d.c dcu main focuses child protection copyright infringement malware crimes dcu must work closely law enforcement ensure perpetrators punished full extent law dcu taken many major botnets citadel rustock zeus around world malware cost users 113 billion dcu jobs shut accordance law three areas dcu concentrates trespass chattel legal term microsoft digital crimes unit takes cyber criminals chattel old english cattle considered valuable property owner essentially meaning property land referred chattel cattle spam malware infects user computer network considered trespass chattel trespassing user property cybercrime criminal trespassed user computer network responsible spam malware intended harm user dcu legal team pursue cyber criminal court using old legal doctrines laws charge crime trespassing botnet network compromised computer zombies controlled without user knowledge usually used repetitive tasks spam also used distributing malware distributed denial service ddos attacks botnets controlled single criminal network criminals microsoft digital crimes unit constantly hunting botnet networks used tasks dcu dealt botnets spamming key-logging data ransom dcu also taken botnets citadel rustock zeus everyday fight dcu continue locate new threats botnets take march 18th 2011 microsoft digital crimes unit took rustock botnet rustock botnet responsible half spam worldwide sent users controlled 1 million computers spam viruses attached emails phishing emails microsoft help u.s marshals got warrants seize identified local command-and-control servers analysis dcu u.s. marshals raided servers located chicago columbus dallas denver kansas city scranton seattle dcu seized servers terminated entire world large decrease spam since spam rustock botnet march 25th 2012 microsoft digital crimes unit took zeus botnet investigation also known operation b71 zeus botnet responsible stealing 100 million 13 million infected computers botnet installed user computer pirated versions windows hidden download online zeus botnet works waiting user computer open web browser attempt banking online shopping show similar looking webpage field enter login information login information sent zeus server criminal access user accounts dcu accompanied u.s marshals shut botnet raiding two command-and-control server facilities located scranton pennsylvania lombard illinois dcu made case prosecute 39 unnamed cyber criminals responsible botnet accessing servers retrieving stolen data botnet shut starter code since sold black market make variations botnet citadel many therefore zeus botnet code still active evolved june 6th 2013 microsoft digital crimes unit took citadel botnet 1000 servers citadel botnet infected estimated 5 million computers using key-logging program steal information citadel responsible stealing least 500 million online personal bank accounts 80 countries stole banks american express bank america paypal hsbc royal bank canada wells fargo citadel code emerged cybercrime kit known zeus sold starter code black market thousands creators citadel unknown dcu prepared large amount charges prosecute dcu since helped users update systems get rid malware may still computers inactive december 5 2013 microsoft digital crimes unit fbi europol industry partners attempted disrupt zeroaccess botnet although efforts took 18 hosts part zeroaccess command control network peer-to-peer nature botnet zeroaccess remains active
[ 259, 11524, 6150, 6797, 782, 1935, 8978, 4883, 10900, 3605, 11030, 3224, 11549, 7838, 7456, 929, 5666, 3875, 6265, 7970, 11559, 1832, 6441, 6827, 7215, 3890, 11060, 8757, 7359, 8640, 4289, 194, 3527, 9033, 2508, 6476, 10957, 4816, 4945, 4...
Validation
4,357
3
Knightmare_(1986_video_game):knightmare 1986 video game knightmare short 1986 msx vertical scrolling shooter computer game player knight popolon fight way several levels defeat hudnos rescue aphrodite knightmare innovative upward-scrolling shoot 'em game msx system released game cartridge top-view graphics considered sophisticated time similar msx games nemesis penguin adventure konami also released slightly altered version could bought links network japanese internet replacement 80 version could submit high scores online server
[ 8193, 1763, 10695, 4524, 9006, 10576, 6449, 10931, 1626, 8027 ]
None
4,358
9
Patrick_Naughton:patrick naughton patrick naughton american software developer one creators java programming language 1983 naughton co-wrote macpaint clone painter apprentice russ nelson sun microsystems engineer patrick naughton become frustrated state sun c++ c apis application programming interfaces tools considering moving next naughton offered chance work new technology thus stealth project started stealth project soon renamed green project james gosling mike sheridan joining naughton together engineers began work small office sand hill road menlo park california attempting develop new technology programming next generation smart appliances sun expected major new opportunity june july 1994 three days brainstorming john gage director science sun james gosling bill joy naughton wayne rosing eric schmidt team re-targeted platform world wide web felt advent first graphical web browser mosaic internet way evolving highly interactive medium envisioned cable tv prototype naughton wrote small browser webrunner later renamed hotjava 1994 naughton quit sun starwave property paul allen develop server java applications web sites author java handbook osborne 1995 co-author java complete reference herbert schildt osborne 1996 1998 walt disney internet group acquired starwave amalgamated infoseek go network company result naughton became executive vice president infoseek arrest 1999 naughton fired infoseek sept. 14 1999 naughton flew seattle los angeles private disney jet expecting five-foot blonde haired 13-year-old girl wait pier near roller coaster carrying green backpack instructed naughton naughton written love sex wanted get alone hotel room nowiki /nowiki nowiki /nowiki strip naked naughton arranged meeting posing hot seattle online predator handle online chat room called dad daughtersex girl actually fbi agent two days later arrested fbi charged traveling interstate commerce intent sex minor violation 18 u.s.c §2423 b trial ended hung jury naughton struck plea agreement took reduced sentence admitted traveled seattle los angeles last september dominant purpose engage sexual acts krisla online chat buddy believed 13-year-old girl ended serving prison time exchange working fbi free year line defense claimed persuaded participate online ritualized sexual role-playing exercise dealing mature woman acting girl then-novel defense became known fantasy defense pedophiles
[ 3712, 7176, 910, 10526, 1316, 5031, 5677, 6067, 9011, 6074, 10683, 572, 7485, 10684, 5567, 3519, 9665, 7750, 6860, 3920, 10193, 1363, 4960, 1250, 2658, 5987, 3560, 3561, 3562, 7146, 7806, 5872, 8825, 9078, 119, 3705, 2045, 3966, 6143 ]
Test
4,359
5
Sinec_H1:sinec h1 sinec h1 industrial ethernet communications protocol provides transport layer function widely used automation process control applications protocol developed siemens used mainly control applications large bandwidth well suited transmission large volumes data used part control infrastructure cern lhc
[ 2030, 11267, 2117, 62 ]
Test
4,360
2
Criticism_of_Linux:criticism linux criticism linux focuses issues concerning use operating systems use linux kernel linux-based android operating system dominates smartphone market many countries linux used new york stock exchange supercomputers used desktop laptop computers much criticism linux related lack desktop laptop adoption although 2015 growing unease project perspective security adoption systemd controversial security professionals say rise prominence operating system-level virtualization using linux raised profile attacks kernel linus torvalds reticent add mitigations kernel-level attacks official releases linux 4.12 released 2017 enabled kaslr default effectiveness debated con kolivas former kernel developer tried optimize kernel scheduler interactive desktop use finally dropped support patches due lack appreciation development 2007 interview quit kernel developer con kolivas stated linuxcon 2009 linux creator linus torvalds said linux kernel become bloated huge linuxcon 2014 linux creator linus torvalds said thinks bloat situation better modern pcs lot faster interview german newspaper zeit online november 2011 linus torvalds stated linux become complex concerned developers would able find way software anymore complained even subsystems become complex told publication afraid day error evaluated anymore andrew morton one linux kernel lead developers explains many bugs identified linux never fixed theo de raadt founder openbsd compares openbsd development process linux critics linux desktop frequently argued lack top-selling video games platform holds adoption back september 2015 steam gaming service 1,500 games available linux compared 2,323 games mac 6,500 windows games desktop operating system linux criticized number fronts including another common complaint levelled linux abundance distributions available august 2014 distrowatch lists 285 major distributions linux advocates defended number example freedom choice critics cite large number cause confusion lack standardization linux operating systems alexander wolfe wrote informationweek caitlyn martin linuxdevcenter critical number linux distributions recent decades since established dominance microsoft windows hardware developers often reluctant provide full technical documentation products allow drivers written meant linux user carefully hand pick hardware made system ensure functionality compatibility problems largely addressed one time linux systems required removable media floppy discs cd-roms manually mounted could accessed mounting media automatic nearly distributions development udev companies emperorlinux addressed problems laptop hardware compatibility mating modified linux distributions specially selected hardware ensure compatibility delivery traditional directory structure heritage linux unix roots 1970s criticized inappropriate desktop end users linux distributions like gobolinux moonos proposed alternative hierarchies argued easier end users though achieved little acceptance 2004 microsoft initiated get facts marketing campaign specifically criticized linux server usage particular claimed vulnerabilities windows fewer number linux distributions windows reliable secure linux total cost ownership linux higher due complexity acquisition costs support costs use linux places burden liability businesses linux vendors provide little indemnification coverage addition corporation published various studies attempt prove – factuality heavily disputed different authors claim microsoft comparisons flawed many linux distributors offer indemnification customers internal microsoft reports halloween documents leak presented conflicting views particularly documents 1998 1999 ceded linux ... trusted mission critical applications – due open source code – long term credibility exceeds many competitive oss advanced win32 gui user would short learning cycle become productive linux long term simple experiments indicate linux chance desktop market ... overall respondents felt compelling reason support oss 'offers low total cost ownership tco linux community mixed responses criticisms mentioned criticism led new features better user-friendliness linux community whole reputation resistant criticism writing pc world keir thomas noted time world linux tends anti-critical anybody community dares critical get stomped upon 2015 interview linus torvalds also mentioned tendency linux desktop environment projects blame users instead case criticism
[ 2560, 4616, 3082, 5644, 5139, 9237, 10780, 4637, 10785, 3618, 6180, 9257, 1584, 8242, 9266, 4161, 10817, 8772, 6213, 8268, 589, 593, 2134, 6743, 3162, 1632, 2658, 10338, 6244, 5222, 10856, 6763, 4207, 5244, 4734, 11391, 7812, 8326, 7821, ...
None
4,361
3
Juno_First:juno first juno first ported commodore 64 atari 8-bit family greg hiscott published datasoft 1983 1984 respectively juno first presents set number enemies per level make gallery formation like galaga space invaders instead player ship move forward backward addition left right hunt enemies orientation vertical horizon-oriented tilt style gameplay would re-used later konami shooter axelay player destroys waves enemies finish levels starting formations vary stage stage addition player pick humanoid upon screen red tint happens every enemy player shoots earn player 200 points previous enemy destroyed original score shooting enemy humanoid mode depends stage unofficial hobbyist port—with name original—was made available atari 2600
[ 11522, 3075, 9006, 1776, 4759 ]
Train
4,362
8
Load_Shedding:load shedding load shedding technique used information systems especially web services avoid overloading system making unavailable users idea ignore requests rather crashing system making fail serve request considerations shaping design load shedding algorithms include popular open-source tool defending delays downstream systems finagle
[]
Test
4,363
7
SAP_Business_ByDesign:sap business bydesign sap business bydesign byd cloud enterprise resource planning software cloud erp sold operated software service sap se designed small 20 mio revenue medium-sized enterprises =350 mio revenue software designed provide business processes across application areas financials human resources embedded business analytics mobility e-learning support sap business bydesign built principles service oriented architecture soa integration business capabilities accomplished via messages underlying technology stack multi-tenancy enabled sap netweaver stack leveraging sap in-memory hana database bydesign deployed 144 countries supports 12 languages including simplified chinese japanese korean polish hebrew sap delivers 39 countries either fully localized pre-localized 118 countries sap offers basic tax content addition customers partners create custom country versions using localization toolkit provided sap examples 72 localizations customers partners taiwan malaysia vietnam chile peru sap business bydesign processes grouped application areas interlinked so-called business scenarios scenarios provide business processes span across companies partners departments employees main application areas core business scenarios sap announced sap business bydesign 19 september 2007 event new york previously known code name a1s since initial general available release 2007 so-called feature pack 1.2 enhanced quarterly releases
[ 4194, 467, 4197, 5210 ]
None
4,364
2
Nintendo_DSi_system_software:nintendo dsi system software nintendo dsi system software set updatable firmware versions software frontend nintendo dsi including xl variant video game console updates downloaded via system internet connection allow nintendo add remove features software updates also include changes previous updates user interface nintendo dsi redesigned nintendo ds nintendo ds lite dsi user interface slideable single row icons moving programs fairly snappy icons big enough new touchscreen allow navigation using fingers instead built-in stylus users load dsi first time system snaps shot faces faces fill entire top screen whenever main menu main menu take picture time pressing shoulder buttons camera used also selected within programs power button doubles home button bringing back main screen soft reset nintendo dsi provides built-in applications initially users able access following programs main menu dsi camera dsi sound dsi shop pictochat download play dsi menu akin channel interface nintendo wii new programs downloaded added interface dsi camera application snap shots sorts zany real-time filters users put photos squish heads however subject low resolution actual cameras 0.3mp additionally program recognize shots users taken digital cameras editing dsi sound application thematically similar dsi camera serving sound recorder editor along low bitrate aac music player notable features like excitebike starfox-themed equalizers modulators make user voice sound like robot parakeet dsi shop would serve ds version wii shop channel unlike nintendo previous handheld consoles nintendo ds nintendo ds lite nintendo dsi built music playback support dsi music program split two modes voice recording music playback offer plenty entertainment value tools gimmicks nintendo included recording mode lets users record 18 clips maximum 10 seconds length recorded clip play around various ways example users make clip play backwards forwards isolate small sections using a-b repeat modify speed tone dragging pointer around 2d graph also apply 12 effects clip used transform sound music playback mode also many play options song loaded users change speed tone like recording mode also overlay recordings made recording mode songs point addition nintendo provided set sound effects selected quickly using stylus inserted freely using shoulder buttons unlike built-in dsi camera application would read files generated dsi dsi music application restriction comes files directory structure files stored multi-level directory structure root directory sd card dsi parsed instantly displayed internal directories quick access playback users access features forwarding rewinding volume controls nintendo presumably envisioned dsi music substitute real music player however important drawback ds music application support popular mp3 format instead player supports aac format .mp4 .m4a .3gp filename extensions furthermore compared sony playstation portable difficult interface dsi pc usb port system order transfer music podcasts users need remove sd card plug directly pc one major updates nintendo dsi brings nintendo ds line full network connectivity unlike original nintendo ds nintendo ds lite featured minimal network connectivity download content firmware updates core dsi experience similar wii sony playstation portable consoles example users first power system click dsi shop icon main menu immediately prompted run firmware update nintendo dsi supports wep wpa aes/tkip wpa2 aes/tkip wireless encryption software built-in support use latter two encryption types supported ds ds lite dsi shop application users purchase various dsiware titles cute music blocky interface somewhat similar counterpart wii users permanently login club nintendo account track purchase rewards main shopping interface also lets users add dsi points read dsi shop manual firmware updates dsi shopping experience quite similar wii although big problem dsi shopping slow speed furthermore like previous nintendo ds ds lite nintendo dsi includes web browser version opera browser support html5 canvas object css opacity however limitations features web surfing either platforms whole good experience addition slow download speeds browser difficulty rendering pages example many pages would load completely compatible movie files music files adobe flash multimedia content sites like youtube nintendo dsi collection games applications specifically designed nintendo dsi handheld game console available download via dsi shop known dsiware since games applications specifically targeted nintendo dsi compatible original nintendo ds nintendo ds lite consoles nintendo dsi nintendo first region-locked handheld prevents using certain software released another region unlike original nintendo ds models member nintendo ds line nintendo dsi backward compatible original nintendo ds games cartridge software compatible previous models including original ds games internet browsing photo sharing region-locked later successor nintendo 3ds consoles also adopted approach result nintendo dsi 3ds-specific games locked certain region original ds games still region-free addition dsiware dsi-exclusive although later also run 3ds also dsi-enhanced games containing dsi-exclusive features still played earlier nintendo ds models original ds games run dsi dsi backward compatible game boy advance gba games original ds games require gba slot since dsi lacks slot unlike ds ds lite absence dsi also backward compatible accessories requiring gba slot nintendo ds rumble pak homebrew flash cards designed previous ds models incompatible dsi new cards capable running ds software even dsiware dsi available users transfer purchased dsiware nintendo dsi consoles units dsiware transferred nintendo 3ds although saved data like nintendo dsi nintendo 3ds backward compatible nintendo ds nintendo dsi software list major system updates nintendo dsi gaming platforms nintendo gaming platforms next generation gaming platforms generation
[ 6276, 9477, 11271, 8584, 10761, 3089, 10393, 6301, 5406, 4383, 673, 3626, 1067, 684, 4908, 7727, 7857, 7991, 9784, 1083, 5824, 7492, 11079, 9033, 2001, 2259, 7253, 6486, 10329, 3162, 10332, 607, 10080, 2658, 10215, 3561, 6763, 6508, 2925, ...
Validation
4,365
2
Nokia_PC_Suite:nokia pc suite nokia pc suite software package used establish interface nokia mobile devices computers run microsoft windows operating system first release 1997 originally called nokia data suite replaced nokia suite integrated ovi service suite nokia pc suite used transfer music photos applications also used send short message service sms messages act modem connect computer internet mobile phone connected usb bluetooth infrared older nokia phones lack compatibility later versions pc suite official site supplies table matches phone model recent compatible version latest version nokia pc suite also contains several integrated applications including file manager application installer nokia communication centre data viewer pc suite users also access on-device features e.g battery memory call handling well nokia pc sync functionality earliest devices worked nokia data suite nokia 3110 nokia 6110 nokia 8110 nokia pc suite unimproved replaced nokia next generation phone suite software nokia suite supported platforms addition windows nokia suite drops lotus notes client sync support present nokia pc suite instead requiring user use lotus notes traveler software must installed maintained lotus notes server synchronization using pc suite works phone user pc synchronization phone nokia suite must use third party software backup feature pc suite uses non-documented binary file format .nbu used restore phone proprietary client means data accessed restore working phone third-party programs either commercial free used read file greatly vary amount information retrieve nokia pc sync allows user synchronize contacts calendar notes to-do items e-mails bookmarks files/folders supported nokia mobile phone pc sync 7.0.9.2 contained major bug truncating street addresses edited pc run one line synchronized back phone possible lose large parts contacts address information due issue nokia pc suite unable add update maps voices nokia maps application requires nokia map loader nokia suite require microsoft windows .net framework installed however possible download maps nokia maps without need nokia map loader nokia suite pointing web browser directly map files nokia maps server
[ 737, 7399, 6505, 6797, 9262, 7983, 2449, 1972, 5211, 2684, 6748 ]
Test
4,366
4
BitArmor:bitarmor bitarmor systems inc. firm based gateway center downtown pittsburgh pennsylvania founded 2003 two carnegie mellon university alumni bitarmor sold software-based encryption data management technologies company mainly focused industries required protection sensitive data retail education health care bitarmor primary product bitarmor datacontrol software solution combined full disk encryption persistent file encryption technology company completed 5 million round venture capital funding may 2009 bitarmor used venture capital fund development efforts expand marketing sales time round financing bitarmor employed 35 people bitarmor acquired trustwave january 2010 order strengthen latter pci services
[ 7794, 6309, 3382 ]
Test
4,367
2
Matthew_Garrett:matthew garrett matthew garrett technologist programmer free software activist major contributor series free software projects including linux gnome debian ubuntu red hat recipient free software award free software foundation work secure boot uefi linux kernel garrett states born galway ireland phd genetics university cambridge author several articles drosophila melanogaster i.e. fruit fly genetics garrett contributor gnome debian linux projects early contributor ubuntu initial member ubuntu technical board worked contractor canonical ltd. worked red hat canonical ltd. red hat garrett worked power management linux red hat garrett also worked issues relating secure boot uefi linux kernel preserve users ability run operating system choosing hardware supporting secure boot work eventually led awarded 2013 fsf free software award garrett worked cloud computing platform company coreos cited press expert cloud computing issues since 28 january 2017 working google recipient free software award free software foundation work secure boot uefi linux kernel garrett strong advocate software freedom compliance gnu general public license gpl linux kernel example garrett filed complaint us customs fusion garage due violations gpl october 2014 garrett stated blog would longer contribute linux kernel changes relating intel hardware response intel pulling ads gamasutra gamergate controversy however intel took steps demonstrate commitment diversity way appreciated edited post reflect happy resume working
[ 1026, 516, 3082, 5644, 5139, 2581, 10780, 10785, 6691, 6180, 8240, 8242, 9266, 5689, 11322, 2109, 6213, 10822, 8263, 8268, 589, 4177, 8787, 4194, 5222, 10856, 7793, 3189, 4734, 7812, 4238, 10382, 8848, 657, 2195, 2711, 6808, 9882, 1694, 6...
Test
4,368
2
CFQ:cfq completely fair queuing cfq i/o scheduler linux kernel written 2003 jens axboe cfq places synchronous requests submitted processes number per-process queues allocates timeslices queues access disk length time slice number requests queue allowed submit depends i/o priority given process asynchronous requests processes batched together fewer queues one per priority cfq explicit anticipatory i/o scheduling achieves effect good aggregate throughput system whole allowing process queue idle end synchronous i/o thereby anticipating close i/o process considered natural extension granting i/o time slices process february 2003 andrea arcangeli put forward idea stochastic fair queueing i/o scheduler jens axboe implemented jens axboe made improvements first implementation calling new version completely fair queueing scheduler produced patch apply 2.5.60 development series kernel cfq i/o scheduler first integrated mainline kernel optional i/o scheduler possible change scheduler boot time 'elevator parameter kernel red hat enterprise linux 4 used i/o scheduler default even though used kernel based 2.6.9 second release cfq scheduler dubbed cfqv2 included 2.6.10 improvements include better responsiveness elimination starvation issues present earlier version scheduler also switchable run time modifying /sys/block/ block_device /queue/scheduler variable sysfs filesystem cfq scheduler moved new time sliced design dubbed cfqv3 among things implements ioprio_get 2 ioprio_set 2 allows user set per-process i/o priorities usually using ionice 1 command although using nice 1 also modifies i/o priorities somewhat cfq became default scheduler replacing anticipatory scheduler
[ 6438, 318, 4423 ]
None
4,369
4
Netcat:netcat netcat often abbreviated nc computer networking utility reading writing network connections using tcp udp command designed dependable back-end used directly easily driven programs scripts time feature-rich network debugging investigation tool since produce almost kind connection user could need number built-in capabilities list features includes port scanning transferring files port listening used backdoor original netcat features include rewrites like gnu openbsd support additional features example openbsd nc supports tls nc mail.server.net 25 full response including http headers dumped standard output file accessed via web browser nowiki http //servername:8080/ /nowiki netcat serves file first client connects exits also provides content length browsers expect work fine lan may potentially fail kind firewall between. versions netcat like netcat-traditional debian 8.6 need specify -p port number nc -vzu 192.168.0.1 nowiki 80-90 /nowiki note udp tests always show open test useful shell access server tested know whether firewall blocking specific udp port server listening host i.e server whose port needs checked following sending host following – note codice_1 hostname listening host text typed sending host type something hit enter displayed also listening host udp port 4172 open open get error connection refused caveat machines ipv6 may default ip version use codice_2 thus host specified hostname contacted using ipv6 user might know ports may appear closed test even though would open using ipv4 difficult notice may cause false impression port blocked actually open force use ipv4 using adding codice_3 options codice_4 commands echo 0 message nc -w 1 -u loggerhost 514 uncommon use codice_2 port scanning netcat considered best tool job sufficient advanced tool nmap codice_6 parameter prevents dns lookup codice_7 makes codice_4 receive data server codice_9 makes connection timeout 1 second inactivity another useful behaviour using codice_2 proxy ports hosts redirected look example port 12345 represents request starts codice_4 server port 12345 connections get redirected codice_12 web browser makes request codice_4 request sent google response sent web browser pipes unidirectional worked around named pipe redirect input output codice_14 option may also used codice_15 implementation using named pipe reliable method using codice_14 option provides one-shot proxy another useful feature proxy ssl connections way traffic viewed wire sniffing applications wireshark accomplished unixes utilizing codice_17 codice_2 codice_19 codice_2 used make process network server listen port pipe input receives process codice_21 option spawns executable input output redirected via network socket example possible expose bourne shell process remote computers computer ip address 192.168.1.2 run command computer network one could run codice_4 command way codice_21 option used create rudimentary backdoor administrators perceive risk thus allow codice_2 computer ncat similar tool netcat provided nmap suite ncat n't built code “ traditional ” netcat implementation ncat definitely based netcat spirit functionality codice_29 user host1 ncat -l 9899 outputfile user host2 ncat host1 9899 inputfile user host1 ncat -l 9899 inputfile user host2 ncat host1 9899 outputfile suppose ssh tunnel want copy file remote machine could codice_32 directly opens another connection goal re-use existing connection use netcat ssh add codice_33 port forwarding sending everything port 31000 remote machine port local machine extra overhead tcp takes care error correction ssh already encrypted pipe original version netcat unix program last version 1.10 released march 1996 several implementations posix systems including rewrites scratch like gnu netcat openbsd netcat latter supports ipv6 tls openbsd version ported freebsd base windows/cygwin mac os x comes netcat installed osx 10.13 users use macports install variant dos version netcat called ntool included freedos package group networking based wattcp stack licensed european union public licence version 1.1 known ports embedded systems includes versions windows ce named netcat 4 wince iphone busybox includes default lightweight version netcat solaris 11 includes netcat implementation based openbsd netcat socat complex variant netcat larger flexible options must configured given task february 1 2016 santiago zanella-beguelin microsoft vulnerability research issued security advisory regarding composite diffie-hellman parameter hard-coded openssl implementation socat implausibility composite might unintentionally introduced prime number required led suspicion sabotage introduce backdoor software vulnerability socat bug affected version 1.7.3.0 2.0.0-b8 corrected following releases 1.7.3.1 2.0.0-b9 cryptcat version netcat integrated transport encryption capabilities middle 2005 nmap announced another netcat incarnation called ncat features new possibilities connection brokering tcp/udp redirection socks4 client server support ability chain ncat processes http connect proxying proxy chaining ssl connect/listen support ip address/connection filtering like nmap ncat cross-platform systems modified versions similar netcat utilities go command name codice_4 codice_15 codice_38 codice_39 codice_40 codice_41 codice_42
[ 9217, 515, 516, 9732, 9733, 9735, 3976, 9868, 6797, 4750, 9487, 5397, 2198, 11413, 6812, 292, 7847, 10924, 4398, 7983, 2739, 8499, 823, 1336, 7356, 321, 965, 842, 3659, 8522, 3539, 9946, 5468, 5469, 5470, 6877, 8414, 6498, 6120, 9320, 1...
Test
4,370
5
Structured_Stream_Transport:structured stream transport computer networking structured stream transport sst experimental transport protocol provides ordered reliable byte stream abstraction similar tcp enhances optimizes stream management permit applications use streams much fine-grained fashion feasible tcp streams
[ 10924, 4095 ]
Test
4,371
4
Spanish_Cybersecurity_Research_Conference:spanish cybersecurity research conference spanish cybersecurity research conference spanish jornadas nacionales de investigación en ciberseguridad jnic scientific congress works meeting point different actors working field cybersecurity research universities technological research centres companies public authorities exchange knowledge experience shared goal strengthening research cybersecurity field national level need run kind conferences identified drafting summary report feasibility study design network centers excellence r cybersecurity consensus participants strategic plan spanish network excellence cybersecurity research included measure 17 creation national cybsersecurity r d+i conferences intended scientific meeting point network excellence particular research ecosystem general could demonstrate capacities terms knowledge talent terms research findings potential transference market equally measure 12 study proposed design open call proposals mechanisms evaluate select candidates order grant awards acknowledgement research excellence edition conferences organised institution selected according procedure laid regulation jnic organising committee named based regulations established jnic general chair committee representative organising institution responsible event spanish national cybersecurity institute incibe mission support research cybersecurity strengthening cybersecurity sector participates organization conference aim converting jnic scientific forum excellence national cybersecurity field promotes innovation first time 2017 edition complete technological transfer program designed instrument bring final users companies organisms etc contact researchers order solve cybersecurity problems currently unresolved formulated scientific challenges good reception success participation new initiative challengers research teams expected program continue grow transfer track part jnic future editions
[]
Test
4,372
7
IQNavigator:iqnavigator iqnavigator provides services procurement solutions vendor management system vms managed services offerings 2010 iqnavigator recognized leading services procurement software vendor forrester research inc. forrester wave™ services procurement q3 2010 september 2010 forrester indicated iqnavigator provides all-around excellent solution privately funded iqnavigator inc founded april 1999 focuses helping companies achieve competitive advantage talent management company headquarters denver colorado london england along satellite locations throughout europe asia iqnavigator vendor management system saas platform accessed 100 countries daily iqnavigator clients manage billions spend contingent labor outside services iqnavigator offers ability create custom report fields including customer defined fields reports either run real-time scheduled run predefined bases weekly monthly etc. iqnavigator offers variety mobile computing features including time entry approvals sourcing real-time access statistics interactive reports data views features available blackberry iphone ipad android devices
[ 4194, 467 ]
None
4,373
4
Nessus_(software):nessus software nessus proprietary vulnerability scanner developed tenable inc. nasdaq tenb examples vulnerabilities exposures nessus scan include nessus scans cover wide range technologies including operating systems network devices hypervisors databases web servers critical infrastructure results scan reported various formats plain text xml html latex results also saved knowledge base debugging unix scanning automated use command-line client exist many different commercial free open source tools unix windows manage individual distributed nessus scanners nessus provides additional functionality beyond testing known network vulnerabilities instance use windows credentials examine patch levels computers running windows operating system nessus also support configuration compliance audits scada audits pci compliance nessus project started renaud deraison 1998 provide internet community free remote security scanner october 5 2005 tenable network security company renaud deraison co-founded changed nessus 3 proprietary closed source license nessus 2 engine minority plugins still gpl leading forked open source projects based nessus like openvas porz-wahn today product still exists two formats limited free version full-feature paid subscription option nessus available linux windows mac os x. tenable inc. went public july 26 2018 twenty years nessus ’ creation
[ 7557, 11, 6797, 6548, 1429, 3486, 2084, 4654, 3503, 7983, 2739, 5045, 7989, 7228, 842, 1232, 6993, 1491, 8791, 479, 2409, 5612 ]
Test
4,374
4
Malwarebytes_(software):malwarebytes software malwarebytes formerly malwarebytes anti-malware abbreviated mbam anti-malware software microsoft windows macos android ios finds removes malware made malwarebytes corporation first released january 2006 available free version scans removes malware started manually paid version additionally provides scheduled scans real-time protection flash-memory scanner malwarebytes formerly known malwarebytes anti-malware primarily scanner scans removes malicious software including rogue security software adware spyware malwarebytes scans batch mode rather scanning files opened reducing interference another on-demand anti-malware software also running computer malwarebytes available free premium paid version free version run manually user desired whereas paid version perform scheduled scans automatically scan files opened block ip addresses malicious web sites scan services programs device drivers currently use december 8 2016 malwarebytes inc. released version 3.0 general public includes protection malware ransomware exploit malicious websites november 2 2009 malwarebytes accused rival iobit incorporating database malwarebytes anti-malware several products vendors named security software iobit security 360 iobit denied accusation stated database based user submissions sometimes signature names malwarebytes get placed results said time filter signature names similar malwarebytes iobit also stated malwarebytes convincing proof promised databases stolen declaration iobit malwarebytes replied convinced argument iobit malwarebytes claims served dmca infringement notices cnet download.com majorgeeks order download sites remove iobit software iobit said version 1.3 database updated address accusations intellectual property theft made earlier malwarebytes vonteera adware uses stolen certificates disables anti-malware virus protection malwarebytes malwarebytes listed solution eliminating threat february 2 2016 project zero announced four vulnerabilities malwarebytes flagship product including lack server-side encryption update files lack proper payload signing within encrypted data combination allowed attacker recompile encrypted payload exploits malwarebytes responded one day disclosure blog article detailing extreme difficulty executing attacks well revealing announced server-side encryption issues resolved within days private disclosure outstanding time project zero published research malwarebytes also published information protect current users patch released event also resulted establishment formal bug bounty program malwarebytes offers 1000 per disclosure depending severity exploitability
[ 2049, 3595, 1052, 550, 2601, 6699, 8754, 9791, 10308, 4165, 2654, 106, 10872, 127, 7809, 131, 6797, 10392, 156, 2721, 2213, 6823, 3243, 6834, 704, 7362, 711, 202, 1242, 5356, 9964, 6382, 3320, 9983, 5891, 5380, 8978, 6431, 5924, 1318, 2...
Test
4,375
3
Lords_of_Time:lords time lords time interactive fiction computer game designed sue gazzard released level 9 computing 1983 originally purely textual adventure 8 bit microcomputers game later released part time magik compilation graphics added floppy disk versions like level 9 adventures time written in-house a-code language platform-independent – implementation virtual machine allowed quick porting across platforms anonymous hero game controlled player appears computer programmer contemporary times start game hero contacted father time sends hero quest recover nine treasures order defeat machinations evil time lords game divided 9 eras time including starting section hero living room 20th century ice age age dinosaurs dark ages future middle ages tudor england roman empire due meddling time lords anachronisms abound example cavemen found living era dinosaurs access nine different eras via grandfather clock turns time machine disguise game re-released 1988 part time magik compilation alongside red moon price magik although positioned within compilation first part trilogy real connection latter two opposed sister compilation release silicon dreams three games form trilogy reception lords time positive crash reviewing spectrum version declared find impossible justly describe brilliant adventure lords time really computer video games magazine multiformat review claimed ..the game light-hearted one fun play difficult progress suspect take rather long time complete could ask personal computer games rated pcg hit
[ 9006, 10931, 9166, 8646 ]
Test
4,376
1
Database_theory:database theory database theory encapsulates broad range topics related study research theoretical realm databases database management systems theoretical aspects data management include among areas foundations query languages computational complexity expressive power queries finite model theory database design theory dependency theory foundations concurrency control database recovery deductive databases temporal spatial databases real time databases managing uncertain data probabilistic databases web data research work traditionally based relational model since model usually considered simplest foundational model interest corresponding results data models object-oriented semi-structured models recently graph data models xml often derivable relational model central focus database theory understanding complexity power query languages connection logic starting relational algebra first-order logic equivalent codd theorem insight important queries graph reachability expressible language powerful language based logic programming fixpoint logic datalog studied another focus foundations query optimization data integration work studied conjunctive queries admit query optimization even constraints using chase algorithm main research conferences area acm symposium principles database systems pods international conference database theory icdt
[ 2688, 9481, 10505, 1292, 10258, 7446, 10518, 9112, 7968, 1697, 290, 1314, 7461, 8742, 5550, 5808, 10418, 9397, 9527, 3768, 3004, 1341, 9661, 9663, 4416, 2369, 5441, 9411, 11457, 8261, 8518, 72, 2512, 853, 2901, 4055, 9942, 9177, 987, 860,...
None
4,377
7
Native_cloud_application:native cloud application native cloud application nca type computer software natively utilizes services infrastructure cloud computing providers amazon ec2 force.com microsoft azure ncas exhibit combined usage three fundamental technologies
[ 6018, 1539, 8451, 6027, 4236, 10893, 526, 911, 272, 1935, 4623, 8592, 405, 2965, 2328, 10265, 8986, 5662, 11038, 5666, 6307, 9766, 39, 5159, 2217, 6444, 8495, 3121, 5681, 9906, 7352, 10681, 11070, 448, 2496, 4289, 8515, 10820, 3269, 11201...
Validation
4,378
8
SWFAddress:swfaddress swfaddress open-source javascript library enables adobe flash/flex javascript/ajax websites web applications support deep linking practice enables users link specific section page content importance rich internet application platforms provide single url access specific content user navigation within content uniquely identified shared means url developer content integrates swfaddress users able use standard browser navigation functionality share bookmark unique urls represent currently displayed section state content library commonly used flash websites web applications available deep linking javascript library flash web swfaddress found used 100,000 websites 2011 swfaddress uses hash portion url interact web browsers simulate page navigation works two ways library built integrate free google analytics web analytics system order record page view statistics track popularity individual pages viewer navigates virtual pages states content also integrates popular swfobject javascript library automatically enable deep linking content loaded swfaddress works major web browsers major operating systems integrated flash content written outdated actionscript 1 recent actionscript 2 latest actionscript 3
[ 1409, 259, 3462, 6791, 8071, 10507, 5524, 8854, 1944, 8605, 7455, 6576, 3761, 11060, 438, 5311, 2880, 7871, 9152, 4292, 4171, 11087, 339, 84, 4822, 4056, 9560, 603, 482, 5219, 7396, 487, 5483, 9195, 9579, 10991, 10097, 2804, 6143 ]
Validation
4,379
4
Verinice:verinice verinice free open source information security management system isms application help creating maintaining systems information security management verinice written maintained primarily german company named sernet service network gmbh verinice licensed gnu general public license version 3 later main users usually small medium companies big enterprises government agencies germany verinice recommended verinice supports operating systems windows linux os x licensed baseline protection catalogs federal office information security
[ 10600, 5353, 5612, 5677, 7983, 823 ]
Test
4,380
4
Sybil_attack:sybil attack sybil attack attacker subverts reputation system peer-to-peer network creating large number pseudonymous identities uses gain disproportionately large influence named subject book sybil case study woman diagnosed dissociative identity disorder name suggested 2002 brian zill microsoft research term pseudospoofing previously coined l. detweiler cypherpunks mailing list used literature peer-to-peer systems class attacks prior 2002 term gain much influence sybil attack sybil attack computer security attack wherein reputation system subverted forging identities peer-to-peer networks reputation system vulnerability sybil attack depends cheaply identities generated degree reputation system accepts inputs entities chain trust linking trusted entity whether reputation system treats entities identically evidence showed large-scale sybil attacks could carried cheap efficient way extant realistic systems bittorrent mainline dht entity peer-to-peer network piece software access local resources entity advertises peer-to-peer network presenting identity one identity correspond single entity words mapping identities entities many one entities peer-to-peer networks use multiple identities purposes redundancy resource sharing reliability integrity peer-to-peer networks identity used abstraction remote entity aware identities without necessarily knowing correspondence identities local entities default distinct identity usually assumed correspond distinct local entity reality many identities may correspond local entity adversary may present multiple identities peer-to-peer network order appear function multiple distinct nodes adversary may thus able acquire disproportionate level control network affecting voting outcomes context human online communities multiple identities sometimes known sockpuppets notable sybil attack conjunction traffic confirmation attack launched tor anonymity network several months 2014 unknown perpetrators validation techniques used prevent sybil attacks dismiss masquerading hostile entities local entity may accept remote identity based central authority ensures one-to-one correspondence identity entity may even provide reverse lookup identity may validated either directly indirectly direct validation local entity queries central authority validate remote identities indirect validation local entity relies already accepted identities turn vouch validity remote identity question identity-based validation techniques generally provide accountability expense anonymity undesirable tradeoff especially online forums wish permit censorship-free information exchange open discussion sensitive topics validation authority attempt preserve users anonymity refusing perform reverse lookups approach makes validation authority prime target attack alternatively authority use mechanism knowledge user real identity verification unidentified person physical presence particular place time enforce one-to-one correspondence online identities real-world users sybil prevention techniques based connectivity characteristics social graphs also limit extent damage caused given sybil attacker preserving anonymity though techniques prevent sybil attacks entirely may vulnerable widespread small-scale sybil attacks examples prevention techniques sybilguard advogato trust metric also sparsity based metric identify sybil clusters distributed p2p based reputation system alternatively proof work used make sybil attacks expensive i2p implementation kademlia modified mitigate kademlia vulnerabilities sybil attacks
[ 2609, 10741, 11612, 2558, 7231 ]
Test
4,381
0
Articulatory_speech_recognition:articulatory speech recognition articulatory speech recognition means recovery speech forms phonemes syllables words acoustic signals help articulatory modeling extra input articulatory movement data speech recognition automatic speech recognition acoustic speech recognition means recovery speech acoustics sound wave articulatory information extremely helpful acoustic input low quality perhaps noise missing data
[ 5648, 1890, 10557 ]
Validation
4,382
4
Invincea:invincea invincea suite endpoint protection products formerly sold sophos invincea inc. originally secure command llc venture backed software company provided malware threat detection prevention pre-breach forensic intelligence acquired sophos 2017 sophos ended immediate end sale invincea products april 2018 founded 2006 anup ghosh company headquartered fairfax virginia major investors include dell ventures new atlantic ventures grotech ventures aeris capital harbert venture partners 2012 invincea used 21 million grant darpa improve security us military android-based devices tablet pcs smart phones invincea software secures data unauthorized access protects device malicious applications june 2013 dell announced oem partnership invincea began shipping new endpoint security solution dubbed “ dell data protection protected workspace ” commercial tablets pcs worldwide december 2013 invincea acquired sandboxie undisclosed amount sandboxie pioneer windows containment sandboxing market making logical addition invincea ’ technology portfolio may 2016 invincea launched x invincea x protects endpoints detecting blocking known unknown malware—without signatures real-time x combines deep learning advanced form machine learning behavioral analysis isolation technology one lightweight agent february 2017 invincea acquired sophos security software hardware company august year subsidiary invincea labs renamed two six labs january 2018 sophos announced invincea would integrated intercept x end-point security product april 16 2018 announced immediate end sale invincea-branded products support maintenance available existing contracts december 31st 2019 point support maintenance invincea products cease april 16 2018 sophos announced would longer selling invincea-related products although would continue support existing sales end 2019
[ 1994, 1400, 3484, 2558, 9055 ]
Test
4,383
2
OpenEZX:openezx openezx project tries gather information linux based motorola ezx phone platform tries provide 100 free software stack phones especially way avoid proprietary filesystem and/or device drivers also aims provide current 2.6.x kernel required hardware support ezx phones currently supported phones
[ 6276, 11271, 4364, 3089, 10393, 6301, 5406, 673, 3626, 7727, 3248, 7857, 823, 7991, 9784, 1083, 5824, 7492, 11079, 7246, 2001, 4305, 2259, 7253, 3542, 3162, 607, 10080, 2658, 8423, 10215, 3561, 10599, 6763, 6508, 2925, 495, 1524, 5369, 83...
Test
4,384
2
Windows_Workflow_Foundation:windows workflow foundation windows workflow foundation wf microsoft technology provides api in-process workflow engine rehostable designer implement long-running processes workflows within .net applications current version wf released part .net framework version 4.5 referred wf45 workflow defined series distinct programming steps phases step modeled wf activity .net framework provides library activities writeline activity writes text console form output custom activities also developed additional functionality activities assembled visually workflows using workflow designer design surface runs within visual studio designer also hosted applications encapsulating programming functionality activities allows developer create manageable applications component execution developed common language runtime object whose execution managed workflow runtime windows workflow foundation used create applications execute ordered business process steps needed approve document hire candidate position make purchase processes execute short amount time typically long-running application need shut conserve memory steps typically business processes modeled workflows following features workflows created either defined xaml extensible application markup language using workflow designer assembled programmatically .net language c vb.net designer used activities assembled workflow designer canvas dragging toolbox workflow arguments variables also created assigned within designer workflow assembled code activities instantiated like clr objects assembled collections single parent activity usually sequence flowchart single parent activity executed using workflowapplication workflowinvoker runs workflow term workflow usually refers root activity executed host workflows use out-of-box activities custom activities out-of-box activities include flow control activities dowhile flowchart-related activities flowdecision wcf messaging activities send primitive activities perform simple tasks like assign writeline custom activities user-created clr objects derive class system.activitiesactivity provide declarative functionality allowing developer define execution behavior activity code custom activities benefit custom activity designer associated enhance visual authoring experience visual studio ide
[ 10243, 10769, 9234, 1043, 1055, 2083, 8227, 1577, 2603, 4143, 9263, 11316, 1077, 6709, 8246, 4174, 4178, 83, 9813, 603, 608, 2145, 1656, 5754, 9340, 5761, 9348, 5765, 10886, 2183, 4231, 5259, 653, 10900, 10902, 11414, 3224, 4771, 7846, 22...
None
4,385
3
CSG_65CE02:csg 65ce02 csg 65ce02 8/16-bit microprocessor developed commodore semiconductor group 1988 member mos technology 6502 family developed cmos wdc 65c02 released western design center 1983 65ce02 built 2 µm cmos process instead original 6502 8 µm nmos technology making chip smaller thus less expensive well using much less power addition changes made 65c02 65ce02 also included improvements processor pipeline allow one-byte instructions complete 1 cycle rather 6502 variants minimum 2 cycles also removed 1 cycle delays crossing page boundaries changes improved performance much 25 clock speed changes included addition third index register z along addition modification number instructions use register zero-page first 256 bytes memory used pseudo-registers could moved page main memory using b ase page register stack register widened 8 16-bits using similar page register sph stack pointer high allowing stack moved page one grow larger sizes 65ce02 basis system chip csg 4501 developed unreleased commodore 65 65ce02 later used a2232 serial port card amiga computer appears seen use original 6502 designed era microcomputers existed microprocessors used basis simpler systems like smart terminals desktop calculators many different industrial controller systems also era memory devices generally based static ram expensive low memory density reasons ability handle large amounts memory required many processors operating modes worked small portions larger address space order offer higher performance case 6502 used first memory page zero page provide faster access second page page one hold 256-byte stack late 1970s original mos technology team designed 6502 broken bill mensch moved arizona set western design center wdc provide 6502-based design services around 1981 main licensees 6502 design rockwell semiconductor gte signetics began redesign effort mensch led wdc 65c02 mainly cmos implementation original nmos 6502 used 10 20 times less power also included number new instructions help improve code density certain applications new instructions included codice_1 increment decrement accumulator codice_2 write zero memory location codice_3 jump branch-style 1-byte relative address 65c02 also fixed number minor bugs original 6502 design 65ce02 improved version 65c02 expands memory model make suitable system large amounts main memory adds 8-bit b register base page offsets zero page location memory b set zero power-up reset initially works exactly like 6502 however value placed b register using codice_4 transfer b zero page moves new location significant use feature allow small routines fit within 256 bytes page use zero-page addressing known base page addressing makes code smaller addresses longer second byte also makes code run faster second byte fetched memory 65ce02 also extends stack original 256-bytes page one theory entire address space adding another 8-bit register like b register sph stack pointer high normally works like b offsetting base address stack page one selected page otherwise continues work maximum size one page 256 bytes like b startup reset sph set 01 works exactly like 65c02 however new stack extend bit status register set using new codice_5 instructions stack pointer becomes true 16-bit value value register added value original sp known spl stack pointer low produce 16-bit pointer bottom stack unlike b register however sph used stack extend bit status register set cleared startup reset using bit allows pipeline avoid construct full 16-bit address needed saving cycles stack accesses mode explicitly set using new codice_5 instructions clear set flag 65ce02 also adds new index register z set zero startup reset meaning store-z-to-memory instruction codice_2 works like 65c02 instruction means store-zero-to-memory allows unmodified 65c02 code run 65ce02 number instructions added modified allow access z register among codice_8 load value memory codice_9 transfer value accumulator codice_10 push pull z stack codice_11 increment decrement codice_12 compare value z value memory 65c02 added codice_3 branch always essentially codice_14 used branch-style 8-bit relative address instead absolute 16-bit address could simulated original 6502 using codice_15 branch overflow clear reasons almost always clear 6502 longer true 65c02 certain operations correctly set flag unknown reasons 65ce02 changed mnemonic codice_16 also added codice_17 instruction branch subroutine uses relative addressing mode codice_18 jump subroutine addition added 16-bit addressing word relative existing branch instructions previously branches could move backward 128 locations forward 127 based signed 8-bit value relative address 65ce02 could -32768 +32767 locations following branch 16-bit value previously perform long branch one normally use codice_14 branch n't want instance one wanted branch address 1234 accumulator zero one would codice_20 meaning want skip 3-byte codice_14 accumulator zero 65ce02 reduced something like codice_22 thereby making code obvious removing two bytes instructions removing need lost cycles fetching running branch however still uses relative addressing relative address calculated programmer assembler another addition system number word instructions carried operations 16-bit data included codice_23 increment decrement value memory codice_24 perform arithmetic shift left word rotate left word finally minor changes include addition codice_25 bit-shift right 6502 left shift codice_26 instruction performs two complement negation accumulator codice_27 variation codice_28 return subroutine returns address offset stack instead top avoiding need explicitly codice_29 anything routine added ran system also added new addressing mode used base address stack basis indirect addressing major oddity original 6502 one-byte instructions like codice_30 still took two cycles complete allowed simplifications pipeline system next byte memory fetched operation decoded meaning next byte fetched matter instructions byte would part whole operand could fed now-decoded instruction instruction required one byte processor read following byte next instruction however way feed back first stage pipeline decode case fetched byte discarded re-read feed decoder wastes cycle although led number instructions slower could feature retained 65c02 although whether order retain pipeline simplicity cycle timing explained available sources maintaining cycle compatibility requirement 65ce02 new fabrication processes made extra circuitry pipeline non-issue pipeline re-arranged correctly handle one-byte instructions result 65ce02 recover faster engagement sync signal reduces minimum instruction execution time 2 cycles 1 cycle improvements allow 65ce02 execute code 25 faster previous 65xx models fabricated using 2 µm cmos technology allowing lower power operation compared previous nmos hmos versions 65xx family housed 40-pin dip pin compatible 6502 4510 system package sip variant 65ce02 includes two 6526 cia i/o port controllers custom mmu expand address space 20 bit 1 megabyte housed 84-pin plcc 4510 used unreleased commodore 65 home computer unreleased commodore cdtv cost-reduced revision 65ce02 used commodore a2232 serial port card amiga computer
[ 11395, 1029, 10767, 7188, 664, 8352, 10784, 6821, 7589, 3630, 11054, 5040, 7858, 8501, 2874, 3010, 3157, 6485, 10969, 602, 5598, 5862, 5736, 10351, 1776, 5617, 7281, 7282, 7284 ]
None