node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
4,586 | 2 | Virtual_Telecommunications_Access_Method:virtual telecommunications access method virtual telecommunications access method vtam ibm subsystem implements systems network architecture sna mainframe environments vtam provides application programming interface api communication applications controls communication equipment adapters controllers modern terminology vtam provides communication stack device drivers vtam introduced 1974 series delays major component sna along 370x network control program ncp synchronous data link control sdlc ibm terminology vtam access method software allowing application programs read write data external devices called 'virtual introduced time ibm introducing virtual memory upgrading operating systems system/360 series virtual storage versions vtam supposed successor older telecommunications access methods basic telecommunications access method btam telecommunications access method tcam maintained compatibility reasons vtam comparable virtual storage access method vsam time new supposedly converged access method disk storage originally vtam provided free charge like systems software time however vtam 2 last version freely available acf/vtam advanced communication function/virtual telecommunications access method introduced 1976 provided licence fee major new feature acf/vtam multisystem networking facility introduced implementation intersystem communication among multiple s/370s. limited version acf/vtam known acf/vtame advanced communications function virtual telecommunications access method entry made available dos/vse systems running ibm 4300 vtam renamed sna services feature communications server os/390 software package also provides tcp/ip functions vtam supports several network protocols including sdlc token ring start-stop bisync local channel attached 3270 devices later tcp/ip vtam network communication took place integrated communication adapter mainframe separate programmable front-end processor ibm 3745/3746 communications processor operating system network control program ncp machines longer actively marketed ibm still supported ibm provides hardware maintenance microcode updates estimated 20,000 installed 3745/3746 controllers robust third party industry smaller 3745/3746 specialty companies provide controllers upgrades features related support services vtam sna still use many enterprises initially vtam allowed communication mainframes peripheral equipment terminals distributed processors minicomputers later 'cross-domain services introduced confused tcp/ip domains allowing sna networks one mainframe subsequent development sna network interconnect allowing networks different organizational entities firms interconnected high degree independence finally advanced peer peer networking functions appn added vtam appn mainframe longer heart network nodes network considered peers one reasons appn introduced act decnet-killer time appn actually shipped popularity decnet already declined appn considered overly complex 2012 largely superseded tcp/ip | [
7,
11656,
6544,
7312,
11539,
7836,
10415,
2616,
4546,
1219,
11131,
8393,
8138,
10958,
8911,
3669,
10072,
8290,
868,
7272,
10094,
6647,
3323,
2172,
2813
] | Test |
4,587 | 3 | Gameframe:gameframe gameframe hybrid computer system first used online video games industry amalgamation different technologies architectures supercomputers mainframes namely high computing power high throughput 2007 hoplon ibm jointly started gameframe project used ibm system z mainframe computer attached cell/b.e blades eight-core parallel-processing chips power sony playstation 3 host online game taikodom project carried co-operation ibm university california san diego 2009 although cell blades account required computing power high data throughput mainframe particular interest system z provides high level security massive workload handling assuring execution administrative tasks guaranteeing enduring connectivity huge number clients cell/b.e takes resource demanding calculations thus enabling system z fulfill job combination effective financially attractive game server system computation-intensive tasks offloaded expensive cpu cycles system z carried much economical cell blades without offloading server system required would end costing much would financially feasible unlike typical game clusters gameframe handle required transactions e.g keeping track user spaceships weapons virtual money even players simulation trajectory objects checking collisions unified consistent fashion thus host thousand users time slow experienced users added games numerous players like world warcraft tackled problem splitting work among multiple clusters creating duplicate worlds n't communicate cell-augmented mainframe runs hoplon virtual-world middleware called bitverse uses ibm websphere xd db2 software around gameframe ibm virtual universe community evolved | [
9472,
643,
9126,
6311,
306,
7218,
6072,
8120,
8122,
1985,
1480,
3025,
6738,
342,
1115,
859,
4060,
3677,
9445,
8937,
10985,
6004,
2293,
1784,
3323,
6268,
6909,
3966
] | Test |
4,588 | 3 | Colony_(video_game):colony video game colony action-adventure game released 1987 amstrad cpc atari 8-bit family commodore 64 msx zx spectrum mastertronic bulldog label owing overpopulation humanity found necessary grow food colonies planets unfortunately mushroom-growing planet player responsible also inhabited hostile native aliens resemble giant insects player must use droid control maintain harvest mushrooms well look protect colony gameplay takes place flip-screen environment consisting colony made-up storehouses specialist buildings mushroom fields areas solar panels surrounding desert alien planet filled various giant insects colony quite complicated game numerous things player must look-after purpose colony grow mushrooms shipment back earth mushrooms grow green i.e lush areas begin seeds quickly grow eventually reaching stage maturity point collected order deposited money later pick-up spacecraft unfortunately mushrooms one many things insects like eat player pick mature mushrooms partially eaten aliens deposited award payment unfit human consumption colony surrounded security fence keeps giant insects colony causing mischief therein unfortunately fence constantly attack insects chew way player droid must maintain fence destroying marauding insects replacing damaged destroyed pieces fence damaged fence sections deposited fence storehouse repair three different types security-fencing used barbed wire weakest wooden-fencing default fencing-type already use around colony game starts steel fencing strongest fencing type colony powered free-standing solar panels located within colony provide power order recharge droid shields weapons well landing beacon required spaceship land unfortunately insects chew pieces well devastate colony power supply checked fencing droid repair damaged panels correct storehouse well find replacements destroyed panels plenty mushrooms grown safely packed-away pick-up player send message earth spaceship sent en route colony pick player also order supplies extra seeds fencing panels useful items ship deliver game provides eta ship player must keep eye ship requires colony landing beacon arrives beacon ship land landing-bay player must screen time droid crushed drop crates supplies pay mushrooms money used next ordering supplies beacon ship dump supplies random surrounding desert many lost aliens beacon drains colony power-supply quickly important leave long necessary also ensure colony power-storage suitably high activating player droid also set traps almost anywhere colony desert order destroy giant insects traps work addition also permanent traps covering areas colony completely open desert e.g main entrance fencing traps always destroy insects wander without disappearing however reliant colony power supply player allows power drop low traps disappear | [
10931,
9006
] | Validation |
4,589 | 5 | Network_socket:network socket network socket internal endpoint sending receiving data within node computer network concretely representation endpoint networking software protocol stack entry table listing communication protocol destination status etc form system resource term socket analogous physical female connectors communication two nodes channel visualized cable two male connectors plugging sockets node similarly term port another term female connector used external endpoints node term socket also used internal endpoint local inter-process communication ipc network however analogy strained network communication need one-to-one dedicated communication channel process refer socket using socket descriptor type handle process first requests protocol stack create socket stack returns descriptor process identify socket process passes descriptor back protocol stack wishes send receive data using socket unlike ports sockets specific one node local resources referred directly nodes sockets necessarily associated persistent connection channel communication two nodes necessarily single endpoint example datagram socket used connectionless communication multicast socket used send multiple nodes however practice internet communication sockets generally used connect specific endpoint often persistent connection practice socket usually refers socket internet protocol ip network socket may called internet socket particular transmission control protocol tcp protocol one-to-one connections context sockets assumed associated specific socket address namely ip address port number local node corresponding socket address foreign node node associated socket used foreign process associating socket socket address called binding note local process communicate foreign process sending receiving data foreign socket address access foreign socket use foreign socket descriptor internal foreign node example connection 10.20.30.40:4444 50.60.70.80:8888 local ip address local port foreign ip address foreign port also associated socket end corresponding internal representation connection protocol stack node referred locally numerical socket descriptors say 317 one side 922 process node 10.20.30.40 request communicate node 50.60.70.80 port 8888 request protocol stack create socket communicate destination created socket received socket descriptor 317 communicate via socket using descriptor 317 protocol stack forward data node 50.60.70.80 port 8888 however process node 10.20.30.40 request communicate based foreign socket descriptor e.g socket 922 socket 922 node 50.60.70.80 internal foreign node usable protocol stack node 10.20.30.40 protocol stack today usually provided operating system rather separate library instance set services allow processes communicate network using protocols stack implements operating system forwards payload incoming ip packets corresponding application extracting socket address information ip transport protocol headers stripping headers application data application programming interface api programs use communicate protocol stack using network sockets called socket api development application programs utilize api called socket programming network programming internet socket apis usually based berkeley sockets standard berkeley sockets standard sockets form file descriptor due unix philosophy everything file analogies sockets files functions read write open close practice differences strain analogy different interfaces send receive used socket inter-process communication end generally socket standard internet protocols tcp udp socket address combination ip address port number much like one end telephone connection combination phone number particular extension sockets need source address example sending data program binds socket source address socket used receive data sent address based address internet sockets deliver incoming data packets appropriate application process socket often refers specifically internet socket tcp socket internet socket minimally characterized following distinctions socket internal representation socket descriptor abstract identifier socket address public address subtle always distinguished everyday usage specific definitions socket differ authors ietf request comments internet standards many textbooks well article term socket refers entity uniquely identified socket number textbooks term socket refers local socket address i.e combination ip address port number original definition socket given rfc 147 related arpa network 1971 socket specified 32 bit number even sockets identifying receiving sockets odd sockets identifying sending sockets today however socket communications bidirectional within operating system application created socket socket referred unique integer value called socket descriptor unix-like operating systems microsoft windows command-line tools netstat ss used list established sockets related information example modeled according berkeley socket interface sends string hello world via tcp port 80 host address 1.2.3.4 illustrates creation socket getsocket connecting remote host sending string finally closing socket several types internet socket available datagram socket type network socket provides connectionless point sending receiving data packets packet sent received datagram socket individually addressed routed order reliability guaranteed datagram sockets multiple packets sent one machine process another may arrive order might arrive sending udp broadcasts network always enabled datagram socket order receive broadcast packets datagram socket bound wildcard address broadcast packets may also received datagram socket bound specific address stream socket type network socket provides connection-oriented sequenced unique flow data without record boundaries well-defined mechanisms creating destroying connections detecting errors stream socket transmits data reliably order out-of-band capabilities internet stream sockets typically implemented top tcp applications run across networks using tcp/ip protocol sctp may also used stream sockets raw socket network socket allows direct sending receiving ip packets without protocol-specific transport layer formatting types sockets payload automatically encapsulated according chosen transport layer protocol e.g tcp udp socket user unaware existence protocol headers broadcast payload reading raw socket headers usually included transmitting packets raw socket automatic addition header optional raw sockets used security related applications like nmap one possible use case raw sockets implementation new transport-layer protocols user space raw sockets typically available network equipment used routing protocols internet group management protocol igmpv4 open shortest path first ospf internet control message protocol icmp used among things ping utility socket application programming interfaces apis example based berkeley sockets support raw sockets windows xp released 2001 raw socket support implemented winsock interface three years later microsoft limited winsock raw socket support security concerns socket types implemented transport protocols systems network architecture sna see also unix domain sockets uds internal inter-process communication computer processes provide application services referred servers create sockets start listening state sockets waiting initiatives client programs tcp server may serve several clients concurrently creating child process client establishing tcp connection child process client unique dedicated sockets created connection established state socket-to-socket virtual connection virtual circuit vc also known tcp session established remote socket providing duplex byte stream server may create several concurrently established tcp sockets local port number local ip address mapped server-child process serving client process treated different sockets operating system since remote socket address client ip address and/or port number different i.e since different socket pair tuples udp socket established state since udp connectionless therefore netstat show state udp socket udp server create new child processes every concurrently served client process handles incoming data packets remote clients sequentially socket implies udp sockets identified remote address local address although message associated remote address communicating local remote sockets called socket pairs socket pair described unique 4-tuple consisting source destination ip addresses port numbers i.e local remote socket addresses seen discussion tcp case unique socket pair 4-tuple assigned socket number udp case unique local socket address assigned socket number term socket dates rfc 147 1971 used arpanet today implementations sockets based berkeley sockets 1983 internet winsock 1991 api implementations exist streams-based transport layer interface tli 1983 berkeley sockets also known bsd socket api originated 4.2bsd unix operating system released 1983 api 1989 however could uc berkeley release versions operating system networking library free licensing constraints copyright-protected unix 1987 tli networking application programming interface provided unix system v release 3 svr3 continued release 4 svr4 early implementations written tops-20 mvs vm ibm-dos pcip socket primarily concept used transport layer internet model networking equipment routers switches require implementations transport layer operate link layer level switches internet layer routers however stateful network firewalls network address translators proxy servers keep track active socket pairs also fair queuing layer 3 switching quality service qos support routers packet flows may identified extracting information socket pairs raw sockets typically available network equipment used routing protocols igrp ospf internet control message protocol icmp | [
2304,
2432,
6148,
8965,
3334,
7049,
778,
11,
2827,
2701,
4490,
6797,
7053,
273,
1556,
10005,
3734,
11413,
5402,
5531,
6555,
6813,
10016,
9507,
1444,
5029,
6694,
3751,
7975,
8998,
2476,
10924,
2222,
7855,
7983,
7217,
562,
1586,
2739,
2995,... | Test |
4,590 | 2 | Telephony_Application_Programming_Interface:telephony application programming interface telephony application programming interface tapi microsoft windows api provides computer telephony integration enables pcs running microsoft windows use telephone services different versions tapi available different versions windows tapi allows applications control telephony functions computer telephone network data fax voice calls includes basic functions dialing answering hanging call also supports supplementary functions hold transfer conference call park found pbx isdn telephone systems tapi used primarily control either modems recently control business telephone system pbx handsets controlling pbx handset driver provided manufacturer telephone system manufacturers provide drivers allow control multiple handsets traditionally called third-party control manufacturers provide drivers allow control single handset called first-party control third-party drivers designed allow applications see and/or control multiple extensions time telephone systems permit one third-party connection time first-party drivers designed allow applications monitor and/or control one extension time telephone systems naturally permit many connections simultaneously modem connections nature first-party tapi also used control voice-enabled telephony devices including voice modems dedicated hardware dialogic cards tapi introduced 1993 result joint development microsoft intel first publicly available version tapi version 1.3 released patch top microsoft windows 3.1 version 1.3 drivers 16-bit version 1.3 longer supported although msdn development library cds still contain files patches microsoft windows 95 tapi integrated operating system first version windows 95 tapi 1.4 tapi 1.4 support 32-bit applications tapi standard supports connections individual computers lan connections serving number computers tapi 2.0 introduced windows nt 4.0 version 2.0 first version windows nt platform made significant step forward supporting acd pbx-specific functionality 1997 microsoft released tapi version 2.1 version tapi available downloadable update first version supported microsoft windows 95 windows nt/2000 platforms tapi 3.0 released 1999 together windows 2000 version enables ip telephony voip providing simple generic methods making connections two using h.323 using ip multicast computers also offers ability access media stream msp driver involved connection windows xp included tapi 3.1 tapi 2.2 tapi 3.1 supports microsoft component object model provides set com objects application programmers version uses file terminals allow applications record streaming data file play recorded data back stream usb phone tsp telephony service provider also included allows application control usb phone use streaming endpoint tapi 3.0 tapi 3.1 available operating systems earlier windows 2000 windows xp respectively telephony server application programming interface tsapi similar standard developed novell netware servers tapi uses microsoft canonical address format telephone numbers make phone calls derivative e.123 international notation canonical address text string following format codice_1 area code subaddress name optional latter carry extension number direct inward dialing calling party name used isdn/e1/t1 telecommunication protocols dialing rules used transform canonical phone number dialable calling sequence modem depending user location dialing rules include variable-length dialing area code trunk access international access prefixes well central office access calling card/credit card numbers calling sequence contain dialable numbers digits codice_2 dtmf tones codice_3 formatting characters codice_4 control characters codice_5 correspond dial command hayes command set following control characters defined common misconception tapi 3.0 tapi 3.1 replaces tapi 2.x tapi 2.x earlier versions written c api uses pointers structures consequently tapi 2.x easy access c c++ applications awkward use many programming languages tapi 3.x designed component object model com interface done intent making accessible higher level applications developed vb environments provide easy access com n't deal c-style pointers tapi 3.x slightly different set functionality tapi 2.x addition integrated media control significant addition tapi 3.x n't include functionality tapi 2.x like support phone class one notable issue tapi 3.x lack support managed code .net environment documented microsoft kb article 841712 microsoft currently plans support tapi 3.x directly .net programming languages however mark smith provided managed c++ library called itapi3 2.x wrapper .net developers provide libraries work indirectly tapi enabled pbxs one often overlooked reason application developer might choose tapi 2.x tapi 3.x hardware vendors recommendation even though tapi provides abstract model phone lines telephony applications still heavily impacted specific behavior underlying hardware troubleshooting behavior issues usually requires software hardware vendors collaborate almost 1:1 relationship tapi service provider tsp interface tapi 2.x interface collaboration often easier application designed using tapi 2.x experience tapi 3.x varies significantly hardware vendors windows tapi support almost universal telephony hardware voice modems internal external computer expansion boards dialogic telephony cards notable exception never natively supported tapi avaya communication manager relied solely tsapi interface connectivity many pbx systems provide tapi-compliant modem interfaces tapi compatible pbx solutions include aastra 400/800 aastra mx-one alcatel oxo/oxe avaya bcm ip office cisco call manager ericsson-lg emg80 ipecs ipldk nec-philips is3000 ipc100/500 nec sl1000 sv8100/9100 nitsuko dxe600/328 panasonic kx-tda/tde/ncp kx-ns1000 samsung officeserv unify 3000/4000 openscape office shoretel wildix zyxel x6004/x2002 third party drivers often available telephone systems n't drivers made manufacturers | [
10243,
10769,
9234,
1043,
10270,
1055,
2083,
8227,
1577,
4143,
9263,
11316,
1077,
8246,
8262,
4174,
4178,
3156,
9813,
603,
1121,
2145,
7271,
1656,
5754,
9340,
5761,
9348,
5765,
10886,
2183,
5259,
653,
6797,
3224,
4771,
8355,
7846,
10414,
... | None |
4,591 | 3 | Architecture_of_Interoperable_Information_Systems:architecture interoperable information systems architecture interoperable information systems aios reference architecture development interoperable enterprise information systems enterprises public administrations want engage automated business processes organizations systems must able work together i.e need interoperable aios represents generic building plan organizations develop interoperable information systems systematically adjusting extending internal information systems aios described doctoral thesis based results various research projects interoperability independent specific products vendors describes generically different layers views relationships technical means needed efficiently establish interoperable information systems aim combines concepts service-oriented architecture collaborative business business process modelling seen complementary aris well-known architecture internal information systems business processes similar automation processes inside organizations automation cross-organizational business processes important trend endeavor collaborating organizations rather strive loose coupling information systems instead tight integration collaborating information systems able work together retain much independency possible characteristic also called interoperability context collaborating organizations business interoperability i.e capability autonomous organizations execute collaborative business process among information systems systems process information i.e capture transport transform store offer information following conception prevailing information systems research information system comprises hardware software enterprise also related human actors business functions processes well organization structures broad understanding example also embodied zachman framework architecture defined “ fundamental organization system embodied components relationships environment principles governing design evolution ” sinz defines information system architecture building plan information system sense specification documentation components relationships covering relevant viewpoints well constructions rules creation building plan accordingly architecture interoperable information systems defined building plan cross-organizational information system enables organizations execute collaborative business process among following work interoperable information systems conducted european research projects 2010 architecture interoperable information systems aios published reference construction loosely coupled interoperating information systems systematic model-based enactment collaborative business processes aios aims primarily large organizations want interoperate aim describes internal information system elements systematically connected information systems collaboration partners main elements aios one element comprised third category bii-repository organization publishes content business interoperability interface bii collaboration partners since comprises external views information system elements provides publishing discovery functionalities needed service-oriented architecture bii externally relevant processes services organization structures etc described various levels technical granularity enabling organizations search also business-level elements technical artifacts different traditional soa approach instead one central service directory various partner-specific repositories implemented static part architecture builds three orthogonal axes enterprise dimensions levels technical granularity colloborative views similar private public global views known business process workflow modeling aios corresponding private public global views information system elements provided describe business processes comprehensively axis provides distinct views processes functions data organizational elements thus combination axis collaborative views private public global views processes functions data organizational roles provided description system elements different levels technical granularity supports systematic development collaborative information systems starting business requirements definition going way code level apart construction aspect thereby also multi-dimensional interoperability description provided facilitating synchronization collaborating systems level similar example aris omg mda three levels used | [
4107,
2948,
8581,
11367
] | Validation |
4,592 | 9 | Thread_safety:thread safety thread safety computer programming concept applicable multi-threaded code thread-safe code manipulates shared data structures manner ensures threads behave properly fulfill design specifications without unintended interaction various strategies making thread-safe data structures program may execute code several threads simultaneously shared address space threads access virtually memory every thread thread safety property allows code run multithreaded environments re-establishing correspondences actual flow control text program means synchronization software libraries provide certain thread-safety guarantees example concurrent reads might guaranteed thread-safe concurrent writes might whether program using library thread-safe depends whether uses library manner consistent guarantees different vendors use slightly different terminology thread-safety thread safety guarantees usually also include design steps prevent limit risk different forms deadlocks well optimizations maximize concurrent performance however deadlock-free guarantees always given since deadlocks caused callbacks violation architectural layering independent library discuss two approaches avoiding race conditions achieve thread safety first class approaches focuses avoiding shared state includes second class approaches synchronization-related used situations shared state avoided following piece java code method thread-safe class counter c programming language thread stack however static variable kept stack threads share simultaneous access multiple threads overlap running function possible static variable might changed one thread another midway checking difficult-to-diagnose logic error may compile run properly time called race condition one common way avoid use another shared variable lock mutex mutual exclusion following piece c code function thread-safe reentrant int increment_counter codice_1 called different threads without problem since mutex used synchronize access shared codice_2 variable function used reentrant interrupt handler second interrupt arises mutex locked second routine hang forever interrupt servicing disable interrupts whole system could suffer function implemented thread-safe reentrant using lock-free atomics c++11 int increment_counter | [
1152,
9224,
1801,
3990,
7446,
5154,
5031,
6184,
10791,
5677,
5040,
10033,
4680,
335,
4823,
5598,
2804,
2045,
6527
] | Test |
4,593 | 8 | Celtix:celtix celtix java enterprise service bus esb runtime set apis make easy add transports message formats security features goal simplify construction integration flexible reuse technical business components using standards-based service-oriented architecture celtix code base merged codehaus xfire form apache cxf project | [
8425,
4107,
5677,
1851,
7261
] | Validation |
4,594 | 5 | Pair_gain:pair gain telephony pair gain transmitting multiple pots signals twisted pairs traditionally used single traditional subscriber line telephone systems pair gain effect creating additional subscriber lines typically used expedient way solve subscriber line shortage problems using existing wiring instead installing new wires central office customer premises term invented middle 20th century analogy earlier use gain extend telephone local loops far telephone exchange pair gain system consists concentrators multiplexers combine separate signals single signal transmitted existing copper cable pair signals separated individual subscriber lines customer premises pair gain unit performs multiplexing simply provide second telephone connection single subscriber line called analog multi-line carrier aml circumstances customer wants add new phone line fax machine dial-up internet connection larger analog pair gain system made anaconda 1960s provided seven lines pair gain units expand number subscriber lines available single copper pair many sixty large pair gain units stored serving area interfaces metal cabinets typically resembling small apartment-sized refrigerators alongside near roadways overlie communications rights-of-way dacs digital access carrier system form pair gain used united kingdom uses form time division multiple access called isdn analog pair gain came disfavor 21st century detrimental high speed dial-up modem connections support 56k incompatible digital subscriber line dsl systems 20th century subscriber loop carrier systems similar problems recent digital pair gain systems however restore 56k dsl capabilities performing functions dslam pair gain device recently term pair gain used refer multiplex/demultiplex unit used central office end users equipment used copper twisted pair digital loop carrier called remote integrated multiplexer australia installed broadband internet subscribers may disappointed informed although initial line checks successful high speed connections adsl unavailable due infrastructure issues problem pair gain lines carry high speed data | [
11181,
1967
] | Test |
4,595 | 4 | Government_Communications_Headquarters:government communications headquarters government communications headquarters gchq intelligence security organisation responsible providing signals intelligence sigint information assurance government armed forces united kingdom based doughnut suburbs cheltenham gchq responsibility country secretary state foreign commonwealth affairs part foreign office director ranks permanent secretary gchq originally established first world war government code cypher school gc cs known name 1946 second world war located bletchley park responsible breaking german enigma codes two main components gchq composite signals organisation cso responsible gathering information national cyber security centre ncsc responsible securing uk communications joint technical language service jtls small department cross-government resource responsible mainly technical language support translation interpreting services across government departments co-located gchq administrative purposes 2013 gchq received considerable media attention former national security agency contractor edward snowden revealed agency process collecting online telephone data uk via tempora programme snowden revelations began spate ongoing disclosures global surveillance guardian newspaper forced destroy incriminating files given snowden threats lawsuits uk government gchq led director gchq jeremy fleming corporate board made executive non-executive directors reporting corporate board first world war british army royal navy separate signals intelligence agencies mi1b nid25 initially known room 40 respectively 1919 cabinet secret service committee chaired lord curzon recommended peacetime codebreaking agency created task given director naval intelligence hugh sinclair sinclair merged staff nid25 mi1b new organisation initially consisted around 25–30 officers similar number clerical staff titled government code cypher school cover-name chosen victor forbes foreign office alastair denniston member nid25 appointed operational head initially control admiralty located watergate house adelphi london public function advise security codes cyphers used government departments assist provision also secret directive study methods cypher communications used foreign powers gc cs officially formed 1 november 1919 produced first decrypt prior date 19 october second world war gc cs relatively small department 1922 main focus gc cs diplomatic traffic service traffic ever worth circulating initiative lord curzon transferred admiralty foreign office gc cs came supervision hugh sinclair 1923 chief sis director gc cs 1925 organisations co-located different floors broadway buildings opposite st. james park messages decrypted gc cs distributed blue-jacketed files became known bjs 1920s gc cs successfully reading soviet union diplomatic ciphers however may 1927 row clandestine soviet support general strike distribution subversive propaganda prime minister stanley baldwin made details decrypts public second world war gc cs based largely bletchley park present-day milton keynes working understanding german enigma machine lorenz ciphers 1940 gc cs working diplomatic codes ciphers 26 countries tackling 150 diplomatic cryptosystems senior staff included alastair denniston oliver strachey dilly knox john tiltman edward travis ernst fetterlein josh cooper donald michie alan turing gordon welchman joan clarke max newman william tutte i. j jack good peter calvocoressi hugh foss outstation far east far east combined bureau set hong kong 1935 moved singapore 1939 subsequently japanese advance malay peninsula army raf codebreakers went wireless experimental centre delhi india navy codebreakers fecb went colombo ceylon kilindini near mombasa kenya gc cs renamed government communications headquarters june 1946 gchq first based eastcote 1951 moved outskirts cheltenham setting two sites – oakley benhall duncan campbell mark hosenball revealed existence gchq 1976 article time result hosenball deported uk gchq low profile media 1983 trial geoffrey prime kgb mole within gchq created considerable media interest since days second world war us british intelligence shared information gchq means shares information gets information national security agency nsa united states 1984 gchq centre political row conservative government margaret thatcher prohibited employees belonging trade union claimed joining union would conflict national security number mass national one-day strikes held protest decision seen first step wider bans trade unions appeals british courts european commission human rights unsuccessful government offered sum money employee agreed give union membership appeal ilo resulted decision government actions violation freedom association protection right organise convention ban eventually lifted incoming labour government 1997 government communications group public commercial services union pcs formed represent interested employees grades 2000 group 14 former gchq employees dismissed refusing give union membership offered re-employment three accepted intelligence services act 1994 placed activities intelligence agencies legal footing first time defining purpose british parliament intelligence security committee given remit examine expenditure administration policy three intelligence agencies objectives gchq defined working interests national security particular reference defence foreign policies majesty government interests economic wellbeing united kingdom support prevention detection serious crime introduction intelligence agency act late 1993 former prime minister jim callaghan described gchq full blown bureaucracy adding future bodies created provide oversight intelligence agencies investigate whether functions gchq carries today still necessary 1993 wake squidgygate affair gchq denied intercepting recording disclosing telephone calls british royal family late 1993 civil servant michael quinlan advised deep review work gchq following conclusion review intelligence requirements resources imposed 3 cut agency chief secretary treasury jonathan aitken subsequently held face face discussions intelligence agency directors assess savings wake quinlan review aldrich 2010 suggests sir john adye director gchq performed badly meetings aitken leading aitken conclude gchq suffering out-of-date methods management out-of-date methods assessing priorities gchq budget £850 million 1993 £ compared £125 million security service sis mi5 mi6 december 1994 businessman roger hurn commissioned begin review gchq concluded march 1995 hurn report recommended cut £100 million gchq budget large reduction suffered british intelligence agency since end world war ii j division gchq collected sigint russia disappeared result cuts cuts mostly reversed 2000 wake threats violent non-state actors risks increased terrorism organised crime illegal access nuclear chemical biological weapons david omand became director gchq 1996 greatly restructured agency face new changing targets rapid technological change omand introduced concept sinews sigint new systems allowed flexible working methods avoiding overlaps work creating fourteen domains well-defined working scope tenure omand also saw planning creation doughnut gchq modern headquarters located 176-acre site benhall near cheltenham doughnut would largest building constructed secret intelligence operations outside united states operations gchq chum hom kwok listening station hong kong ended 1994 gchq hong kong operations extremely important relationship nsa contributed investment equipment station anticipation transfer hong kong chinese government 1997 hong kong stations operations moved geraldton australia operations used gchq intelligence-gathering capabilities 1990s included monitoring communications iraqi soldiers gulf war dissident republican terrorists real ira various factions involved yugoslav wars criminal kenneth noye mid 1990s gchq began assist investigation cybercrime end 2003 gchq moved new circular hq popularly known doughnut time second-largest public-sector building project europe estimated cost £337 million new building designed gensler constructed carillion became base gchq cheltenham operations public spotlight fell gchq late 2003 early 2004 following sacking katharine gun leaked observer confidential email agents united states national security agency addressed gchq agents wiretapping un delegates run-up 2003 iraq war gchq gains intelligence monitoring wide variety communications electronic signals number stations established uk overseas listening stations cheltenham bude scarborough ascension island united states menwith hill ayios nikolaos station cyprus run british army gchq march 2010 gchq criticised intelligence security committee problems security practices failing meet targets work targeted cyber attacks revealed edward snowden guardian gchq spied foreign politicians visiting 2009 g-20 london summit eavesdropping phonecalls emails monitoring computers cases even ongoing summit via keyloggers installed summit according edward snowden gchq two principal umbrella programs collecting communications gchq also access us internet monitoring programme prism since least june 2010 prism said give national security agency fbi easy access systems nine world top internet companies including google facebook microsoft apple yahoo skype february 2014 guardian based documents provided snowden revealed gchq indiscriminately collected 1.8 million private yahoo webcam images users across world month nbc intercept based documents released snowden revealed joint threat research intelligence group cne units within gchq mission cyber operations based dirty tricks shut enemy communications discredit plant misinformation enemies operations 5 gchq operations according conference slideshow presented gchq soon becoming director gchq 2014 robert hannigan wrote article financial times topic internet surveillance stating however much large us technology companies may dislike become command control networks choice terrorists criminals gchq sister agencies tackle challenges scale without greater support private sector arguing internet users would comfortable better sustainable relationship intelligence agencies tech companies since 2013 global surveillance disclosures large us technology companies improved security become less co-operative foreign intelligence agencies including uk generally requiring us court order disclosing data however head uk technology industry group techuk rejected claims stating understood issues disclosure obligations must based upon clear transparent legal framework effective oversight rather suggested deal industry government 2015 documents obtained intercept us national security agency whistleblower edward snowden revealed gchq carried mass-surveillance operation codenamed karma police since 2008 karma police operation swept ip address internet users visiting websites program established public scrutiny oversight karma police powerful spying tool conjunction gchq programs ip addresses could cross-referenced data goal program according documents either web browsing profile every visible user internet b user profile every visible website internet 2015 gchq admitted first time court conducts computer hacking 2017 us press secretary sean spicer alleged gchq conducted surveillance us president donald trump basing allegation statements made media commentator fox news segment us government formally apologised allegations promised would repeated however surveillance russian agents pick contacts made trump campaign team run election passed us agencies 31 october 2018 gchq joined instagram well mission gather intelligence gchq long-time corresponding mission assist protection british government communications government code cypher school gc cs created 1919 overt task providing security advice gc cs security section located mansfield college oxford second world war april 1946 gc cs became gchq gchq security section moved oxford join rest organisation eastcote later year 1952 1954 intelligence mission gchq relocated cheltenham security section remained eastcote march 1954 became separate independent organisation london communications security agency lcsa 1958 renamed london communications-electronic security agency lcesa april 1965 gpo mod units merged lcesa become communications-electronic security department cesd october 1969 cesd merged gchq becoming communications-electronic security group cesg 1977 cesg relocated eastcote cheltenham cesg continued uk national technical authority information assurance including cryptography cesg manufacture security equipment worked industry ensure availability suitable products services gchq funded research areas example centre quantum computing oxford university heilbronn institute university bristol 21st century cesg ran number assurance schemes check clas commercial product assurance cpa cesg assisted products service caps late 1969 concept public key encryption developed proven james h. ellis worked cesg cesd since 1965 ellis lacked necessary number theory expertise necessary build workable system subsequently feasible implementation scheme via asymmetric key algorithm invented another staff member clifford cocks mathematics graduate fact kept secret 1997 2016 national cyber security centre established gchq located london uk authority cyber security absorbed replaced cesg well activities previously existed outside gchq centre cyber assessment cca computer emergency response team uk cert uk cyber-related responsibilities centre protection national infrastructure cpni joint technical language service jtls established 1955 drawing members small ministry defence technical language team others initially provide standard english translations organisational expressions foreign language discover correct english equivalents technical terms foreign languages discover correct expansions abbreviations language remit jtls expanded ensuing years cover technical language support interpreting translation services across uk government local public sector services gloucestershire surrounding counties jtls also produces publishes foreign language working aids crown copyright conducts research machine translation on-line dictionaries glossaries jtls co-located gchq administrative purposes gchq operates partnership equivalent agencies worldwide number bi-lateral multi-lateral relationships principal united states national security agency canada communications security establishment australia australian signals directorate new zealand government communications security bureau mechanism uk-us security agreement broad intelligence-sharing agreement encompassing range intelligence collection methods relationships alleged include shared collection methods system described popular media echelon well analysed product gchq legal basis enshrined intelligence services act 1994 section 3 follows activities involve interception communications permitted regulation investigatory powers act 2000 kind interception carried warrant issued secretary state human rights act 1998 requires intelligence agencies including gchq respect citizens rights described european convention human rights prime minister nominates cross-party members parliament intelligence security committee remit committee includes oversight intelligence security activities reports made directly parliament functions increased justice security act 2013 provide access investigatory powers judicial oversight gchq conduct exercised investigatory powers tribunal uk also independent intelligence services commissioner interception communications commissioner former senior judges investigatory powers tribunal ruled december 2014 gchq breach european convention human rights activities compliant articles 8 right privacy 10 freedom expression european convention human rights however tribunal stated february 2015 one particular aspect data-sharing arrangement allowed uk intelligence services request data us surveillance programmes prism upstream contravention human rights law prior two paragraphs additional information providing details procedures safeguards disclosed public december 2014 furthermore ipt ruled legislative framework united kingdom permit mass surveillance gchq collects analyses data bulk practice mass surveillance complements independent reports interception communications commissioner special report made intelligence security committee parliament although several shortcomings potential improvements oversight legislative framework highlighted despite inherent secrecy around much gchq work investigations carried uk government snowden disclosures admitted various abuses security services report intelligence security committee isc 2015 revealed small number staff uk intelligence agencies found misuse surveillance powers one case leading dismissal member staff gchq although laws place time make abuses criminal offence later year ruling investigatory powers tribunal found gchq acted unlawfully conducting surveillance two human rights organisations closed hearing found government breach internal surveillance policies accessing retaining communications egyptian initiative personal rights legal resources centre south africa second time ipt history made positive determination favour applicants closed session another ipt case 2015 gchq conceded january 2010 regime interception/obtaining analysis use disclosure destruction legally privileged material accordance law purposes article 8 2 european convention human rights accordingly unlawful admission made connection case brought abdel hakim belhaj libyan opponent former gaddafi regime wife fatima bouchar couple accused british ministers officials participating unlawful abduction kidnapping removal libya march 2004 gaddafi still power 2015 complaint green party mp caroline lucas british intelligence services including gchq spying mps allegedly defiance laws prohibiting gchq introduced policy march 2015 require approval prime minister minister deliberately targeting communications parliamentarian then-home secretary theresa may told parliament 2014 investigatory powers tribunal investigated complaint ruled contrary allegation law gave communications parliament special protection wilson doctrine merely acts political convention controversial gchq case determined scope judicial review prerogative powers crown residual powers common law council civil service unions v minister civil service 1985 ac 374 often known simply gchq case case prerogative order council used prime minister minister civil service ban trade union activities civil servants working gchq order issued without consultation house lords decide whether reviewable judicial review held executive action immune judicial review simply uses powers derived common law rather statute thus prerogative reviewable following list heads operational heads gchq gc cs following stations former stations operated since cold war stations former stations gchq certified training gct scheme established certify two main levels cyber security training also degree masters level courses gct scheme designed help organisations find right training also met gchq exacting standards designed assure high quality cyber security training courses training provider also undergone rigorous quality checks gct process carried apmg independent certification body scheme part national cyber security programme established government develop knowledge skills capability aspects cyber security based iisp skills framework historical drama film imitation game 2014 featured benedict cumberbatch portraying alan turing efforts break enigma code employed government code cypher school gchq set number cryptic online challenges public used attract interest recruitment starting late 1999 response 2004 challenge described excellent challenge set 2015 600,000 attempts also published gchq puzzle book 2016 sold 300,000 copies proceeds going charity second book published october 2018 gchq units gchq specifics uk agencies elsewhere | [
9732,
10116,
1930,
3594,
1169,
8978,
9233,
1941,
4118,
8726,
9502,
7199,
2208,
8356,
2213,
11172,
3495,
8104,
8744,
2219,
7979,
8750,
5423,
691,
10935,
7416,
6344,
4937,
6985,
10697,
7887,
208,
11089,
8274,
2005,
7893,
10709,
8664,
9688,
... | Test |
4,596 | 3 | Transport_triggered_architecture:transport triggered architecture computer architecture transport triggered architecture tta kind processor design programs directly control internal transport buses processor computation happens side effect data transports writing data triggering port functional unit triggers functional unit start computation similar happens systolic array due modular structure tta ideal processor template application-specific instruction-set processors asip customized datapath without inflexibility design cost fixed function hardware accelerators typically transport triggered processor multiple transport buses multiple functional units connected buses provides opportunities instruction level parallelism parallelism statically defined programmer respect obviously due large instruction word width tta architecture resembles long instruction word vliw architecture tta instruction word composed multiple slots one slot per bus slot determines data transport takes place corresponding bus fine-grained control allows optimizations possible conventional processor example software transfer data directly functional units without using registers transport triggering exposes microarchitectural details normally hidden programmers greatly simplifies control logic processor many decisions normally done run time fixed compile time however also means binary compiled one tta processor run another one without recompilation even small difference architecture two binary incompatibility problem addition complexity implementing full context switch makes ttas suitable embedded systems general purpose computing one instruction set computer architectures tta architecture one processors based built one processors based sold commercially ttas seen exposed datapath vliw architectures vliw programmed using operations tta splits operation execution multiple move operations low level programming model enables several benefits comparison standard vliw example tta architecture provide parallelism simpler register files vliw programmer control timing operand result data transports complexity number input output ports register file rf need scaled according worst case issue/completion scenario multiple parallel instructions important unique software optimization enabled transport programming called software bypassing case software bypassing programmer bypasses register file write back moving data directly next functional unit operand ports optimization applied aggressively original move transports result register file eliminated completely thus reducing register file port pressure freeing general purpose register temporary variables reduced register pressure addition simplifying required complexity rf hardware lead significant cpu energy savings important benefit especially mobile embedded systems tta processors built independent function units register files connected transport buses sockets function unit implements one operations implement functionality ranging simple addition integers complex arbitrary user-defined application-specific computation operands operations transferred function unit ports function unit may independent pipeline case function unit fully pipelined new operation takes multiple clock cycles finish started every clock cycle hand pipeline always accept new operation start requests old one still executing data memory access communication outside processor handled using special function units function units implement memory accessing operations connect memory module often called load/store units control unit special case function units controls execution programs control unit access instruction memory order fetch instructions executed order allow executed programs transfer execution jump arbitrary position executed program control unit provides control flow operations control unit usually instruction pipeline consists stages fetching decoding executing program instructions register files contain general purpose registers used store variables programs like function units also register files input output ports number read write ports capability able read write multiple registers clock cycle vary register file interconnect architecture consists transport buses connected function unit ports means sockets due expense connectivity usual reduce number connections units function units register files tta said fully connected case path unit output port every unit input ports sockets provide means programming tta processors allowing select bus-to-port connections socket enabled time instant thus data transports taking place clock cycle programmed defining source destination socket/port connection enabled bus tta implementations support conditional execution conditional execution implemented aid guards data transport conditionalized guard connected register often 1-bit conditional register bus case value guarded register evaluates false zero data transport programmed bus guard connected squashed written destination unconditional data transports connected guard always executed processors including tta processors include control flow instructions alter program counter used implement subroutines if-then-else for-loop etc assembly language tta processors typically includes control flow instructions unconditional branches jump conditional relative branches bnz subroutine call call conditional return retnz etc look corresponding assembly language instructions processors like operations tta machine instructions implemented move instructions special function unit tta implementations support conditional execution sttack first move prototype implement control flow instructions conditional move program counter tta implementations support unconditional data transports maxq typically special function unit tightly connected program counter responds variety destination addresses address used destination move different effect program counter—each relative branch condition instruction different destination address condition destination addresses used call retnz etc traditional processor architectures processor usually programmed defining executed operations operands example addition instruction risc architecture could look like following example operation adds values general-purpose registers r1 r2 stores result register r3 coarsely execution instruction processor probably results translating instruction control signals control interconnection network connections function units interconnection network used transfer current values registers r1 r2 function unit capable executing add operation often called alu arithmetic-logic unit finally control signal selects triggers addition operation alu result transferred back register r3 tta programs define operations data transports needed write read operand values operation triggered writing data triggering operand operation thus operation executed side effect triggering data transport therefore executing addition operation tta requires three data transport definitions also called moves move defines endpoints data transport taking place transport bus instance move state data transport function unit f port 1 register file r register index 2 take place bus b1 case multiple buses target processor bus utilized parallel clock cycle thus possible exploit data transport level parallelism scheduling several data transports instruction addition operation executed tta processor follows second move write second operand function unit called alu triggers addition operation makes result addition available output port 'result execution latency 'add ports associated alu may act accumulator allowing creation macro instructions abstract away underlying tta leading philosophy ttas move complexity hardware software due several additional hazards introduced programmer one delay slots programmer visible operation latency function units timing completely responsibility programmer programmer schedule instructions result neither read early late hardware detection lock processor case result read early consider example architecture operation add latency 1 operation mul latency 3 triggering add operation possible read result next instruction next clock cycle case mul one wait two instructions result read result ready 3rd instruction triggering instruction reading result early results reading result previously triggered operation case operation triggered previously function unit read value undefined hand result must read early enough make sure next operation result overwrite yet unread result output port due abundance programmer-visible processor context practically includes addition register file contents also function unit pipeline register contents and/or function unit input output ports context saves required external interrupt support become complex expensive implement tta processor therefore interrupts usually supported tta processors task delegated external hardware e.g. i/o processor need avoided using alternative synchronization/communication mechanism polling | [
1029,
7173,
9739,
2066,
7699,
5655,
10779,
10781,
6181,
8231,
3630,
6705,
7218,
2623,
2113,
7234,
3142,
2638,
1122,
3175,
8815,
630,
8822,
6268,
3197,
7313,
6815,
8352,
5793,
6818,
6821,
7852,
9391,
2224,
2226,
7858,
9911,
8890,
4286,
224... | Validation |
4,597 | 4 | HEAT_LANrev:heat lanrev heat lanrev formerly absolute manage systems lifecycle management software used system administrators automate administration tasks product includes server client agent software runs windows mac os x. vancouver-based absolute acquired lanrev pole position software december 2009 us 12.1 million cash 500,000 shares absolute common stock lanrev rebranded absolute manage february 2010 july 2015 absolute announced intention divest absolute manage sale absolute manage heat software completed october 5 2015 us 11.0 million product renamed heat lanrev 2010 robbins v. lower merion school district case plaintiffs charged two suburban philadelphia high schools secretly spied students surreptitiously remotely activating webcams embedded school-issued laptops students using home therefore infringed privacy rights schools admitted secretly snapping 66,000 webshots screenshots including webcam shots students bedrooms lanrev software used lower merion school district student laptop program overseen network technician michael perbix february 2010 perbix administrators district accused using software take undisclosed unauthorized photographs students webcams macintosh laptops lawsuit brought parents 15-year-old sophomore blake robbins allegedly accused illicit behavior seen computer webcam bedroom photographs taken laptop reported stolen allegedly used evidence disciplinary action fbi investigated incident philadelphia federal judge intervened sort issues relating lawsuit perbix previously praised theft track name feature lets administrators remotely photograph potential thieves computer reported stolen noting youtube video produced ’ excellent feature yes used yes gleaned results us fantastic feature trying to—especially ’ school environment lot laptops ’ worried know laptops getting missing ’ actually laptops thought stolen actually still classroom misplaced time found back turn tracking know good twenty snapshots teacher students using machines classroom lanrev new owner absolute software denounced use software illegal purpose emphasizing theft recovery left law enforcement professionals denied knowledge complicity either perbix school district actions absolute stated next update lanrev would permanently disable theft track | [
10747,
6797,
7406,
7983
] | Validation |
4,598 | 1 | Database_engine:database engine database engine storage engine underlying software component database management system dbms uses create read update delete crud data database database management systems include application programming interface api allows user interact underlying engine without going user interface dbms term database engine frequently used interchangeably database server database management system 'database instance refers processes memory structures running database engine many modern dbms support multiple storage engines within database example mysql supports innodb well myisam storage engines transactional additional engine types include database bits laid storage data structures groupings take advantage known effective algorithms retrieve manipulate properties typically storage designed meet requirements various areas extensively utilize storage including databases dbms operation always simultaneously utilizes several storage types e.g. memory external storage respective layout methods principle database storage viewed linear address space every bit data unique address address space practice small percentage addresses kept initial reference points also requires storage data accessed indirection using displacement calculations distance bits reference points data structures define access paths using pointers needed data effective manner optimized needed data access operations database operation resides simultaneously several types storage forming storage hierarchy nature contemporary computers database part inside computer hosts dbms resides partially replicated volatile storage data pieces database processed/manipulated reside inside processor possibly processor caches data read from/written memory typically computer bus far typically volatile storage components computer memory communicating data transferred to/from external storage typically standard storage interfaces networks e.g. fibre channel iscsi storage array common external storage unit typically storage hierarchy fast cache typically consisting volatile fast dram connected via standard interfaces drives possibly different speeds like flash drives magnetic disk drives non-volatile drives may connected magnetic tapes typically least active parts large database may reside database backup generations typically correlation exists currently storage speed price faster storage typically volatile data structure abstract construct embeds data well defined manner efficient data structure allows manipulation data efficient ways data manipulation may include data insertion deletion updating retrieval various modes certain data structure type may effective certain operations ineffective others data structure type selected upon dbms development best meet operations needed types data contains type data structure selected certain task typically also takes consideration type storage resides e.g. speed access minimal size storage chunk accessed etc. dbmss database administrators flexibility select among options data structures contain user data performance reasons sometimes data structures selectable parameters tune database performance databases may store data many data structure types common examples following contrast conventional row-orientation relational databases also column-oriented correlational way store data particular structure general substantial performance improvement gained different types database objects usually utilized together laid storage proximity clustered usually allows retrieve needed related objects storage minimum number input operations sometimes substantially time consuming even in-memory databases clustering provides performance advantage due common utilization large caches input-output operations memory similar resulting behavior example may beneficial cluster record item stock respective order records decision whether cluster certain objects depends objects utilization statistics object sizes caches sizes storage types etc indexing technique storage engines use improving database performance many types indexes share common property reduce need examine every entry running query large databases reduce query time/cost orders magnitude simplest form index sorted list values searched using binary search adjacent reference location entry analogous index back book data multiple indexes employee database could indexed last name hire date indexes affect performance results database designers add remove indexes without changing application logic reducing maintenance costs database grows database usage evolves indexes speed data access consume space database must updated time data altered indexes therefore speed data access slow data maintenance two properties determine whether given index worth cost | [
4614,
11017,
1549,
2066,
3219,
2068,
10518,
2456,
5401,
5403,
7453,
1950,
9503,
9634,
10921,
5546,
9010,
6451,
10292,
7863,
3641,
11324,
6721,
10565,
4680,
8393,
6346,
2130,
7506,
2901,
9942,
7767,
736,
7392,
3427,
8291,
6245,
9828,
8295,
... | Test |
4,599 | 4 | BitSight:bitsight bitsight cybersecurity ratings company analyzes companies government agencies educational institutions based back bay boston security ratings delivered bitsight used banks insurance companies among organizations company rated 100,000 businesses respect cybersecurity bitsight founded 2011 currently united states-based international employees 2016 bitsight raised us 40 million funding month september 2014 bitsight acquired anubisnetworks portugal-based cybersecurity firm tracks real-time data threats september 2016 bitsight raised 40 million series c round led ggv capital participation flybridge capital partners globespan capital partners menlo ventures shaun mcconnon vc divisions comcast ventures liberty global ventures singtel innov8 shaun mcconnon stepped ceo bitsight july 2017 remains executive chairman board ceo position filled tom turner june 2018 bitsight closed 60 million series funding bringing company total funding 155 million bitsight series financing led warburg pincus participation existing investors menlo ventures ggv capital singtel innov8 2018 company located cambridge purchased property order shift back bay bitsight currently located forbes estimated bitsight revenue us 100 million 2018 organizations purchase bitsight services order understand security risks associated sharing sensitive data business partners 2018 bitsight serves clients including lowe aig safeway produced 100,000 ratings respect cybersecurity companies bitsight assembles models produce company ratings based scale enables insurers rule ability businesses receive coverage respect services amy feldman forbes writes customers pay subscription basis annual fees ranging thousand dollars analyze single company 1 million review thousands suppliers similar credit score bitsight ratings range 250 900 bitsight released report examining ransomware infection across six industry sectors compiled 18,996 companies security ratings included examination ransomware infection across sectors education energy/utilities finance government healthcare retail companies security rating services spaces include riskrecon securityscorecard upguard others | [] | Test |
4,600 | 4 | Joint_Cybernetic_Operations_Command_(Italy):joint cybernetic operations command italy joint cybernetic operations command cioc italian cyberwarfare military unit project italian cyber command modelled united states cyber command envisaged 2015 defence white paper joint cybernetic operations command established 30 september 2017 intended achieve initial operational capability end 2018 full operational capability 2019 joint cybernetic operations command tasks areas information security computer network operations cyber warfare cyber security designed force provider according cioc commander air brigade general francesco vestito command two operational focus cyber-defence cyber network-defence cyber defence related static defence protection network carried cooperation rest italian military order ensure integrity network availability data flows cyber network-defence related ability carry vulnerability assessment penetration test order provide quick intervention joint cybernetic operations command supports protects military operations conducts offensive operations functions coordinating body italian armed forces italian cyber security institutions according defence undersecretary gioacchino alfano command intended operate mainly joint inter-agency nato contexts well coordination university economic worlds regard domestic cyber security organization department information security leadership via deputy director responsible cyber security operational arms joint cybernetic operations command state police cnaipic centro anticrimine informatico per la protezione delle infrastrutture critiche critical facilities anti-informatic crime protection centre well national cert ministries linked national cert cyber infrastructures command directly dependent chief defence staff defence staff italian armed forces particular depends deputy commander operations joint cybernetic operations command consists command staff element personnel section operational unit training unit cyber branch tlc school chiavari experimental unit tasked study malaware countermeasures command recruit also personnel part military operational unit handles cyber operational cells actual operational pawns cells tasked operate field field commander may employ order achieve operational goals command located near military intelligence service centro intelligence interforze castel malnome near rome far leonardo da vinci–fiumicino airport | [
9688,
3796
] | Test |
4,601 | 6 | Tagsistant:tagsistant tagsistant semantic file system linux kernel written c based fuse unlike traditional file systems use hierarchies directories locate objects tagsistant introduces concept tags computing file system type data store could used store retrieve update files file uniquely located path user must know path advance access file path necessarily include information content file tagsistant uses complementary approach based tags user create set tags apply tags files directories objects devices pipes ... user search objects match subset tags called query kind approach well suited managing user contents like pictures audio recordings movies text documents incompatible system files like libraries commands configurations univocity path security requirement prevent access wrong content tagsistant file system features four main directories tags created sub directories codice_1 directory used queries complying syntax subquery arbitrarily long list tags concatenated directories portion path delimited codice_1 codice_5 actual query codice_6 operator joins results different sub-queries one single list codice_5 operator ends query returned result following query object must tagged codice_9 codice_10 codice_9 codice_12 object tagged codice_10 codice_12 codice_9 retrieved query syntax deliberately violates posix file system semantics allowing path token descendant like codice_16 codice_9 appears twice consequence recursive scan tagsistant file system exit error endlessly loop done unix codice_18 ~/tagsistant_mountpoint find tags/ tags/ tags/document tags/document/+ tags/document/+/document tags/document/+/document/+ tags/document/+/document/+/document tags/document/+/document/+/document/+ drawback balanced possibility list tags inside query order query codice_19 completely equivalent codice_20 codice_21 equivalent codice_22 codice_5 element precise purpose restoring posix semantics path codice_24 refers traditional directory recursive scan path properly perform tagsistant features simple reasoner expands results query including objects tagged related tags relation two tags established inside codice_25 directory following three level pattern codice_27 element includes is_equivalent include rock tag music tag unix command codice_28 used reasoner recursively resolve relations allowing creation complex structures web relations created inside codice_25 directory constitutes basic form ontology tagsistant features autotagging plugin stack gets called file symlink written plugin called declared mime type matches list working plugins released tagsistant 0.6 limited tagsistant file system corresponding repository containing codice_38 directory objects actually saved codice_39 file holding tagging information sqlite database mysql database engine specified codice_40 argument codice_39 file empty another file named codice_42 glib ini store repository configuration tagsistant 0.6 compatible mysql sqlite dialects sql tag reasoning tagging resolution porting logic sql dialects possible differences basic constructs especially intersect sql keyword must considered codice_38 directory introduced provide quick way access objects without using tags objects listed inode number prefixed codice_44 directory features read-only files containing usage statistics file codice_45 holds compile time information current repository configuration highlighted relying external database store tags tagging information could cause complete loss metadata database gets corrupted highlighted using flat namespace tends overcrowd codice_1 directory could mitigated introducing triple tags | [
2432,
1825,
9762,
5546,
7022,
7983,
3571,
2045,
2558
] | Validation |
4,602 | 8 | URL_Template:url template url template way specify url includes parameters must substituted url resolved standardized rfc 6570 march 2012 syntax usually enclose parameter braces example convention parameter percent encoded unless follows question mark building urls björk firstname =björk lastname =guðmundsdóttir would | [
2945
] | None |
4,603 | 3 | SSSE3:ssse3 supplemental streaming simd extensions 3 ssse3 sse3s simd instruction set created intel fourth iteration sse technology ssse3 first introduced intel processors based core microarchitecture june 26 2006 woodcrest xeons ssse3 referred codenames tejas new instructions tni merom new instructions mni first processor designs intended support ssse3 contains 16 new discrete instructions instruction act 64-bit mmx 128-bit xmm registers therefore intel materials refer 32 new instructions according intel ssse3 provide 32 instructions represented 14 mnemonics accelerate computations packed integers include table satsw x read 'saturate signed word takes signed integer x converts −32768 less −32768 +32767 greater 32767 leaves unchanged otherwise normal intel architecture bytes 8 bits words 16 bits dwords 32 bits 'register refers mmx xmm vector register nawaf 9 | [
9337,
7938,
3459,
9092,
2821,
1798,
3973,
4491,
4108,
4237,
5645,
6924,
9611,
5649,
6804,
4886,
6038,
3352,
8855,
9111,
7963,
9369,
9500,
2719,
5883,
2088,
3883,
2094,
9391,
8120,
8506,
2237,
1085,
5309,
8125,
833,
6978,
6339,
5444,
7234,... | Validation |
4,604 | 1 | SAP_HANA:sap hana sap hana in-memory column-oriented relational database management system developed marketed sap se primary function database server store retrieve data requested applications addition performs advanced analytics predictive analytics spatial data processing text analytics text search streaming analytics graph data processing includes extract transform load etl capabilities well application server early development sap hana number technologies developed acquired sap se included trex search engine in-memory column-oriented search engine p*time in-memory online transaction processing oltp platform acquired sap 2005 maxdb in-memory livecache engine first major demonstration platform 2008 teams sap se hasso plattner institute stanford university demonstrated application architecture real-time analytics aggregation former sap se executive vishal sikka mentioned architecture hasso new architecture name hana stabilized people referred product new database software previously called sap high-performance analytic appliance first product shipped late november 2010 mid-2011 technology attracted interest experienced business customers considered early days hana support sap netweaver business warehouse announced september 2011 availability november 2012 sap promoted aspects cloud computing october 2012 sap announced platform service offering called sap hana cloud platform variant called sap hana one used smaller amount memory may 2013 managed private cloud offering called hana enterprise cloud service announced may 2013 business suite hana became available enabling customers run sap enterprise resource planning functions hana platform s/4hana released 2015 written specifically hana platform combines functionality erp crm srm others single hana system s/4hana intended simplified business suite replacing earlier generation erp systems likely sap focus innovations s/4hana customers using non-hana systems raised concerns locked sap products since s/4hana requires sap hana system run customers running sap business suite applications hardware certified sap would need migrate sap-certified hana database choose features offered s/4hana rather versioning software utilizes service packs referred support package stacks sps updates support package stacks released every 6 months november 2016 sap announced sap hana 2 offers enhancements multiple areas database management application management includes two new cloud services text analysis earth observation analysis hana customers upgrade hana 2 sps10 customers running sps9 must first upgrade sps12 upgrading hana 2 sps01 key distinctions hana previous generation sap systems column-oriented in-memory database combines olap oltp operations single system thus general sap hana oltap system storing data main memory rather disk provides faster data access extension faster querying processing storing data in-memory confers performance advantages costly form data storage observing data access patterns 85 data enterprise system may infrequently accessed therefore cost-effective store frequently accessed hot data in-memory less frequently accessed warm data stored disk approach sap termed dynamic tiering column-oriented systems store data single column location rather storing data single row location row-oriented systems enable performance improvements olap queries large datasets allows greater vertical compression similar types data single column read times column-stored data fast enough consolidated views data performed fly removing need maintaining aggregate views associated data redundancy although row-oriented systems traditionally favored oltp in-memory storage opens techniques develop hybrid systems suitable olap oltp capabilities removing need maintain separate systems oltp olap operations sap hana information modeling also known sap hana data modeling part hana application development modeling methodology expose operational data end user reusable virtual objects named calculation views used modelling process sap hana manages concurrency use multiversion concurrency control mvcc gives every transaction snapshot database point time mvcc database needs update item data overwrite old data new data instead mark old data obsolete add newer version scale-out environment hana keep volumes petabyte data in-memory returning query results second however ram still much expensive disk-space scale-out feasible certain time critical use-cases sap hana includes number analytic engines various kinds data processing business function library includes number algorithms made available address common business data processing algorithms asset depreciation rolling forecast moving average predictive analytics library includes native algorithms calculating common statistical measures areas clustering classification time series analysis hana incorporates open source statistical programming language r supported language within stored procedures column-store database offers graph database capabilities graph engine processes cypher query language also visual graph manipulation via tool called graph viewer graph data structures stored directly relational tables hana column store pre-built algorithms graph engine include pattern matching neighborhood search single shortest path strongly connected components typical usage situations graph engine include examples like supply chain traceability fraud detection logistics route planning hana also includes spatial database engine implements spatial data types sql extensions crud operations spatial data hana certified open geospatial consortium integrates esri arcgis geographic information system addition numerical statistical algorithms hana perform text analytics enterprise text search hana search capability based “ fuzzy ” fault-tolerant search much like modern web-based search engines results include statistical measure relevant search results search criteria include threshold accuracy results analyses available include identifying entities people dates places organizations requests problems entity extraction catered specific use cases voice customer customer preferences expectations enterprise i.e mergers acquisitions products organizations public sector public persons events organizations custom extraction dictionaries also implemented besides database data analytics capabilities sap hana web-based application server hosting user-facing applications tightly integrated database analytics engines hana xs advanced engine xsa natively works node.js javaee languages runtimes xsa based cloud foundry architecture thus supports notion “ bring language ” allowing developers develop deploy applications written languages runtimes xsa implements natively well deploying applications microservices xsa also allows server-side javascript xsjs supporting application server suite application lifecycle management tools allowing development deployment monitoring user-facing applications hana deployed on-premises cloud number cloud service providers hana deployed on-premises new appliance certified hardware vendor alternatively existing hardware components storage network used part implementation approach sap calls tailored data center integration tdi hana certified run multiple operating systems including suse linux enterprise server red hat enterprise linux supported hardware platforms on-premise deployment include intel 64 power systems system designed support horizontal vertical scaling multiple cloud providers offer sap hana infrastructure service basis including sap also offer cloud services form sap hana licensing primarily divided two categories runtime license used run sap applications sap business warehouse powered sap hana sap s/4hana full use license used run sap non-sap applications licensing used create custom applications part full use license features grouped editions targeting various use cases addition capabilities streaming etl licensed additional options march 9 2017 sap hana available express edition streamlined version run laptops resource-limited environments license sap hana express edition free charge even productive use 32 gb ram additional capacity increases purchased | [
9344,
11136,
6018,
3,
3462,
6920,
1935,
3219,
10389,
7446,
151,
1816,
10518,
5403,
9631,
11551,
4781,
10286,
7983,
10413,
823,
5691,
2496,
2880,
5832,
5833,
3660,
7248,
3414,
7767,
9305,
5210,
4058,
7930,
11613,
11233,
4194,
9828,
4197,
3... | None |
4,605 | 4 | Download_Valley:download valley download valley cluster software companies israel producing delivering adware installed alongside downloads software primary purpose monetize shareware downloads software items commonly browser toolbars adware browser hijackers spyware malware another group products download managers possibly designed induce trick user install adware downloading piece desired software mobile app certain source term refer actual geographical region valley pun based silicon valley common practice using downloads deliver bundled software users many companies located tel aviv surrounding region used israeli media well reports related business download managers download valley companies used major download portals software hosts including download.com cnet softonic.com sourceforge smaller adware companies sweetpacks smilebox purchased larger company perion networks 41 million 32 million ibario claimed worth 100 million early 2014 conduit valued 1.4 billion jp morgan 2012 revenues frequently near 100 million several 100 million large companies perion 87 million 2013 conduit claimed 500 million 2012 much lower operating net income perion 3.88 million operating 310.000 net income 2013 numbers highly volatile since technical legal preconditions quickly change profit opportunities 2013 2014 changes web browsers prevent unwanted toolbar installs new policy microsoft towards advertising lead expectation main profit methods companies would soon work longer perion stock lost roughly two thirds value 2014 13.25 january 4.53 december 29 many products may designed way install solicited user downloads desired product create revenue software usually distributed free may use invasive harmful techniques achieve installs installers may installed adware frequently attempts hide identity prevent disabling removal restoring previous settings spy user system browsing habits download install unwanted software open backdoors possibly malicious attacks many security software vendors list products category potentially unwanted programs pup also pus pua grayware offer detection removal category distinct genuine malware used software companies opposed criminal underground programmers threaten practice litigation 2013 download valley company ibario accused security software vendor trend micro distributing sefnit/mevade malware installer related ukrainian company considered immediately responsible malware unnamed download valley executive admitted wall street journal companies employ teams 15 developers break security suites try block software | [
5607,
106,
107,
9771,
877,
4013,
5935,
3473,
1046,
9055,
10392,
7515,
4956,
510,
127
] | Validation |
4,606 | 9 | CLX_(Common_Lisp):clx common lisp clx standard x window system client library common lisp equivalent xlib library c programming language clx written solely common lisp use xlib clx contains data types functions macros interact x server sending requests receiving events replies | [
4865,
2438,
9865,
2062,
9877,
4122,
1448,
9128,
4779,
8883,
6969,
6201,
7867,
8258,
8771,
4550,
11083,
8908,
1613,
9299,
1365,
7896,
2392,
6493,
7267,
3176,
2667,
2804
] | Validation |
4,607 | 4 | MobileNotifier:mobilenotifier mobilenotifier free open-source alert messaging system written peter hajas jailbroken ios devices including iphone ipod touch ipad ios 4.0 mobile notifier written reproduction android notifications currently released bsd license lead developer peter hajas left work apple project continued developers software hooks operating system replace built-in modal notification user interface maintains queue unread messages user late may 2011 mobilenotifier 230,000 downloads mobilenotifier developed conjunction rensselaer center open source software rensselaer polytechnic institute mobilenotifier beta released 29 may 2011 included following new features solved following issues released 4 may 2011 included following new features solved following issues released 27 february 2011 included following new features solved following issues released 18 february 2011 included following new features solved following issues mobilenotifier beta1 officially released solved following issues | [
9732,
10470,
9320,
6539,
5647,
7983,
2045,
11221,
3286,
4957
] | Test |
4,608 | 9 | ALCOR:alcor alcor early computer language definition created alcor group consortium universities research institutions manufacturers europe united states founded 1959 60 members 1966 group aim common compiler specification subset algol 60 algol meeting copenhagen 1958 alcor acronym algol converter addition naming alcor astronomical reference algol named addition programming application star algol way alcor also named astronomical reference star alcor europe high level machine architecture algol 60 devised emulated various real computers among siemens 2002 ibm 7090 algol manual published provided detailed introduction features language many program snippets four appendixes | [
512,
1952,
8262,
1610,
1392,
5496
] | Test |
4,609 | 5 | General_Packet_Radio_Service:general packet radio service general packet radio service gprs packet oriented mobile data standard 2g 3g cellular communication network global system mobile communications gsm gprs established european telecommunications standards institute etsi response earlier cdpd i-mode packet-switched cellular technologies maintained 3rd generation partnership project 3gpp gprs typically sold according total volume data transferred billing cycle contrast circuit switched data usually billed per minute connection time sometimes one-third minute increments usage gprs bundled data cap may charged per mb data speed limited disallowed gprs best-effort service implying variable throughput latency depend number users sharing service concurrently opposed circuit switching certain quality service qos guaranteed connection 2g systems gprs provides data rates 56–114 kbit/sec 2g cellular technology combined gprs sometimes described 2.5g technology second 2g third 3g generations mobile telephony provides moderate-speed data transfer using unused time division multiple access tdma channels example gsm system gprs integrated gsm release 97 newer releases gprs core network allows 2g 3g wcdma mobile networks transmit ip packets external networks internet gprs system integrated part gsm network switching subsystem gprs extends gsm packet circuit switched data capabilities makes following services possible sms gprs used sms transmission speed 30 sms messages per minute may achieved much faster using ordinary sms gsm whose sms transmission speed 6 10 sms messages per minute gprs supports following protocols tcp/ip used phone one ip addresses allocated gprs store forward ip packets phone even handover tcp restores packets lost e.g due radio noise induced pause devices supporting gprs grouped three classes class device must service gprs gsm networks together effectively needs two radios avoid hardware requirement gprs mobile device may implement dual transfer mode dtm feature dtm-capable mobile handle gsm packets gprs packets network coordination ensure types transmitted time devices considered pseudo-class sometimes referred simple class networks supported dtm since 2007 usb 3g/gprs modems terminal-like interface usb v.42bis rfc 1144 data formats models include external antenna connector modem cards laptop pcs external usb modems available similar shape size computer mouse pendrive gprs connection established reference access point name apn apn defines services wireless application protocol wap access short message service sms multimedia messaging service mms internet communication services email world wide web access order set gprs connection wireless modem user must specify apn optionally user name password rarely ip address provided network operator gsm module gprs modules similar modems ’ one difference modem external piece equipment whereas gsm module gprs module integrated within electrical electronic equipment embedded piece hardware gsm mobile hand complete embedded system comes embedded processors dedicated provide functional interface user mobile network upload download speeds achieved gprs depend number factors multiple access methods used gsm gprs based frequency division duplex fdd tdma session user assigned one pair up-link down-link frequency channels combined time domain statistical multiplexing makes possible several users share frequency channel packets constant length corresponding gsm time slot down-link uses first-come first-served packet scheduling up-link uses scheme similar reservation aloha r-aloha means slotted aloha s-aloha used reservation inquiries contention phase actual data transferred using dynamic tdma first-come first-served channel encoding process gprs consists two steps first cyclic code used add parity bits also referred block check sequence followed coding possibly punctured convolutional code coding schemes cs-1 cs-4 specify number parity bits generated cyclic code puncturing rate convolutional code coding schemes cs-1 cs-3 convolutional code rate 1/2 i.e input bit converted two coded bits coding schemes cs-2 cs-3 output convolutional code punctured achieve desired code rate coding scheme cs-4 convolutional coding applied following table summarises options least robust fastest coding scheme cs-4 available near base transceiver station bts robust coding scheme cs-1 used mobile station ms away bts using cs-4 possible achieve user speed 20.0 kbit/s per time slot however using scheme cell coverage 25 normal cs-1 achieve user speed 8.0 kbit/s per time slot 98 normal coverage newer network equipment adapt transfer speed automatically depending mobile location addition gprs two gsm technologies deliver data services circuit-switched data csd high-speed circuit-switched data hscsd contrast shared nature gprs instead establish dedicated circuit usually billed per minute applications video calling may prefer hscsd especially continuous flow data endpoints following table summarises possible configurations gprs circuit switched data services multislot class determines speed data transfer available uplink downlink directions value 1 45 network uses allocate radio channels uplink downlink direction multislot class values greater 31 referred high multislot classes multislot allocation represented example 5+2 first number number downlink timeslots second number uplink timeslots allocated use mobile station commonly used value class 10 many gprs/egprs mobiles uses maximum 4 timeslots downlink direction 2 timeslots uplink direction however simultaneously maximum number 5 simultaneous timeslots used uplink downlink network automatically configure either 3+2 4+1 operation depending nature data transfer high end mobiles usually also supporting umts also support gprs/edge multislot class 32 according 3gpp ts 45.002 release 12 table b.1 mobile stations class support 5 timeslots downlink 3 timeslots uplink maximum number 6 simultaneously used timeslots data traffic concentrated downlink direction network configure connection 5+1 operation data transferred uplink network time change constellation 4+2 3+3 best reception conditions i.e best edge modulation coding scheme used 5 timeslots carry bandwidth 5*59.2 kbit/s 296 kbit/s uplink direction 3 timeslots carry bandwidth 3*59.2 kbit/s 177.6 kbit/s multislot class identifies following different multislot class specification detailed annex b 3gpp technical specification 45.002 multiplexing multiple access radio path maximum speed gprs connection offered 2003 similar modem connection analog wire telephone network 32–40 kbit/s depending phone used latency high round-trip time rtt typically 600–700 ms often reaches 1s gprs typically prioritized lower speech thus quality connection varies greatly devices latency/rtt improvements via example extended ul tbf mode feature generally available also network upgrades features available certain operators enhancements active round-trip time reduced resulting significant increase application-level throughput speeds gprs opened 2000 packet-switched data service embedded channel-switched cellular radio network gsm gprs extends reach fixed internet connecting mobile terminals worldwide cellpac protocol developed 1991-1993 trigger point starting 1993 specification standard gprs etsi smg especially cellpac voice data functions introduced 1993 etsi workshop contribution anticipate later known roots gprs workshop contribution referenced 22 gprs related us-patents successor systems gsm/gprs like w-cdma umts lte rely key gprs functions mobile internet access introduced cellpac according study history gprs development bernhard walke student peter decker inventors gprs – first system providing worldwide mobile internet access | [
11267,
11655,
2701,
3086,
1424,
529,
10770,
8472,
11545,
2458,
5274,
5531,
669,
5659,
1695,
8736,
6178,
2979,
5028,
167,
10410,
7723,
11181,
4399,
2996,
5175,
4283,
2492,
3140,
7877,
2502,
199,
456,
10053,
7498,
9038,
464,
9809,
4691,
854... | None |
4,610 | 4 | Imprivata:imprivata imprivata security company based lexington massachusetts founded 2002 imprivata develops sells onesign platform securing employee access desktops networks applications using single sign-on 2017 imprivata 1,700 clients several offices across america europe australia imprivata customers primarily healthcare industries imprivata became public company june 25 2014 listed new york stock exchange acquired private equity investment firm thoma bravo llc 2016 imprivata founded phil scarfo david ting developed identity management technology working polaroid corporation ’ small business incubator company shipped first product onesign enterprise single sign-on appliance 2004 2005 imprivata expanded europe africa middle east 2006 imprivata founder david ting selected infoworld one top 25 chief technology officers year 2009 imprivata acquired assets identiphi manufacturer reseller biometric technology including safsolution product line 2011 acquired assets validus medical systems santa cruz california incorporated imprivata cortext technology july 2016 imprivata announced agreed acquired thoma bravo private equity firm based san francisco 19.25 per share estimated total 544 million omar hussain chief executive time imprivata onesign helps companies manage user access authentication product reviews suggest onesign allows companies enable enterprise applications single sign without requiring custom scripting modifications existing directories onesign also strengthen user authentication desktops networks replacing passwords range authentication options include finger biometrics proximity cards smart cards many national government id cards one-time-password tokens employee ’ physical location product reviews also comment onesign ability simplify compliance reporting consolidating employee strong authentication application access events single database | [] | Test |
4,611 | 2 | Linux_Router_Project:linux router project linux router project lrp defunct networking-centric micro linux distribution released versions lrp small enough fit single 1.44mb floppy disk made building maintaining routers access servers thin servers thin clients network appliances typically embedded systems next trivial lrp conceived primarily developed dave cinege 1997 2002 began originally 'router floppy evolved streamlined general purpose network operating system lrp oldest embedded linux distribution formed whole part basis many embedded system distributions commercial products followed several parts developed specifically enhanced lrp still found common usage today posixness busybox dave cinege worked version 4.0 rewrite lrp late 2000 january 2001 began testing ideas proof concept code claimed radical departure status quo surprise new direction seemed ideal prompting abandon work done lrp 4.0 begin scratch new os named lrp 5.0 lrp 5.0 development headed towards complete rewrite reimplementation linux userland new standard design outside posix specification stated purpose provide modern standard base operating system suitable application including embedded systems appliances servers desktop computers cinege however stopped work several months later due financial reasons refused release work even name os due animosity towards computer industry perceived plundering open source authors work large corporations may 6 2003 cinege updated lrp website reflect project abandoned | [
516,
8837,
2825,
8957,
7435,
10127,
2321,
4887,
10394,
1436,
673,
3745,
10530,
9253,
10149,
11305,
7082,
3885,
686,
7854,
7983,
2738,
4790,
439,
56,
59,
3007,
3903,
4673,
10303,
10433,
2375,
4039,
5959,
5322,
8907,
9927,
11086,
7887,
1045... | None |
4,612 | 9 | QED_manifesto:qed manifesto qed manifesto proposal computer-based database mathematical knowledge strictly formalized proofs checked automatically q.e.d means latin meaning demonstrated idea project arose 1993 mainly impetus robert boyer goals project tentatively named qed project project qed outlined qed manifesto document first published 1994 input several researchers explicit authorship deliberately avoided dedicated mailing list created two scientific conferences qed took place first one 1994 argonne national laboratories second 1995 warsaw organized mizar group project seems died 1996 never produced discussions plans 2007 paper freek wiedijk identifies two reasons failure project order importance nonetheless qed-style projects regularly proposed mizar library successfully formalized large portion undergraduate mathematics largest library another project metamath proof database 2014 twenty years qed manifesto workshop organized part vienna summer logic | [
4455,
369,
5585,
10641,
9492,
11028,
4791,
9816,
8924,
4446
] | Test |
4,613 | 1 | RETAIN:retain retain mainframe based database system accessed via ibm 3270 terminals likely emulators used internally within ibm providing service support ibm field personnel customers acronym retain stands remote technical assistance information network historically two different similar systems called retain first dating mid-1960s system provided technical information people ibm field engineering division form short bulletins tips organized according machine type number software according software component id number information accessible using simple query commands ibm service branch office terminals terminals supported early retain system typewriter-type terminals ibm 2740 terminals also used access ibm field instruction system fis provided education form programmed instruction courseware retain system built software framework fis fact early support retain actually written language course system primarily used provide field support system/360 family mainframe systems although used also disseminate technical information older systems 1970 concurrent announcement system/370 next generation mainframes system/360 new system announced called retain/370 system designed use special technical support centers located regional centers rather branch office new system designed support display terminals rather old typewriter-based ones special version 2915 display originally designed airline reservations systems sabre used 2915 small keyboard-display driven large electronic controller data interchange unit ibm 2948 2948 supported 31 display terminals located within hundred feet cost display system large controller prevented 2915 terminals utilized branch offices thus use regional support centers system older retain system continued used several years afterwards running parallel retain/370 still providing direct support branch-office terminals sometimes called retain/360 system although designation never formalized time retain/370 became available via 3270 terminals branch offices old retain system phased retain/370 renamed simply retain retain/370 ran special applications designed technical support center use powerful feature full-text search engine enabling text documents system retrieved using boolean search requests similar concept full-text search engines use today internet google altavista although limited searching individual words combinations words without reference word-adjacency retain/370 first ibm system deployed large scale capability search engine component retain called iris interpretive retrieval information system confused non-ibm software systems name ... ibm never sold search engine product trademark issue mid-1970s retain expanded permit multiple copies database hosted geographically distributed systems retain custom-built data bank manager served foundation retain applications iris search engine modified support mirroring file updates take place automatically across network manner nearly invisible application programs providing high level data integrity change retain hosts created two us locations two europe two south america two japan applications developed ibm programmers raleigh nc moved boulder colorado 1976 work done north harbour uk registered users system numbered thousands 60 countries time system/370 announced along corresponding retain/370 system ibm announced new family computers would equipped permit remote diagnosis hardware problems system/370 installation model 145 telecommunications adapter included capable used remote support hardware diagnostic programs written allow control via remote connection applications retain system could controlled ibm specialists located ibm support center chicago managed paul rushton also including original plant manufacture cpu form support dubbed data link hardware connection made communications device called ibm 2955 adapter stripped-down variant 2701 communications controller could connect 600 bit/s retain system run diagnostics mainly run mostly diagnostics could run locally ibm ce time specialized applications developed programs analyze logouts generated hardware malfunctions i.e machine check interruptions time concept remote support extended software well 1973 1974 special application mvs system could connected via retain ibm support center memory dumps system data could examined remotely application also permitted download software fixes ibm program temporary fixes although 2955 supported 6-bit character code similar 2740 terminal binary transfer memory dump software updates accomplished protocol similar base-64 encoding scheme used today internet email attachments years several projects aimed supplant retain functionality shown lasting presence despite | [
3323
] | None |
4,614 | 1 | DBase:dbase dbase also stylized dbase one first database management systems microcomputers successful day dbase system includes core database engine query system forms engine programming language ties components together dbase underlying file format file widely used applications needing simple format store structured data dbase originally published ashton-tate microcomputer operating system cp/m 1980 later ported apple ii ibm pc computers running dos pc platform particular dbase became one best-selling software titles number years major upgrade released dbase iii ported wider variety platforms adding unix vms mid-1980s ashton-tate one big three software publishers early business software market others lotus development wordperfect starting mid-1980s several companies produced variations dbase product especially dbase programming language included foxbase+ later renamed foxpro clipper so-called xbase products many technically stronger dbase could push aside market changed disastrous introduction dbase iv whose design stability poor many users switched products time growing use ibm-invented sql structured query language database products another factor user adoption microsoft windows desktop computers shift toward sql windows put pressure makers xbase products invest major redesign provide new capabilities early 1990s xbase products constituted leading database platform implementing business applications size impact xbase market go unnoticed within one year three top xbase firms acquired larger software companies following decade original xbase products faded prominence several disappeared products known dbase still exist owned dbase llc late 1960s fred thompson jet propulsion laboratory jpl using tymshare product named retrieve manage database electronic calculators time expensive products 1971 thompson collaborated jack hatfield programmer jpl write enhanced version retrieve became jpldis project jpldis written fortran univac 1108 mainframe presented publicly 1973 hatfield left jpl 1974 jeb long took role working jpl contractor c. wayne ratliff entered office football pool interest game felt could win pool processing post-game statistics found newspapers order turned attention database system chance came across documentation jpldis used basis port ptdos kit-built imsai 8080 microcomputer called resulting system vulcan mr. spock star trek george tate hal lashlee built two successful start-up companies discount software one first sell pc software programs mail consumers software distributors one first wholesale distributors pc software world entered agreement ratliff market vulcan formed ashton-tate name ashton chosen purely marketing reasons ratliff ported vulcan ptdos cp/m hal pawluk handled marketing nascent company decided change name business-like dbase pawluk devised use lower case all-caps base create distinctive name pawluk suggested calling new product version two ii suggest less buggy initial release dbase ii result became standard cp/m application along wordstar supercalc 1981 ibm commissioned port dbase then-in-development pc resultant program one initial pieces software available ibm pc went sale fall 1981. dbase one professional programs platform time became huge success customer base included end-users increasing number value added resellers vars purchased dbase wrote applications sold completed systems customers may 1983 release dbase ii runtime entrenched dbase var market allowing vars deploy products using lower-cost runtime system although critics stated dbase difficult learn success created many opportunities third parties 1984 1,000 companies offered dbase-related application development libraries code add functionality applications using dbase ii runtime consulting training how-to books company san diego today known advisor media premiered magazine devoted professional use dbase data based advisor circulation exceeded 35,000 eight months activities fueled rapid rise dbase leading product type adam b green helped popularize dbase ii via legal difficulties ashton-tate publisher dbase ii software platforms operating systems proliferated early 1980s company found difficult port assembly language-based dbase target systems led re-write platform c programming language using automated code conversion tools resulting code worked essentially undocumented inhuman syntax problem would prove serious future resulting dbase iii released may 1984 although reviewers widely panned lowered performance product otherwise well reviewed rapid upgrades system stabilized best-seller throughout 1980s formed famous application trio pc compatibles dbase lotus 123 wordperfect fall 1984 company 500 employees taking 40 million year sales vast majority dbase products introduced 1988 delays dbase iv 300 new improved features foxpro made inroads even dbase iv support query example sql enough five years later top 3 implementations dbase language bought microsoft borland computer associates version called dbase plus 8 released used build ... web ... server-based applications along way borland bought ashton tate brought revised dbase iv 1992 focus described designed programmers rather ordinary users handling data dbase provided detailed procedural commands functions dbase application development language integrated navigational database management system ashton-tate labeled relational meet criteria defined dr. edgar f. codd relational model used runtime interpreter architecture allowed user execute commands typing command line dot prompt similarly program scripts text files prg extensions ran interpreter command dbase programs easy write test business person programming experience could develop applications time ashton-tate competitors introduced so-called clone products compilers robust programming features user-defined functions udfs arrays complex data handling ashton-tate competitors also began incorporate sql ansi/iso standard language creating modifying retrieving data stored relational database management systems eventually became clear dbase world expanded far beyond ashton-tate third-party community formed consisting fox software nantucket alpha software data based advisor magazine sbt application development firms major developer groups paperback software launched flexible fast vp-info unique built-in compiler community dbase variants sought create dbase language standard supported ieee committee x3j19 initiative ieee 1192 said xbase distinguish ashton-tate product a-t saw rise xbase illegal threat proprietary technology 1988 filed suit fox software santa cruz operation sco copying dbase structure sequence foxbase+ sco marketed xenix unix versions fox products december 1990 u.s. district judge terry hatter jr. dismissed ashton-tate lawsuit invalidated ashton-tate copyrights disclosing dbase based part public domain jpldis october 1991 case still appeal borland international acquired ashton-tate one merger provisions u.s. justice department required borland end lawsuit fox allow companies use dbase/xbase language without threat legal action end 1992 major software companies raised stakes acquiring leading xbase products borland acquired ashton-tate dbase products later wordtech xbase products microsoft acquired fox software foxbase+ foxpro products computer associates acquired nantucket clipper products advisor media built data based advisor magazine launching foxpro advisor clipper advisor developer magazines journals live conferences developers however planned dbase advisor magazine aborted due market failure dbase iv year 2000 xbase market faded developers shifted new database systems programming languages computer associates later known ca eventually dropped clipper borland restructured sold dbase major acquirers microsoft stuck xbase longest evolving foxpro visual foxpro product longer offered 2006 advisor media stopped last-surviving xbase magazine foxpro advisor era xbase dominance ended still xbase products dbase product line owned dbase llc currently sells dbase™ plus 12.3 dos-based dbase classic™ dbdos™ run 64-bit windows open source implementations available harbour xharbour also clip 2015 new member xbase family born xsharp x language open source project compiler ide well microsoft visual studio integration xsharp produces .net assemblies uses familiar xbase language xsharp product created group four enthusiasts worked vulcan.net project past compiler created top roslyn compiler code code behind c vb compilers microsoft today implementations dbase language expanded include many features targeted business applications including object-oriented programming manipulation remote distributed data via sql internet functionality interaction modern devices following example opens employee table empl gives every manager supervises 1 employees 10-percent raise prints names salaries note one keep mentioning table name assumed current table stays told otherwise origins interpreted interactive language dbase used variety contextual techniques reduce amount typing needed facilitated incremental interactive development also made larger-scale modular programming difficult tenet modular programming correct execution program module must affected external factors state memory variables tables manipulated program modules dbase designed mind developers careful porting borrowing programming code assumed certain context would make writing larger-scale modular code difficult work-area-specific references still possible using arrow notation b- customer multiple tables could manipulated time addition developer foresight name tables appropriately could clearly refer large number tables open time notation employee- salary vacation- start_date alternatively alias command could appended initial opening table statement made referencing table field unambiguous simple example one open table assign alias fashion use emp alias employee henceforth refer table variables employee- name another notable feature re-use clauses different commands example clause limits scope given command somewhat comparable sql clause different commands list delete replace browse etc could accept clause limit filter scope activity simplifies learning language dbase also one first business-oriented languages implement string evaluation tells interpreter evaluate string stored mymacro programming code example feature made dbase programming flexible dynamic sometimes called meta ability profession could allow programming expressions placed inside tables somewhat reminiscent formulas spreadsheet software however could also problematic pre-compiling making programming code secure hacking dbase tended used custom internal applications small medium companies lack protection copying compared compiled software often less issue addition dot-prompt dbase iii iii+ dbase iv came packaged assist application manipulate data queries well appsgen application allowed user generate applications without resorting code writing like 4gl dbase iv appsgen tool based largely portions early cp/m product named personal pearl although language fallen favor primary business language find dbase excellent interactive ad-hoc data manipulation tool whereas sql retrieves data sets relational database rdbms dbase one easily manipulate format analyze perform calculations individual records strings numbers step-by-step imperative procedural way instead trying figure use sql declarative operations granularity operations generally smaller sql making easier split querying table processing easy-to-understand easy-to-test parts example one could insert browse operation filtering aggregation step study intermediate table view applied filter aggregation step applied application development platform dbase fills gap lower-level languages c c++ java high-level proprietary 4gls fourth generation languages purely visual tools providing relative ease-of-use business people less formal programming skill high productivity professional developers willing trade low-level control dbase remained popular teaching tool even sales slowed text-oriented commands easier present printed training material mouse-oriented competitors mouse-oriented commands added product time command language remained popular de facto standard mousing commands tended vendor-specific major legacy dbase file format adopted number applications example shapefile format developed esri spatial data pc arcinfo geographic information system uses .dbf files store feature attribute data microsoft recommends saving microsoft works database file dbase file format read microsoft excel package available emacs read xbase files libreoffice openoffice calc read write generic dbf files dbase database system one first provide header section describing structure data file meant program longer required advance knowledge data structure rather could ask data file structured several variations .dbf file structure dbase-related products .dbf file structures compatible vp-info unique read variants dbf file structure second filetype file format memo fields character fields limited 254 characters memo field 10-byte pointer file include much larger text field dbase limited ability process memo fields xbase languages clipper treated memo fields strings like character fields purposes except permanent storage dbase uses files single indexes multiple-index files holding 1 48 indexes xbase languages vp-info include compatibility files others use different file formats used clipper used foxpro flagship later iterations clipper included drivers indexes jerry pournelle july 1980 called vulcan infuriatingly excellent software powerful documentation poor praised speed sophisticated queries said lot pounding table screaming rage documentation movie office space character peter gibbons programmer played ron livingston working make company systems y2k compliant bookshelf book understanding dbase iii plus alan simpson clearly seen | [
9345,
6147,
2183,
8458,
6797,
10899,
5374,
10921,
1324,
10413,
10286,
7983,
9397,
9782,
4409,
10692,
6085,
8262,
9286,
10824,
8393,
4042,
9166,
10193,
2903,
9177,
477,
6112,
7523,
3556,
6631,
6378,
3435,
2929,
11635,
4598,
7032,
2045,
6654
... | Test |
4,615 | 2 | DiskImageMounter:diskimagemounter diskimagemounter utility handles mounting disk volume images mac os x starting version 10.3 diskimagemounter works either launching daemon handle disk image contacting running dæmon mount disk like bomarchivehelper diskimagemounter gui double-clicked nothing gui program ever displays window progress bar mount options cancel skip verification error report could mount image found /system/library/coreservices/diskimagemounter.app starting version 10.7 apple removed double-click support images using legacy metadata diskimagemounter able open .img ndif .smi self mounting .dc42 disk copy 4.2 .dart dart disk image formats previously supported version 10.6 earlier diskimagemounter supports variety disk image file types | [
5647,
1042,
6700,
4657,
1074,
576,
9802,
5713,
3670,
4184,
2141,
4702,
2149,
10857,
8303,
6771,
2676,
9343,
3719,
10888,
11402,
8852,
1686,
7318,
3228,
2207,
1699,
5292,
8877,
1710,
3766,
2232,
9912,
9406,
1729,
6849,
713,
9418,
3790,
737... | None |
4,616 | 3 | Linux_Virtual_Server:linux virtual server linux virtual server lvs load balancing software linux kernel–based operating systems lvs free open-source project started wensong zhang may 1998 subject requirements gnu general public license gpl version 2 mission project build high-performance highly available server linux using clustering technology provides good scalability reliability serviceability major work lvs project develop advanced ip load balancing software ipvs application-level load balancing software ktcpvs cluster management components lvs used building highly scalable highly available network services web email media voip services integrating scalable network services large-scale reliable e-commerce e-government applications lvs-based solutions already deployed many real applications throughout world including wikipedia lvs components depend upon linux netfilter framework source code available codice_1 subdirectory within linux kernel source lvs able handle udp tcp layer-4 protocols well ftp passive connection inspecting layer-7 packets provides hierarchy counters codice_2 directory userland utility program used configure lvs called ipvsadm requires superuser privileges run lvs implements several balancing schedulers listed relevant source files commonly used terms include following setting virtual http server two real servers ipvsadm -a -t 192.168.0.1:80 -s rr ipvsadm -a -t 192.168.0.1:80 -r 172.16.0.1:80 -m ipvsadm -a -t 192.168.0.1:80 -r 172.16.0.2:80 -m first command assigns tcp port 80 ip address 192.168.0.1 virtual server chosen scheduling algorithm load balancing round-robin codice_13 second third commands adding ip addresses real servers lvs setup forwarded network packets shall masked codice_14 querying status configured lvs setup ip virtual server version 1.0.8 size=65536 prot localaddress port scheduler flags tcp 192.168.0.1:80 rr | [
3082,
5139,
10780,
10785,
6180,
8242,
9266,
6213,
8268,
5222,
10856,
118,
4734,
7812,
7821,
4238,
10382,
2195,
2711,
9882,
1694,
2723,
10924,
10933,
5815,
700,
4797,
5822,
1736,
2762,
8909,
8410,
10971,
8928,
1761,
2278,
233,
10482,
2294,
... | Test |
4,617 | 4 | Digital_watermarking:digital watermarking digital watermark kind marker covertly embedded noise-tolerant signal audio video image data typically used identify ownership copyright signal watermarking process hiding digital information carrier signal hidden information need contain relation carrier signal digital watermarks may used verify authenticity integrity carrier signal show identity owners prominently used tracing copyright infringements banknote authentication like traditional physical watermarks digital watermarks often perceptible certain conditions i.e using algorithm digital watermark distorts carrier signal way becomes easily perceivable may considered less effective depending purpose traditional watermarks may applied visible media like images video whereas digital watermarking signal may audio pictures video texts 3d models signal may carry several different watermarks time unlike metadata added carrier signal digital watermark change size carrier signal needed properties digital watermark depend use case applied marking media files copyright information digital watermark rather robust modifications applied carrier signal instead integrity ensured fragile watermark would applied steganography digital watermarking employ steganographic techniques embed data covertly noisy signals steganography aims imperceptibility human senses digital watermarking tries control robustness top priority since digital copy data original digital watermarking passive protection tool marks data degrade control access data one application digital watermarking source tracking watermark embedded digital signal point distribution copy work found later watermark may retrieved copy source distribution known technique reportedly used detect source illegally copied movies term digital watermark coined andrew tirkel charles osborne december 1992 first successful embedding extraction steganographic spread spectrum watermark demonstrated 1993 andrew tirkel charles osborne gerard rankin watermarks identification marks produced paper making process first watermarks appeared italy 13th century use rapidly spread across europe used means identify paper maker trade guild manufactured paper marks often created wire sewn onto paper mold watermarks continue used today manufacturer marks prevent forgery digital watermarking may used wide range applications information embedded signal called digital watermark although contexts phrase digital watermark means difference watermarked signal cover signal signal watermark embedded called host signal watermarking system usually divided three distinct steps embedding attack detection embedding algorithm accepts host data embedded produces watermarked signal watermarked digital signal transmitted stored usually transmitted another person person makes modification called attack modification may malicious term attack arises copyright protection application third parties may attempt remove digital watermark modification many possible modifications example lossy compression data resolution diminished cropping image video intentionally adding noise detection often called extraction algorithm applied attacked signal attempt extract watermark signal unmodified transmission watermark still present may extracted robust digital watermarking applications extraction algorithm able produce watermark correctly even modifications strong fragile digital watermarking extraction algorithm fail change made signal digital watermark called robust respect transformations embedded information may detected reliably marked signal even degraded number transformations typical image degradations jpeg compression rotation cropping additive noise quantization video content temporal modifications mpeg compression often added list digital watermark called imperceptible watermarked content perceptually equivalent original unwatermarked content general easy create either robust watermarks—or—imperceptible watermarks creation robust—and—imperceptible watermarks proven quite challenging robust imperceptible watermarks proposed tool protection digital content example embedded no-copy-allowed flag professional video content digital watermarking techniques may classified several ways digital watermark called fragile fails detectable slightest modification fragile watermarks commonly used tamper detection integrity proof modifications original work clearly noticeable commonly referred watermarks generalized barcodes digital watermark called semi-fragile resists benign transformations fails detection malignant transformations semi-fragile watermarks commonly used detect malignant transformations digital watermark called robust resists designated class transformations robust watermarks may used copy protection applications carry copy access control information digital watermark called imperceptible original cover signal marked signal perceptually indistinguishable digital watermark called perceptible presence marked signal noticeable e.g digital on-screen graphics like network logo content bug codes opaque images videos images made transparent/translucent convenience consumers due fact block portion view therefore degrading confused perceptual watermarking uses limitations human perception imperceptible length embedded message determines two different main classes digital watermarking schemes digital watermarking method referred spread-spectrum marked signal obtained additive modification spread-spectrum watermarks known modestly robust also low information capacity due host interference digital watermarking method said quantization type marked signal obtained quantization quantization watermarks suffer low robustness high information capacity due rejection host interference digital watermarking method referred amplitude modulation marked signal embedded additive modification similar spread spectrum method particularly embedded spatial domain evaluation digital watermarking schemes may provide detailed information watermark designer end-users therefore different evaluation strategies exist often used watermark designer evaluation single properties show example improvement mostly end-users interested detailed information want know given digital watermarking algorithm may used application scenario parameter sets seems best epson kodak produced cameras security features epson photopc 3000z kodak dc-290 cameras added irremovable features pictures distorted original image making unacceptable applications forensic evidence court according blythe fridrich n either camera provide undisputable proof image origin author secure digital camera sdc proposed saraju mohanty et al 2003 published january 2004 first time proposed blythe fridrich also worked sdc 2004 digital camera would use lossless watermarking embed biometric identifier together cryptographic hash reversible data hiding technique enables images authenticated restored original form removing digital watermark replacing image data overwritten would make images acceptable legal purposes us army also interested technique authentication reconnaissance images digital watermarking relational databases emerged candidate solution provide copyright protection tamper detection traitor tracing maintaining integrity relational data many watermarking techniques proposed literature address purposes survey current state-of-the-art classification different techniques according intent way express watermark cover type granularity level verifiability published 2010 halder et al journal universal computer science.. | [
9286,
11215,
402,
6324,
10582,
223
] | Test |
4,618 | 7 | Douglas_Parkhill:douglas parkhill douglas f. parkhill canadian technologist former research minister best known pioneering work called cloud computing work canada telidon videotex project started working canadian ministry communications part department trade industry 1969 previously worked mitre corporation responsible many activities communications satellites computer communications command control systems telecommunications winner treasury board canada secretariat outstanding achievement award 1982 conestoga shield services government industry computer communications research development touche ross award telidon development author several publications including 1966 book challenge computer utility book parkhill thoroughly explored many modern-day characteristics cloud computing elastic provisioning utility service well comparison electricity industry use public private government community forms book mckinsey foundation award distinguished contributions management literature worked dave godfrey canadian writer novelist later book gutenberg two social political meaning computer technology charge research federal department communications time department funding development telidon videotext system heavily involved promoting system overall control program radio broadcast 1980 outlined potential system financial information theatre reservations ability pay print tickets system later documented history telidon project history videotex general | [
4194
] | Test |
4,619 | 9 | John_Wainwright_(computer_scientist):john wainwright computer scientist john wainwright computer scientist born australia pioneered development pure object-based computer languages principal architect two computer languages scriptx 1992–1996 maxscript 1996 1992 wainwright sold apple computer structural framework object based language virtual machine operating system called objects c. became lead architect scriptx language media player developed kaleida labs kaleida labs closed doors 1996 wainwright went serve principal architect maxscript scripting language autodesk 3ds max language used game development part maxis sims animation processing pipeline compared scriptx maxscript explicit syntax support 3d animation wainwright chief technology officer crowd science online advertising technology company co-founded 2007 nephew john martin paul neto crowd science funded granite ventures wainwright also first non-employee amazon.com customer ordering book fluid concepts creative analogies amazon building named | [] | Test |
4,620 | 4 | Snarfing:snarfing snarf term used computer programmers meaning grab large document file content data use without author owner permission unix community term means acquisition file set files across network also refers using command line tools transfer files http gopher finger ftp protocols without user interaction method achieving cache coherence multiprocessing computer architecture observation writes cached data example snarf evil twin attack using simple shell script running software like airsnarf create wireless hotspot complete captive portal wireless clients associate snarf access point receive ip dns gateway appear completely normal users dns queries resolve attacker ip number regardless dns settings website attempt visit bring snarf splash page requesting username password username password entered unsuspecting users mailed root localhost reason works | [
9968,
6866,
7364,
10727
] | Test |
4,621 | 7 | Appirio:appirio appirio wipro company information technology consulting company headquartered indianapolis indiana united states offers technology professional services companies wishing adopt public cloud applications includes software-as-a-service platform-as-a-service technologies like salesforce.com google apps appirio founded chris barbin former borland software cio narinder singh glenn weinstein mike ’ brien 2006 2007 appirio established headquarters salesforce.com ’ startup incubator san mateo california 2012 appirio moved headquarters san francisco california august 2015 appirio announced indianapolis office would named company headquarters early 2008 appirio secured series investment 1.1 million salesforce.com angel investors firm next secured 5.6 million series b funding sequoia capital july 2008 series c round came february 2009 10 million funding sequoia capital ggv capital series funding round 60 million followed march 2012 led private equity firm general atlantic october 2009 appirio chief architect jason ouellette released book titled development force.com platform building business applications cloud released addison-wesley professional april 2010 appirio named ondemand company year alwayson selected best place work bay area san francisco business times listed gartner cloud computing/saas integration july 2010 appirio featured new polymath profiles compound-technology innovations technology novel written vinnie mirchandani march 2011 appirio acquired infowelders salesforce consultancy based louisville ky december 2011 appirio acquired saaspoint provider cloud consulting services europe november 2012 went acquire knowledge infusion human resources talent management advisory consulting services firm september 2013 appirio acquired topcoder community 500,000 developers engineers designers find collaborate software development assignments ranging applications websites back-end corporate systems cloudspokes appirio competing platform 75,000 users merged topcoder january 2014 appirio currently headquartered indianapolis satellite offices san francisco california minato tokyo japan london uk dublin ireland sydney australia espoo finland stockholm sweden porto portugal pune bangalore greater noida hyderabad jaipur india appirio runs serverless company utilizing public cloud solutions in-house datacenter 20 october 2016 appirio announced acquired wipro indian information technology services corporation based bangalore india 500 million appirio ranks among firms like acumen solutions bluewolf acquired ibm cloud sherpas acquired accenture market cloud computing solutions increasingly appirio found primary competitor global system integrators accenture deloitte | [
7489,
4194,
10090,
3323,
6367
] | Test |
4,622 | 7 | Single-chip_Cloud_Computer:single-chip cloud computer single-chip cloud computer scc computer processor cpu created intel corporation 2009 48 distinct physical cores communicate architecture similar cloud computer data center cores part processor carry instructions code allow computer run scc product project started intel research multi-core processors parallel processing multiple calculations additionally intel wanted experiment incorporating designs architecture huge cloud computer data centers cloud computing single processing chip took aspect cloud computing many remote servers communicate applied microprocessor new concept intel wanted experiment name single-chip cloud computer originated concept scc currently still used research purposes currently run simple linux operating system chip boot windows applications scc web servers data informatics bioinformatics financial analytics intel developed new chip architecture based huge cloud data centers cores separated across chip able directly communicate chip contains 48 p54c pentium cores connected 4×6 2d-mesh mesh group 24 tiles set four rows six columns tile contained two cores 16 kb 8 per core message passing buffer mpb shared two cores essentially router router allows core communicate previously cores send information back main memory would re-routed cores scc contains 1.3 billion 45 nanometers nm long transistors amplify signals act switch turn core pairs transistors use anywhere 25 125 watts power depending processing demand comparison intel i7 processor uses 156 watts power four ddr3 memory controllers chip connected 2d-mesh well controllers capable addressing 64 gb random-access memory ddr3 memory used help tile communicate others without chip would functional controllers also work transistors control certain tiles turned save power use proper coding implemented pieces put together get functional processor fast powerful energy efficient framework resembling network cloud computers scc comes rcce simple message passing interface provided intel supports basic message buffering operations scc two modes operate processor mode mesh mode processor mode cores executing code system memory programmed i/o inputs outputs system connected system board fpga loading memory configuring processor bootstrapping sustaining initial load currently done software running scc management console embedded chip cores turned routers transistors ram controllers sending receiving large packets data additionally memory map intel plans share technology companies hp yahoo microsoft multiple companies researching scc efficiently quickly advance technology hope make scc scalable 100+ cores one way hope achieve chip able communicate another chip could put two chips together get double cores hope improve parallel programming productivity power management take advantage chip architecture large number cores additionally plan experiment architecture similar chip architectures develop many-core scalable processors maximizes processing power cores power efficient | [
9095,
5384,
5029,
10675,
1972,
823,
6971,
1085,
704,
6730,
7755,
2383,
8795,
3294,
225,
4194,
9959,
1776,
499,
6911
] | Test |
4,623 | 7 | Dropbox_(service):dropbox service dropbox file hosting service operated american company dropbox inc. headquartered san francisco california offers cloud storage file synchronization personal cloud client software dropbox founded 2007 mit students drew houston arash ferdowsi startup company initial funding seed accelerator combinator dropbox praised receiving crunchie award 2010 best internet application macworld 2009 editor choice award software ranked one valuable startups us world valuation us 10 billion described one combinator successful investments date however dropbox also experienced criticism generated controversy issues including security breaches privacy concerns dropbox blocked china since 2014 five star privacy rating electronic frontier foundation dropbox brings files together one central place creating special folder user computer contents folders synchronized dropbox servers computers devices user installed dropbox keeping files up-to-date devices dropbox uses freemium business model users offered free account set storage size paid subscriptions available offer capacity additional features dropbox basic users given two gigabytes free storage space dropbox plus users given two terabytes storage space well additional features including advanced sharing controls remote wipe optional extended version history add-on dropbox offers computer apps microsoft windows apple macos linux computers mobile apps ios android windows phone smartphones tablets march 2013 company acquired mailbox popular email app april 2014 company introduced dropbox carousel photo video gallery app mailbox carousel shut december 2015 key features apps implemented regular dropbox service october 2015 officially announced dropbox paper collaborative document editor reported effort expand operations towards businesses march 2016 dropbox 500 million users dropbox founder drew houston conceived dropbox concept repeatedly forgetting usb flash drive student mit 2009 meet team post dropbox blog wrote existing services time suffered problems internet latency large files bugs made think much began making something personal use realized could benefit others problems houston founded evenflow inc. may 2007 company behind dropbox shortly thereafter secured seed funding combinator dropbox officially launched 2008 techcrunch disrupt annual technology conference owing trademark disputes proxy inc. evenflow dropbox official domain name get dropbox.com october 2009 acquired current domain dropbox.com october 2009 evenflow inc. renamed dropbox inc interview techcrunch founder stories october 2011 houston explained demo video released dropbox early days one viewer arash ferdowsi ferdowsi impressed formed partnership regards competition houston stated easy explain idea actually really hard dropbox seen steady user growth since inception surpassed 1 million registered users milestone april 2009 followed 2 million september 3 million november passed 50 million users october 2011 100 million november 2012 200 million november 2013 400 million june 2015 500 million march 2016 july 2012 dropbox acquired tapengage startup enables advertisers publishers collaborate tablet-optimized advertising following december dropbox acquired two companies audiogalaxy startup allowing users store music files playlists cloud stream device snapjoy company allowed users aggregate archive view digital photos cameras phones popular apps like flickr instagram picasa view online via ios app july 2013 dropbox acquired endorse mobile coupon startup may 2014 dropbox acquired bubbli startup built innovative ways incorporating 3d technology 2d views packaging mobile app january 2015 dropbox acquired cloudon company provided mobile applications document editing creation time dropbox told techcrunch cloudon base herzliya would become first dropbox office israel july dropbox acquired clementine enterprise communication service april 2014 dropbox acquired photo-sharing company loom would shut integrated then-recently announced carousel document-sharing startup hackpad dropbox later announced april 2017 hackpad would shut july 19 notes migrated dropbox paper dropbox computer apps microsoft windows apple macos linux computers mobile apps ios android windows phone smartphones tablets also offers website interface part partnership microsoft dropbox announced universal windows 10 app january 2016 dropbox apps offer automatic photo uploading feature allowing users automatically upload photos videos cameras tablets sd cards smartphones dedicated camera uploads folder dropbox users given 500 megabytes extra space uploading first photo given 3 gigabytes extra space users continue using method photos july 2014 dropbox introduced streaming sync computer apps streaming sync described new supercharged synchronization speed large files improves upload download time 2 times august 2015 dropbox announced availability universal 2nd factor usb security keys providing two-factor authentication logging services dropbox received initial funding seed accelerator combinator dropbox also raised us 1.2 million series funding sequoia capital 2007 along interest amount converted equity part series investment included fresh slug us 6 million bringing total amount us 7.25 million round closed 2008 documents filed 2009 may 2010 report wall street journal said since founder drew houston started reading eric ries lean startup blog year ago company started trickling new features ready instead waiting launch fully featured product helps test customer appetite says dubbing practice minimum viable product techcrunch reported july 2011 dropbox looking raise us 200 us 300 million valuation end 5 billion 10 billion range ... quite step previous funding rounds totalled tiny 7.2 million noted forbes article dropbox revenue track hit 240 million 2011 april 2012 dropbox announced bono edge two members irish rock band u2 individual investors company march 2017 bloomberg reported dropbox secured us 600 million credit line company expected file initial public offering ipo soon year february 2018 dropbox filed ipo listed nasdaq company initial intent raise 500 million dropbox stock rose 42 percent 29.89 first day trading march 23 2018 may 2018 dropbox never profitable reports positive cash flow dropbox uses freemium business model users offered free account set storage size paid subscriptions available offer capacity additional features dropbox basic users given two gigabytes free storage space expanded referrals users recommend service people people start using service user awarded additional 500 megabytes storage space dropbox basic users earn 16 gigabytes referral program dropbox plus subscription named dropbox pro prior march 2017 gives users 2 terabytes storage space well additional features including november 2013 dropbox announced changes dropbox business would enable users connect personal dropbox business dropbox device folders properly labeled personal work come password contacts settings files furthermore dropbox announced shared audit logs remote wipe business administrators account transfers new features business offering january 2017 dropbox introduced smart sync business enterprise customers feature lets windows macos users see files dropbox folder download specific files on-demand similarly dropbox basic dropbox plus users also earn extra space referrals plus users earn 1 gigabyte per referral 32 gigabytes dropbox business dropbox solution corporations adding business-centered functionality teams including collaboration tools advanced security control unlimited file recovery user management granular permissions options unlimited storage large organizations dropbox offers dropbox enterprise highest tier product offerings adding domain management tools assigned dropbox customer support member help expert advisors deployment user training july 2016 dropbox announced new adminx administrator dashboard business customers offering improved control company files users june 2017 adminx dashboard given redesign additional administrator functions log-in durations custom password strength parameters granular subdomain verifications specified teams september 2012 facebook dropbox integrated allow users facebook groups share files using dropbox 2013 samsung pre-loaded dropbox mobile application android devices dropbox provided extra space users owning samsung devices november 2014 dropbox announced partnership microsoft integrate dropbox microsoft office applications ios android office 365 applications web july 10 2018 dropbox announced partnership salesforce aiming improve brand engagement team productivity dropbox software enables users drop file designated folder file automatically uploaded dropbox cloud-based service made available user computers devices also dropbox software installed keeping file up-to-date systems file user dropbox folder changed dropbox uploads pieces file changed whenever possible file folder deleted users recover within 30 days dropbox plus users recovery time extended one year purchasing extended version history add-on dropbox accounts accessed emails replied year automatically deleted dropbox also offers lan sync feature instead receiving information data dropbox servers computers local network exchange files directly potentially significantly improving synchronization speeds originally dropbox servers computer apps written python july 2014 dropbox began migrating performance-critical backend infrastructure go september 2012 dropbox website code base rewritten javascript coffeescript dropbox originally used amazon s3 storage system store user files 2014 2016 gradually moved away amazon use hardware referred magic pocket due dropbox description place keep stuff ’ get lost always access june 2017 company announced major global network expansion aiming increase synchronization speeds cutting costs expansion starting 14 cities across 7 countries 3 continents adds hundreds gigabits internet connectivity transit providers regional global isps hundreds new peering partners exchange traffic directly rather isp dropbox uses ssl transfers synchronization stores data via advanced encryption standard aes -256 encryption functionality dropbox integrated third-party applications application programming interface api dropbox prevents sharing copyrighted data checking hash files shared public folders users blacklist copyrighted material applies files folders shared users publicly files kept individual dropbox folder shared march 2013 dropbox acquired mailbox popular email app mailbox ceo gentry underwood saying rather grow mailbox 've decided join forces dropbox build together deal developers mailbox joined dropbox kept mailbox running stand-alone app mailbox ceo stated still struggling keep demand want use dropbox ceo drew houston said felt could help mailbox reach much different audience much faster acquisition reported cost 100 million december 2015 dropbox announced shut-down mailbox blog post drew houston arash ferdowsi explained 'll ... using 've learned mailbox build new ways communicate collaborate dropbox april 2014 dropbox introduced carousel photo video gallery combines photos dropbox photos phone automatically backs new ones take carousel sorted photos event date december 2015 dropbox announced shut-down carousel blog post drew houston arash ferdowsi explained 'll taking key features carousel back place photos live dropbox app april 2015 dropbox launched dropbox notes collaborative note-taking service beta testing phase prompting speculation dropbox planning bring product compete google docs techcrunch noted dropbox notes appeared new version project composer previous iteration service roots acquisition hackpad april 2014 october 2015 dropbox announced upcoming launch dropbox paper collaborative document editor noted media result development dropbox notes service earlier 2015 dropbox paper entered open beta august 2016 allowing anyone join test product mobile apps android ios also released january 2017 dropbox paper officially launched aimed businesses dropbox paper described one part online document one part collaboration one part task management tool one part content hub rob baesman dropbox head product allows importing editing collaboration number file types google microsoft others users devised number uses mashups technology expand dropbox functionality include sending files dropbox via gmail using dropbox sync instant messaging chat logs bittorrent management password management remote application launching system monitoring free web hosting service dropbox received several awards including crunchie award 2010 best internet application macworld 2009 editor choice award software nominated 2010 webby award 2010 mac design awards ars technica 2011 business insider named dropbox world sixth valuable startup 2017 publication ranked dropbox eighth valuable us startup valuation 10 billion described one combinator successful investments date apple launched cloud storage service later 2011 icloud n't hold back dropbox growth dropbox mobile iphone app release 2010 among top 10 best apps selected alex ahlund former ceo two websites focused mobile apps company android app also selected one top five best apps list compiled 2010 jason hiner zdnet founders drew houston arash ferdowsi named among top 30 30 entrepreneurs inc. 2011 january 2012 dropbox named startup year techcrunch 2016 company ranked 2 forbes cloud 100 list dropbox subject criticism controversy related multiple incidents including june 2011 authentication problem let accounts accessed several hours without passwords july 2011 privacy policy update language suggesting dropbox ownership users data concerns dropbox employee access users information july 2012 email spam recurrence february 2013 leaked government documents june 2013 information dropbox considered inclusion national security agency prism surveillance program july 2014 comment nsa whistleblower edward snowden criticizing dropbox encryption leak 68 million account passwords internet august 2016 january 2017 accidental data restoration incident years-old supposedly deleted files reappeared users accounts dropbox headquarters located san francisco originally market street expansion china basin landing building july 2011 allowing significant space increase number employees grew company needed expansion february 2014 signed lease two buildings brannan street needing substantial amounts space company started shopping remaining available space companies sublease november 2015 dropbox expanded second u.s. office austin texas february 2014 state texas city austin provided 1.7 million performance-based incentives package dropbox exchange locating office austin december 2012 dropbox set office dublin ireland first office outside united states | [
1539,
9732,
526,
1551,
5650,
10265,
1054,
5662,
546,
5666,
9766,
39,
7212,
3121,
5681,
8754,
2613,
1083,
10820,
7238,
4683,
590,
1102,
1104,
7248,
5202,
11347,
3672,
5217,
4194,
9314,
5732,
4710,
11372,
6259,
2170,
2694,
10887,
4236,
6797... | None |
4,624 | 2 | Cortana:cortana cortana virtual assistant created microsoft windows 10 windows 10 mobile windows phone 8.1 invoke smart speaker microsoft band surface headphones xbox one ios android windows mixed reality amazon alexa cortana set reminders recognize natural voice without requirement keyboard input answer questions using information bing search engine cortana currently available english portuguese french german italian spanish chinese japanese language editions depending software platform region used cortana demonstrated first time microsoft build developer conference april 2–4 2014 san francisco launched key ingredient microsoft planned makeover future operating systems windows phone windows named cortana synthetic intelligence character microsoft halo video game franchise originating bungie folklore jen taylor character voice actress returning voice personal assistant us-specific version development cortana started 2009 microsoft speech products team general manager zig serafin chief scientist larry heck heck serafin established vision mission long-range plan microsoft digital-personal-assistant built team expertise create initial prototypes cortana key researchers early efforts included microsoft research researchers dilek hakkani-tür gokhan tur andreas stolcke malcolm slaney research software developer madhu chinthakunta user-experience designer lisa stifelman develop cortana digital assistant team interviewed human personal assistants interviews inspired number unique features cortana including assistant notebook feature originally cortana meant codename petition windows phone uservoice site proved popular made codename official january 2015 microsoft announced availability cortana windows 10 desktops mobile devices part merging windows phone operating system large may 26 2015 microsoft announced cortana would also available mobile platforms android release set july 2015 android apk file containing cortana leaked ahead release officially released along ios version december 2015 e3 2015 microsoft announced cortana would come xbox one part universally designed windows 10 update console number people access cortana 800 million 2019 number questions asked 18 billion since launch microsoft integrated cortana numerous products microsoft edge browser bundled windows 10 microsoft cortana assistant deeply integrated edge browser cortana find opening-hours restaurant sites show retail coupons websites show weather information address bar worldwide partners conference 2015 microsoft demonstrated cortana integration upcoming products gigjam conversely microsoft announced late april 2016 would block anything bing edge used complete cortana searches raising questions anticompetitive behavior company microsoft windows car concept includes cortana concept makes possible drivers make restaurant reservations see places go microsoft build 2016 microsoft announced plans integrate cortana skype microsoft instant messaging service bot allow users order food book trips transcribe video messages make calendar appointments cortana addition bots cortana underline certain words phrases skype conversations relate contacts corporations writer engadget criticised cortana integration skype responding specific keywords feeling chatting search engine due impersonal way bots replied certain words hello bing music bot brought adele song name microsoft also announced microsoft build 2016 cortana would able cloud-synchronise notifications windows 10 mobile windows 10 action center well notifications android devices december 2016 microsoft announced preview calendar.help service enabled people delegate scheduling meetings cortana users interact cortana including email conversations cortana would check people availability outlook calendar google calendar work others cc 'd email schedule meeting service relied automation human-based computation may 2017 microsoft collaboration harman kardon announced invoke voice-activated speaker featuring cortana premium speaker cylindrical design offers 360 degree sound ability make receive calls skype features currently available cortana cortana set reminders recognize natural voice without requirement keyboard input answer questions using information bing search engine e.g. current weather traffic conditions sports scores biographies searches using windows 10 made microsoft bing search engine links open microsoft edge except screen reader narrator used links open internet explorer windows phone 8.1 universal bing smartsearch features incorporated cortana replaces previous bing search app activated user presses search button device cortana includes music recognition service cortana simulate rolling dice flipping coin 'cortana concert watch monitors bing searches determine bands musicians user interested integrates microsoft band watch band windows phone devices connected via bluetooth make reminders phone notifications since lumia denim mobile phone series launched october 2014 active listening added cortana enabling invoked phrase hey cortana controlled usual devices united kingdom o2 received lumia denim update without feature later clarified bug microsoft since fixed cortana integrates services foursquare provide restaurant local attraction recommendations lifx control smart light bulbs cortana stores personal information interests location data reminders contacts notebook draw upon add data learn user specific patterns behaviors users view specify information collected allow control privacy said level control goes beyond comparable assistants users delete information notebook cortana built system reminders example associated specific contact remind user communication contact possibly specific time phone specific location originally reminders specific device cortana installed since windows 10 microsoft synchronizes reminders across devices versions cortana take form two nested animated circles animated indicate activities searching talking main color scheme includes black white background shades blue respective circles cortana windows mobile android capable capturing device notifications sending windows 10 device allows computer user view notifications phone windows 10 action center feature announced early 2016 released later year cortana do-not-disturb mode users specify quiet hours available windows phone 8.1 users users change settings cortana calls users names nicknames also library easter eggs pre-determined remarks asked prediction cortana correctly predicted winners first 14 matches football 2014 fifa world cup knockout stage including semi-finals incorrectly picked brazil netherlands third place play-off match streak topped paul octopus correctly predicted 7 germany 2010 fifa world cup matches well final cortana forecast results various sports nba nfl super bowl icc cricket world cup various european football leagues cortana solve mathematical equations convert units measurement determine exchange rates currencies including bitcoin cortana integrate third-party apps windows 10 directly service starting late 2016 cortana integrated microsoft wunderlist service allowing cortana add act reminders microsoft build 2017 conference microsoft announced cortana would get consumer third-party skills capability similar amazon alexa feb 16 2018 microsoft announced connected home skills added ecobee honeywell lyric honeywell total connect comfort lifx tp-link kasa geeni well support ifttt also added august 15 2018 cortana-alexa integration went public preview microsoft ignite 2018 conference microsoft announced technology adopters program enterprises could build skills could developed deployed azure tenants accessible organizational units security groups presently third-party skills available us us english cortana indexes stores user information disabled cause windows search search web well local computer turned turning cortana delete user data stored microsoft servers deleted user action microsoft criticized requests bing website file called threshold.appcache contains cortana information searches made start menu even cortana disabled windows 10. cortana disabled users aged 13 years uk version cortana speaks british accent uses british idioms chinese version known xiao na speaks mandarin chinese icon featuring face two eyes used regions united kingdom english localised version cortana voiced ginnie watson anglo-french actress singer/songwriter voice-over artist united states english localised version cortana voiced jen taylor voice actress voices cortana namesake virtual assistant halo video game series table identifies localized version cortana currently available except indicated applies windows mobile windows 10 versions assistant natural language processing capabilities cortana derived tellme networks bought microsoft 2007 coupled semantic search database called satori cortana updates delivered independently main windows phone os allowing microsoft provide new features faster pace cortana-related features updated manner features hey cortana require windows phone update service qualcomm snapdragon sensorcore technology | [
11270,
5643,
537,
540,
3102,
8735,
9762,
8227,
8740,
1577,
10281,
2101,
6709,
10812,
1087,
3648,
2630,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
9819,
4704,
3170,
7780,
622,
9839,
3698,
4210,
7796,
1656,
6265,
7290,
47... | Test |
4,625 | 4 | FBI_Criminal,_Cyber,_Response,_and_Services_Branch:fbi criminal cyber response services branch criminal cyber response services branch ccrsb service within federal bureau investigation fbi created 2002 part u.s. government post-9/11 response ccrsb responsible investigating financial crime white-collar crime violent crime organized crime public corruption violations individual civil rights drug-related crime addition branch also oversees computer-based crime related counterterrorism counterintelligence criminal threats united states ccrsb deploys fbi agents analysts computer scientists uses traditional investigative techniques sources wiretaps surveillance forensics ccrsb works conjunction federal state regional agencies 56 field offices national cyber investigative joint task force ncijtf ccrsb operates 24-hour cyber command center cywatch combine resources fbi ncijtf event significant cyber intrusion provide connectivity federal cyber centers government agencies fbi field offices legal attachés private sector also exchange information cyber threats private sector partnerships domestic security alliance council infragard national cyber forensics training alliance ncfta ccrsb maintains overseas legal attaché offices coordinate cyber investigations address jurisdictional hurdles differences law countries collaborating cyber crime centers interpol europol unit also maintains website called cyber shield alliance www.leo.gov provides access cyber training information public means report cyber incidents fbi fbi reports since 2002 seen 80 percent increase number computer intrusion investigations headed fbi executive assistant director ccrsb responsible fbi director deputy director current ccrsb executive assistant director amy hess ccrsb formed unification fbi various traditional crime fighting units speculated establishment national security branch traditional criminal investigations branch within fbi lead formation career paths fbi special agents meaning new agent completed special agent training fbi academy quantico virginia completed mandatory probationary period choose go national security branch go criminal part bureau focus crimes organized crime narcotics civil rights violations fraud violent crime advocates new program say re-organization help fight terrorism making less bureaucratic | [
1888,
3825,
4435,
10935,
3544,
3354
] | Train |
4,626 | 4 | Federal_Service_for_Technical_and_Export_Control:federal service technical export control federal service technical export control fstec fstek military agency russian federation russian ministry defence licenses export weapons dual-use technology items also responsible russian military information security fstec maintains data security threats database russia national vulnerability database requires western technology companies submit source code trade secrets allowing products imported russia fstec also liaises fsb controls cryptography russia 2019 fstec granted astra linux special status regarding use processing russian classified information | [
4039,
2446,
6043,
5373,
2558
] | Test |
4,627 | 9 | Visual_DialogScript:visual dialogscript visual dialogscript vds interpreted programming language microsoft windows used create small fast programs vds large number dialog graphical elements available create professional looking programs vds programs access windows api therefore possible write applications perform advanced tasks programming languages visual basic c++ delphi unlike programming languages syntax vds simple command occupies one line plain english name clearly describes purpose variables typeless hold many kinds information example numbers text functions clearly distinguishable names start like spreadsheet dialogscript language simple syntax unlike ms-dos batch language designed ease use efficiency interpreted run-time engine 10 system variables 0 9 initially script file name 0 command line parameters 1 9 batch file also 26 user variables z contents variables including system ones changed script running also 4032 global variables variables begin letter alphanumerics plus underscores e.g my_variable_1 limit length user-defined variable names comments simple information message box simple warning message box create custom dialog box write windows registry display input prompt dialog box storing result variable visual dialogscript created julian moss jm-tech 1998 version 3.0 emmanuel daunizeau s.a.d.e sarl took ownership development vds modifying improving syntax recently vds marketed british company commercial research ltd. still property emmanuel daunizeau continues develop several versions vds released time several versions available download | [
8262,
6797,
847,
5395,
5754
] | Test |
4,628 | 7 | Distributed_R:distributed r distributed r open source high-performance platform r language splits tasks multiple processing nodes reduce execution time analyze large data sets distributed r enhances r adding distributed data structures parallelism primitives run functions distributed data task scheduler multiple data loaders mostly used implement distributed versions machine learning tasks distributed r written c++ r retains familiar look feel r. hewlett-packard hp provides enterprise support distributed r proprietary additions fast data loader vertica database distributed r begun 2011 indrajit roy shivaram venkataraman alvin auyoung robert s. schreiber research project hp labs open sourced 2014 gplv2 license available github february 2015 distributed r reached first stable version 1.0 along enterprise support hp distributed r platform implement execute distributed applications r. goal extend r distributed computing retaining simplicity look-and-feel r. distributed r consists following components hp vertica provides tight integration database open source distributed r platform hp vertica 7.1 includes features enable fast parallel loading vertica database distribute r. parallel vertica loader five times 5x faster using traditional odbc based connectors vertica database also supports deployment machine learning models database distributed r users call distributed algorithms create machine learning models deploy vertica database use model in-database scoring predictions architectural details vertica database distributed r integration described sigmod 2015 paper | [
5384,
5833,
7983,
11221,
823
] | Validation |
4,629 | 7 | Standardization_in_Lab_Automation:standardization lab automation sila consortium not-for-profit membership organization formed software suppliers system integrators pharma/biotech companies consortium standardization lab automation sila develops introduces new device data interface standards allowing rapid integration lab automation hardware data management systems highly skilled experts member companies contribute sila technical work groups membership open institutions corporations individuals active life science lab automation industry sila consortium provides professional training support certification services suppliers system integrators implementing sila compliant interfaces sila global initiative standardize software interfaces field life science research instrumentation laboratory automation instigated pharmaceutical industry need flexible laboratory automation initiative supported major device software suppliers worldwide understanding mechanisms life requires extensive often repetitive experimentation laboratory automation therefore become instrumental progress life sciences industry provides commercial laboratory devices perform increasingly sophisticated tasks however combining equipment different providers work concert often proves impossible exporting captured data proprietary software analysis frustrating impossible situation leads waste resources available equipment needs replaced compatibility reasons software drivers purchased developed data conversion time consuming technical obstacles impede development higher level autonomous experimentation systems sila enables researchers focus scientific questions reducing equipment connectivity effort minimum achieved using proven tested maintained documentation code advancements seen home consumer electronics marked like usb upnp triggered idea applying similar approach laboratory automation environment possible easily upload pictures digital camera computer time even thinkable replace lab device e.g shaker one brand shaker different brand analyzing situation led conclusion incompatibility result missing interface definitions idea standardized interface based common command set ccs concept born however sila 1.x limitations based xml/soap considered outdated getting started sila 1.x easy process led proposition spin-off group sila consortium develop new standard sila 2 learning sila 1.x taking many concepts sila 2 vision accessible possible major goal create community working development new features sila formed not-for-profit membership organisation sila requires members pay annual membership dues details membership classes related fees found sila not-for-profit membership corporation global footprint membership open institutions corporations individuals active life science lab automation industry sila consortium provides professional training support certification services suppliers system integrators implementing sila compliant interfaces sila foundation standards addresses control data interfaces devices process management lims enterprise systems sila developed released several standards sila considers every entity modern laboratory service focusing behaviour service oriented design structures lead feature definition language fdl concept feature service sila server offers serves common communication base subject matter experts sme experts end users sila built connect systems laboratory laboratory information management systems electronic lab notebooks chromatography software laboratory devices balances pipettors various analytical instruments based http/2 sila uses protocol buffers serialize payload data furthermore sila 2 uses wire format provided grpc sila 2 based microservice architecture basic structure highly comparable web server ≙sila server web client ≙sila client sila device interface standard covers iso/osi levels device control interface physical application layer interface standard based web service/soap communication devices commands generally executed asynchronous manner immediate response delayed event completion command processing error error recovery procedures also supported general behavior devices managed state machine state machine enables also complex behaviors like parallel processing commands command queuing supporting three different integration levels sila provides unique standardized interface lab automation devices process management systems also legacy devices integrated sila compliant systems sila compliance achieved providing native directly embedded sila device interfaces software sila drivers and/or interface converters sila device control data interface standard eases accelerates integration adaptation systems generic device class interfaces providing common command sets grouping devices functionality device classes created sila common command sets define commands device classes sila defines command names number parameters names well return data since commands parameters described wsdl documentation tag commands web service process management software pms automatically generate list available commands device sila defined 30 device classes command library 100 commands commands range mandatory commands needed make transitions state machine required commands specific device class optional commands every device device class might provide functionality addition guidelines implementation supplier-specific device commands parameters provided commands applicable almost every device class example commands setparameter getparameter executemethod widely used also prepareforoutput prepareforinput common enable transport mechanisms transfer labware items device device mandatory commands include operations like reset initialize abort pause addition also locking device exclusive use provided | [
64
] | None |
4,630 | 1 | Db2_(Formerly_Db2_for_LUW):db2 formerly db2 luw db2 database formerly known db2 linux unix windows database server product developed ibm also known db2 luw brevity part db2 family database products db2 luw common server product member db2 family designed run popular operating systems contrast db2 products specific single platform june 27 2019 ibm released db2 v11.5 artificial intelligence ai database version 11.5 ibm db2® extending legacy dependability adding ai functionality designed help optimize performance support data scientists ’ mission find deeper insights powered built ai db2 11.5 built ai enhancements support popular languages frameworks used ai developers db2 11.5 native language support python ruby go java php node.js sequelize supports popular frameworks visual studio code jupyter notebooks db2 11.5 powered ai since includes features machine learning-based ml optimizer augmented data explorer ade ml optimizer supplement existing cost-based optimizer ade uses natural language querying faceted search natural language generation capabilities make easy users easily explore data stored db2 db2 adds ai functionality top capabilities enterprises relied decades mission-critical transactional analytics workloads supported hardware acceleration in-memory technology db2 columnar data store functionality blu acceleration® feature uses advanced compression techniques deliver reliably faster response times without limitations in- memory-only systems db2 11.5 ’ ai enhancements designed help companies achieve deeper insights quickly support ai applications greater ease combined existing db2 performance-boosting technology new capabilities make db2 perfect solution help business climb ladder robust ai practice db2 part hybrid data management platform offering hybrid data management enables enterprises drive innovation seamlessly accessing sharing analyzing data higher level data management enables structured semistructured unstructured data easily accessed analyzed whether stored premises public cloud private cloud open source combination deployments first release advanced db2 luw db2 universal database version 5 available unix windows os/2 platforms new product stemmed two earlier products db2 common server version 2 db2 parallel edition db2 universal database version 5 continued ibm new direction using common code base support db2 different platforms incorporating shared nothing features db2 parallel edition support large data warehousing databases db2 luw initially called db2 universal database udb time ibm marketing started use term database products notably mainframe z-series db2 thus db2 linux unix windows moniker became necessary distinguish common server db2 luw product single-platform db2 products current db2 luw product runs multiple linux unix distributions red hat enterprise linux suse linux ibm aix hp-ux solaris windows systems earlier versions also ran os/2 multiple editions marketed different sizes organisation uses code base also marketed without db2 name ibm infosphere warehouse edition 2017 db2 udb name became db2 addition standard acid-compliant row-organized relational database functionality key features ibm offers three editions db2 community edition standard server edition advanced server edition ibm db2 community edition free download use redistribute edition ibm db2 data server xml database relational database management system features limited four cpu cores 16 gb ram database size 100 gb enterprise support fix packs db2 community edition limit number users june 27 2019 ibm released db2 v11.5 db2 update designed deliver enhancements help automate data management eliminate etl support artificial intelligence data workloads along update ibm unveiled streamlined offerings free version db2 community edition version db2 contains features include expiration caps version db2 four cpu cores 16 gb ram ibm db2 community edition replaces db2 express edition june 27 2019 ibm announced special free version db2 database called db2 community edition db2 community edition created 11.5 release ibm db2 db2 community edition replaced previously free version ibm db2 known db2 express-c. january 30 2006 ibm announced special free version db2 express edition called db2 express-c db2 express-c edition created 8.2 release ibm db2 db2 express-c created new db2 versions 9.1 codenamed viper 9.5 codename viper 2 9.7 codename cobra 10.01 codename galileo 10.5 codename kepler 11.1 ibm db2 purexml implementation xml database features introduced beta db2 9 community edition download available following platforms ibm® db2 11.5 edition aix® ibm® db2 11.5 edition windows® amd64 intel® em64t systems x64 ibm® db2 11.5 linux® amd64 intel® em64t systems x64 ibm® db2 11.5 linux® power little endian systems also docker image download available community edition ibm db2 community edition limited use 16 gb ram four cpu cores database engine limit number concurrent user connections prior version ibm db2 express-c limited use 16 gb ram increase 4 gb v10.5 two cpu cores db2 community edition feature set similar db2 standard advanced editions main difference community edition lower cpu memory limits supported unsupported following extra features enabled db2 community edition unsupported regular db2 fix packs applied ibm release fixes publish updated installation images remove old ones unix versions need reinstalled possible perform in-place updates windows versions running installation program newer version need access regular db2 fix packs released several times per year need buy db2 standard advanced editions installation images traditionally refreshed every major db2 release sync code second fix pack db2 community editions annual subscriptions instead free trial available indefinitely users want scale beyond four cores 16 gb ram need migrate workload upgraded environment instead users apply license key existing implementation access additional capacity | [
5380,
1037,
5006,
6797,
11024,
8340,
5397,
4630,
10518,
10137,
2168,
4255,
9634,
6311,
2089,
5677,
10413,
7983,
9397,
823,
10040,
5051,
5691,
10048,
6850,
5450,
4817,
2775,
8792,
2780,
477,
734,
479,
3045,
5356,
5612,
6124,
3951,
9455,
49... | Test |
4,631 | 1 | RISE-PAK:rise-pak relief information systems earthquakes pakistan abbreviated rise-pak information-sharing web portal created pakistani-american economist asim ijaz khwaja along experts world bank pomona college national database registration authority world online pakistan largest internet service provider hosted website lahore school management sciences created 2005 earthquake kashmir claimed 80,000 lives around 70,000 injured pakistan india afghanistan website displayed maps 4000 villages affected quake database demographic information disaster information assistance received access routes villages area also provided pre-earthquake information showing village-level demographic infrastructure data major road networks distance every village epicentre earthquake | [
848
] | Test |
4,632 | 3 | Sakhr_Software_Company:sakhr software company sakhr software company arabic language technology company based kuwait deals products middle east e-governance education wireless security sakhr founded 1982 mohammed alsharekh branching computer hardware company alamiah electronics producing arabic versions msx computers nearly three decades industry us 100 million investments leads field arabic language machine translation ocr speech recognition speech synthesis search localisation company currently 200 employees worldwide research engineering activities silicon valley egypt sales offices u.s. washington dc california kuwait uae dubai abu dhabi oman egypt saudi arabia 2009 sakhr acquired dial directions inc. u.s. silicon valley software company providing language applications mobile cloud-computing environments including wireless carriers telematics “ smartphones ” apple iphone enhance market position emerging mobile application cloud computing market sakhr software following international awards | [
5857,
10557
] | None |
4,633 | 9 | Cynthia_Solomon:cynthia solomon cynthia solomon american computer scientist known work artificial intelligence ai popularizing computer science students pioneer fields artificial intelligence computer science educational computing working researcher massachusetts institute technology mit dr. solomon took upon understand program programming language lisp began learning language realized need programming language accessible understandable children throughout research studies education dr. solomon worked full-time computer teacher elementary secondary schools work mainly focused research human-computer interaction children designers working bolt beranek newman worked wally feurzeig seymour papert create first programming language children named logo language created teach concepts programming related lisp dr. solomon attained many accomplishments life vice president r logo computer systems inc. apple logo developed director atari cambridge research laboratory dr. solomon worked program committee constructing modern knowledge marvin minsky institute artificial intelligence 2016 published many writings based research field child education technology classroom dr. solomon conducted workshops elementary schools high schools colleges regarding academic research writing continues contribute field speaking conferences working one laptop per child foundation cynthia admitted struggling classes middle high school mentioned became motivated continue education passion computer science kind music teachers dr. solomon received bachelor arts b.a history radcliffe college early 1960s subsequently studied boston university received master science m.s computer science 1976 received doctor philosophy ph.d. education harvard university 1985 intermittently completing schooling solomon worked several years researcher marvin minsky seymour papert mit later bolt beranek newman receiving b.a radcliffe college dr. solomon taught milton academy milton massachusetts seven years also became technology integration coordinator monsignor haddad middle school needham massachusetts 1980s massachusetts institute technology hired dr. solomon lead atari cambridge research laboratory due success developing logo solomon maintained long relationship working mit media lab one laptop per child foundation dr. solomon still leading worker foundation directed creation educational materials continued teaching consulting scholarship working several esteemed research labs foundations together seymour papert wally feurzeig cynthia designed logo computer programming language 1967 language children experiment words solve math problems make-up stories create games logo widely known use turtle graphics commands movement drawing produced line graphics either screen small robot called turtle 1970s new development logo introduced allowing program viewed multiple colors language created teach concepts programming related lisp functional programming language later logo also enabled papert called body-syntonic reasoning students could understand predict reason turtle motion imagining would turtle substantial differences among many dialects logo situation confused regular appearance turtle graphics programs call logo dr. solomon began develop logo coming realization children needed programming language solomon directed creation educational materials one laptop per child foundation doctoral research harvard led publication critical book computer environments children reflection theories learning education book explores opportunities challenges presented regarding computers learning environments focused specifically elementary school mathematics solomon discusses role computers innovative learning theories solomon also co-author designing multimedia environments children allison druin along many research projects writings contributing knowledge children learning environments conjunction technology 2016 solomon national center women information technology ncwit pioneer award solomon received lifetime achievement award constructionism 2016 introduced seymour papert memorial lecture crossroads 2018 facilitated conversation new uses program education new demographic users | [
10752,
11269,
2056,
2062,
9231,
7184,
2577,
9749,
8728,
4122,
8226,
3119,
2105,
3132,
6717,
8258,
8771,
75,
1613,
9299,
10841,
3675,
7267,
2660,
8293,
2666,
5751,
7805,
1159,
9865,
9877,
5803,
2225,
7867,
4799,
7880,
8908,
205,
5837,
219,... | None |
4,634 | 2 | Memory_Technology_Device:memory technology device memory technology device mtd type device file linux interacting flash memory mtd subsystem created provide abstraction layer hardware-specific device drivers higher-level applications although character block device files already existed semantics n't map well way flash memory devices operate usb sticks mmcs sds compactflashes popular removable devices confused mtds although contain flash memory hidden behind block device interface using flash translation layer using mtd use mtd aware file system jffs2 yaffs recommended mtd subsystem exports block devices well allows use common filesystem like ext4 however using mtd way recommended since neither detection bad blocks kind wear leveling | [
9762,
6403,
1801,
7818,
9004,
823,
6263
] | Test |
4,635 | 0 | Phrasal_template:phrasal template phrasal template phrase-long collocation contains one several empty slots may filled words produce individual phrases often restrictions grammatic category words allowed fill particular slots example phrase common stocks rose number number e.g. common stocks rose 1.72 340.36 phrasal templates akin forms blanks filled data word game mad libs makes use phrasal templates notion used natural language processing systems language generators application-oriented report generators neologism snowclone introduced refer special case phrasal templates clone popular clichés example misquotation diana vreeland pink navy blue india may gaven rise template x new black turn evolved x new term phrasal template first appeared linguistic study prosody 1983 n't appear come common use late 1990s | [
10560,
7780,
5350
] | None |
4,636 | 2 | FreeBSD_Foundation:freebsd foundation freebsd foundation united states-based 501 c 3 registered non-profit organization dedicated supporting freebsd project development community funding comes individual corporate donations used sponsor developers specific activities purchase hardware network infrastructure provide travel grants developer summits freebsd foundation able provide legal representation sign contracts agreements behalf freebsd project also holds freebsd trademark related domain names freebsd foundation received initial 501 c 3 charity status december 7 2000 foundation formally announced world june 27 2001 current board directors follows | [
3969,
7425,
2180,
1927,
1801,
10761,
274,
9625,
1946,
546,
2212,
6438,
10535,
684,
4908,
1071,
2864,
3248,
9009,
11698,
6069,
1718,
11573,
9784,
1465,
5177,
5819,
3006,
11459,
9927,
8266,
8395,
1101,
5710,
8909,
6864,
7249,
850,
8147,
104... | None |
4,637 | 2 | Live_USB:live usb live usb usb flash drive external hard disk drive containing full operating system booted evolutionary next step live cds added benefit writable storage live usb allowing customizations booted operating system live usbs used embedded systems system administration data recovery test driving persistently save settings install software packages usb device many operating systems including windows xp embedded large portion linux bsd distributions run usb flash drive windows 8 enterprise feature titled windows go similar purpose repair computer booting issues technicians often use lightweight operating systems bootable media command line interface development first live cds graphical user interface made feasible non-technicians repair malfunctioning computers live cds linux based addition repairing computers would occasionally used right operating systems personal computers introduced usb booting early 2000s macintosh computers introducing functionality 1999 beginning power mac g4 agp graphics slot-loading imac g3 models intel-based macs carried functionality booting macos usb specialized usb-based booting proposed ibm 2004 reincarnating pcs portable soulpads boot gnu/linux firewire device live usbs share many benefits limitations live cds also incorporate various applications exist create live usbs examples include rufus fedora live usb creator unetbootin wintousb win32diskimager yumi works variety distributions linux distributions live cds ready-made scripts perform steps automatically addition knoppix ubuntu extra applications installed persistent file system used store changes base install ranges little 16 mib tiny core linux large dvd-sized install 4 gigabytes set live usb system commodity pc hardware following steps must taken knoppix live cds utility boot allows users declare intent write operating system file structures either temporarily ram disk permanently disk flash media preserve added configurations security updates easier recreating usb system may moot since many live usb tools simple use alternative live solution traditional operating system installation elimination swap partitions installation advantage efficient software live installation would still contain software removed persistent file due operating systems installer still included media however full installation without disadvantages due additional write cycles occur full installation life flash drive may slightly reduced mitigate live systems designed store changes ram user powers system writes changes another factor speed storage device destitute performance comparable legacy computers even machines modern parts flash drive transfers speeds one way solve use usb hard drive generally give better performance flash drives regardless connector although many live usbs rely booting open-source operating system linux possible create live usbs windows using diskpart wintousb syslinux common program make bootable usb storage device | [
2560,
5120,
5123,
3079,
1032,
6155,
2064,
6675,
7187,
10776,
25,
3097,
10780,
3618,
4643,
6180,
9762,
5158,
3629,
4145,
7217,
10803,
8248,
9784,
10809,
3643,
576,
2625,
10306,
10817,
6221,
9807,
3160,
10333,
3167,
97,
11363,
3685,
6760,
1... | Test |
4,638 | 5 | IPFC:ipfc ipfc stands internet protocol fibre channel governs set standards created january 2006 address resolution arp transmitting ipv4 ipv6 network packets fibre channel fc network ipfc makes part fc-4 protocol-mapping layer fibre channel system ipfc ip datagram packet wrapped fc frame header transmitted sequence one frames receiver end received frames strips fc headers reassembles ip packet ip datagrams 65,280 bytes size may accommodated arp packet transmission works fashion ip datagram exchange unidirectional although ip tcp allow bidirectional communication within protocols ipfc application protocol typically implemented device driver operating system ip fc plays less important role storage area networking scsi fibre channel ip ethernet ipfc used example provide clock synchronization via network time protocol ntp | [
5472,
10344,
1743,
7983,
216,
5437,
5469,
5470
] | None |
4,639 | 4 | RCCA_security:rcca security replayable cca security rcca security security notion cryptography relaxes older notion security chosen-ciphertext attack cca precisely adaptive security notion cca2 cca-secure systems rcca secure converse true claim lot use cases cca strong rcca suffices nowadays certain amount cryptographic scheme proved rcca-secure instead cca secure introduced 2003 research publication ran canetti hugo krawczyk jesper b. nielsen | [
177,
1797
] | Test |
4,640 | 8 | Web_log_analysis_software:web log analysis software web log analysis software also called web log analyzer kind web analytics software parses server log file web server based values contained log file derives indicators web server visited reports usually generated immediately data extracted log files alternatively stored database allowing various reports generated demand features supported log analysis packages may include hit filters use pattern matching examine selected log data | [
8448,
225,
705,
4033,
6273,
2312,
3401,
7983,
6576,
8470,
1943,
9014,
5724,
10814
] | Test |
4,641 | 3 | IBM_Mwave:ibm mwave mwave technology developed ibm allowing combination telephony sound card features single adapter card technology centers around mwave digital signal processor dsp technology used time provide combination modem sound card ibm aptiva line thinkpad laptops addition uses specialized mwave cards handled voice recognition isdn networking connectivity similar adapter cards third-party vendors using mwave technology also sold however plagued consumer complaints buggy mwave software hardware ibm eventually turned audio telephony solutions consumer products malcolm ware former developer mwave dates technology back development ibm research lab zurich switzerland 1979 first prototype tested ibm pc 1981 utilized adapter cards mwave given official name used ibm windsurfer isa/mca card ibm manufactured mwave hardware microsoft windows os/2 another revision technology used ibm newly renamed aptiva line one revisions mwave card mwave dolphin card isa legacy card support plug play natively supported windows software featured 28.8k/second fax/modem sound blaster-compatible audio solution one card publicized features software upgradeability version mwave software upgraded modem function 33.6k addition card key support aptiva rapid resume features including wake-up ring various consumer complaints users reporting problems involving either sound modem features separately using time consumers offered check purchase hardware replace mwave card others offered replacement modem sound card one point class action lawsuit filed finally settled 2001 mwave dolphin drivers version 20d stingray version mwave adapter addressed shortcomings dolphin stingray added plug play support ibm eventually stopped using mwave adapter card aptiva computers resorted conventional sound card modem options mwave form another produced mca isa pcmcia busses select thinkpad 600 770 models pci version integrated mwave chip integrated select thinkpad 755 760 765 models isa-based certain sun sparcstation workstations incorporated mwave dsp chip sound card functionality although mwave adapter cards discontinued linux driver pci-based mwave thinkpad 600 770 models developed released ibm | [
3304,
6797,
8561,
823,
5368,
3323
] | Test |
4,642 | 3 | Leading_Edge_Model_D:leading edge model leading edge model ibm clone computer first released leading edge hardware july 1985 initially priced 1,495 configured dual 5.25 floppy drives 256 kb ram monochrome monitor manufactured south korean conglomerate daewoo distributed canton massachusetts-based leading edge engineer stephen kahng spent four months designing model cost 200,000 kahng later became ceo macintosh clone maker power computing august 1986 leading edge cut price base model 200 1,295 increased base memory machine 512 kb model immediate success selling 100,000 units first year production continued sell well several years dispute dealers forced leading edge bankruptcy 1989 model initially featured intel 8088 microprocessor 4.77 mhz although later models switch back run 4.77 mhz normal 7.16 mhz high earlier models turbo switch ran 4.77 mhz later ones seemingly rare 7.16 mhz four models known dc-2010 dc-2011 dc-2010e dc-2011e e seems correlate capability running 7.16 mhz unlike ibm pc ibm pc/xt model integrated video disk controller battery backed clock serial parallel ports directly onto motherboard rather putting plug-in cards allowed model half size ibm models four full-length isa expansion slots available motherboard came eight different revisions revision 1 5 7 8 cc1 cc2 wc1 wc2 list motherboard part numbers revision numbers found revisions 1 7 usually found models dc-2010 dc-2011 revisions 8 wc2 either 2010e 2011e wc1 presumably also wc2 7.16 mhz due tight integration model motherboard nonstandard form factor replacing motherboard off-the-shelf upgrade possible model came preinstalled 256 512 640 kb ram lower-capacity machines user upgradeable 640 kb motherboard revisions 7 8 wc1 wc2 came 768 kb ram installed 640 kb available user models featured monochrome/cga selection switch single port used modes models monochrome cga port also switch change modes ports model computers supported special extended graphics mode 640x200 buyer choice floppy disk model fixed disk hard disk model floppy disk model one two 360 kb drives user could run ms-dos programs primary drive work files secondary drive equipped fixed disk model one 360 kib floppy drive either 10 mb 20 mb 30 mb hard disk model 20 mb fixed disk initially released february 1986 cost 1,895 leading edge dealers difficulty keeping 20mb model stock time tandy 1200 equipped 10mb drive sold 1999 buyer also choice amber green monochrome crt monitor unit came ms-dos 2.11 later special edition gw-basic support extended graphics mode also came diagnostics disk disk contained diagnostics program park.com utility used park hard drive heads computer moved models also came word processing program developed leading edge titled leading edge word processor commonly referred acronym 'lewp computer supports microsoft windows operating system version 3.0 last version windows support real mode dataquest estimated model 1 american home-computer market 1986 first year availability 1,495 list price lowest seven compatibles comparable configurations september 1985 infoworld chart half price 2,820 ibm pc along tandy 1000 epson equity series model one first ibm pc compatible computers become popular home use due low price good reviews previously ms-dos ibm compatibles almost exclusively used businesses home computer market dominated commodore apple atari years afterward many home-oriented software packages pc specifically cited model along tandy epson models compatible hardware leading edge phoenix technologies first customer ibm-compatible bios model one first pcs market use phoenix bios although advertised 100 ibm compatible numerous letters published january 13 1986 issue infoworld identified compatibility issues several popular software packages aftermarket hard drives syndicated newspaper columnists t.r reid michael schrage writing april 1986 predicted popularity model would lead hardware software vendors specifically testing compatibility spite early reports model continued sell well early 1987 daewoo producing 13,000 units per month failing keep demand result buyers waited 2–8 weeks taking delivery model also distinction first korean-made pc sold united states time introduction undercut price similar ibm pc compatibles 500 pc magazine october 1985 called model clear winner among six inexpensive pc compatibles tested review noted computer many included hardware features concluded may represent next generation personal computing compact full ibm hardware compatibility allows full featured quite well made alluringly priced model received 4 5 stars infoworld praised computer value high level compatibility december 1985 concluded recommend highly especially budget-conscious beginner positive october 1986 review popular mechanics cited low price quality keyboard received good reviews computer magazines consumer reports magazine | [
4674,
6660,
1515,
6797,
9166,
2159,
6129,
9363,
7190,
5368,
4411
] | Test |
4,643 | 2 | BBN_Time-Sharing_System:bbn time-sharing system bbn time-sharing system early time-sharing system created bolt beranek newman bbn pdp-1 computer began operation september 1962 digital equipment corporation prototype pdp-1 ready november 1959 machine featured november/december issue datamation magazine bbner ed fredkin saw prototype system eastern joint computer conference boston december 1959 extremely interested given bbn interest dec founder president ken olsen visited explained dec completed construction prototype pdp-1 needed test site month bbn agreed test site regular hourly rates early 1960 obtained prototype pdp-1 first production pdp-1 arrived november 1960 formally accepted april 1961 pdp-1 installed bbn 1960 j.c.r licklider took mit john mccarthy marvin minsky consultants mccarthy advocating concept time-sharing computers found slow progress mit bbn licklider fredkin keenly interested particular fredkin insisted timesharing could done small computer namely pdp-1 fredkin recounts mccarthy recalled 1989 accordingly bbn team largely led sheldon boilen built custom hardware add-ons company second pdp-1 provide external interrupt system magnetic drum swapping storage end bbn acquired first univac fastrand rotating drum 45-mbyte storage capacity access time 0.1 second fall 1962 bbn conducted public demonstration bbn time-sharing system one operator washington d.c. two cambridge.. described mccarthy et al. computer hardware follows pdp-1 single address binary computer 18 bit word five microsecond memory cycle instructions require ten microseconds execute basic memory size 4096 words 65,536 words may addressed indirectly machine used 8192 words 4096 reserved time-sharing system user sees 4096 word memory ... attached computer high speed magnetic drum memory divided 22 fields 4096 words basic operation drum system memory-swap accomplished 33 milliseconds operation 4096 words transferred core memory drum field simultaneously core memory loaded different drum field ... 4096 word drum field allocated saving core image user program running user program run status run 140 milliseconds another user also run status state core memory stored first user core image drum simultaneously second user core image loaded core second user program started appropriate place | [
6529,
2179,
10499,
10883,
7048,
394,
3978,
1804,
6797,
273,
7057,
6675,
7187,
11539,
9366,
11667,
6296,
25,
10776,
8092,
4637,
7325,
9887,
10016,
9762,
421,
5158,
10235,
2345,
7983,
3248,
7217,
11184,
6837,
823,
9784,
4409,
10809,
6075,
7... | Validation |
4,644 | 4 | ROCA_vulnerability:roca vulnerability roca vulnerability cryptographic weakness allows private key key pair recovered public key keys generated devices vulnerability roca acronym return coppersmith attack vulnerability given identifier cve-2017-15361 vulnerability arises problem approach rsa key generation used software library rsalib provided infineon technologies incorporated many smart cards trusted platform module tpm implementations vulnerability appears recent yubikey 4 tokens often used generate pgp keys keys lengths 512 1024 2048 bits generated using infineon library vulnerable practical roca attack research team discovered attack masaryk university led matúš nemec marek sýs estimate affects around one-quarter current tpm devices globally millions smart cards believed affected team informed infineon rsalib problem february 2017 withheld public notice mid-october citing responsible disclosure time announced attack provided tool test public keys vulnerability published details attack november generating rsa key involves selecting two large randomly-generated prime numbers process time-consuming particularly small devices smart cards addition primes numbers certain properties best security vulnerable rsalib selection process quickly creates primes desired type testing primality numbers form formula_2 product first n successive primes 2 3 5 7 11 13 ... n constant depends desired key size security based secret constants formula_3 formula_4 roca attack exploits particular format primes using variation coppersmith method addition public keys generated way distinctive fingerprint quickly recognized attempting compute discrete logarithm public key mod formula_2 base 65537 computing discrete logarithms large group usually extremely difficult case done efficiently using pohlig–hellman algorithm formula_2 smooth number test site available internet roca authors consider public keys length 512 1024 2048-bits generated rsalib vulnerable details key generation differ different key lengths shorter keys necessarily vulnerable longer keys example 1952-bit rsalib key stronger 2048-bit key 4096-bit key weaker 3072-bit key best mitigation according authors generate rsa keys using stronger method openssl possible roca authors suggest using key lengths less susceptible roca 3936-bit 3072-bit 1952-bits 2048-bit key size maximum | [
1024,
2050,
5636,
9745,
4117,
8726,
535,
9761,
3619,
4133,
1608,
3657,
8779,
8283,
4703,
8288,
8292,
10875,
3711,
8320,
5764,
2187,
4240,
2709,
1688,
2717,
9375,
9904,
9395,
8886,
7354,
3789,
4304,
4314,
9435,
4830,
3807,
5349,
1254,
1047... | Test |
4,645 | 2 | Data_Control_Block:data control block ibm mainframe operating systems os/360 mvs z/os data control block dcb description dataset program dcb coded assembler programs using dcb macro instruction expands large number define constant instructions high level language programmers use library routines containing dcbs dcb one many control blocks used operating systems control block data area predefined structure similar c codice_1 typically related system functions dcb may compared file structure c much complex offering many options various access methods control block acted application programming interface logical iocs application program usually defined within resided within application program addresses i/o subroutines would resolved linkedit phase compilation else dynamically inserted open time equivalent control block ibm dos/360 dos/vse z/vse operating systems dtf define file many constants variables contained within dcb may left blank i.e. default zero open process results merge constants variables specified dd jcl statement dataset label existing magnetic tape direct-access datasets dcb replacing zero values actual non-zero values control block called jfcb job file control block initially holds information extracted dd statement dataset results merge stored jfcb may also written dscb close process thereby making dataset definition permanent example blksize= variable may usually specified dcb zero dd statement blksize specified non-zero value results program-specified lrecl logical record length jcl-specified blksize physical block size merge two becoming permanent definition dataset | [
8290,
1219,
6664,
7053,
10958,
7983,
8911,
2804,
2168,
9977,
11131,
477
] | Test |
4,646 | 2 | Crash-only_software:crash-only software crash-only software refers computer programs handle failures simply restarting without attempting sophisticated recovery correctly written components crash-only software microreboot known-good state without help user since failure-handling normal startup use methods increase chance bugs failure-handling code noticed except leftover artifacts data corruption severe failure n't occur normal startup crash-only software also benefits end-users often applications save data settings running end use example word processors usually save settings closed crash-only application designed save changed user settings soon changed persistent state matches running machine matter application terminates clean close sudden failure laptop battery state persist erlang computer language originally built ericsson fault-tolerant telephone switches programs structured modules replaced hot swapped without restart entire program module crashes needs updated restarted replaced without affecting part program within open telecom platform often used together erlang exist frameworks simplify automate task | [
7187,
8127
] | Test |
4,647 | 2 | Jet_Data_Access_Objects:jet data access objects jet data access objects general programming interface database access microsoft windows systems primarily jet ace databases dao originally called vt objects dao 1.0 came november 1992 part access 1.0 version 3.5 able bypass jet engine altogether directly access odbc data sources including microsoft sql server enterprise database systems dao 3.6 shipped jet 4.0 access 2007 later uses ace acedao new features supported ace added acedao longer supports odbcdirect dao works creating workspace object database operations performed workspace object exists session object exists within larger database engine object two types database engines jet database engine object odbcdirect database engine jet database engine access 2007 later ace object consists several objects first version dao used snapshot/dynaset/table objects etc dao 2.0 recordset etc objects introduced dao 3.0/3.5 supported old objects using special compatibility tlb removed completely dao 3.6 odbcdirect database engine consists workspace object errors object main differences database engine jet database engine odbc connection objects consist querydef objects recordset objects | [
736,
7523,
8804,
4261,
2183,
5356,
6797,
2901,
11030,
5401,
8607
] | Validation |
4,648 | 4 | Cutwail_botnet:cutwail botnet cutwail botnet founded around 2007 botnet mostly involved sending spam e-mails bot typically installed infected machines trojan component called pushdo affects computers running microsoft windows june 2009 estimated cutwail botnet largest botnet terms amount infected hosts security provider messagelabs estimated total size botnet around 1.5 2 million individual computers capable sending 74 billion spam messages day 51 million every minute equal 46.5 worldwide spam volume february 2010 botnet activities slightly altered started ddos attack 300 major sites including cia fbi twitter paypal reasons attack n't fully understood experts described accident mainly due lack damage disruption along infrequency attacks august 2010 researchers university california santa barbara ruhr university bochum attempted take botnet managed take offline 20 30 command control servers botnet using cutwail fairly simple botnet bots connect directly command control server receive instructions emails send done task bots report back spammer exact statistics number emails delivered many errors reported cutwail botnet known 0bulk psyche evolution underground market spammers rent instance botnet fee use send spam campaigns services offered botnet advertised russian underground forum spamdot.biz taken 2010 june 2010 least 8 different spam groups using botnet deliver junk mail | [
3072,
10756,
3724,
6797,
3347,
4883,
2325,
278,
9630,
10657,
939,
46,
10297,
3643,
1979,
7739,
7996,
11583,
9664,
9154,
8133,
10952,
81,
8789,
10457,
7515,
988,
3807,
8032,
3941,
10477,
4462,
2041,
10875,
3581,
5886,
9087
] | Train |
4,649 | 4 | Ikee:ikee ikee worm spread secure shell connections jailbroken iphones stole apple ids passwords discovered 2009 changed wallpapers photo rick astley iphone owners australia reported smart phones infected worm changed iphone wallpaper rick astley 1980s pop singer affected smartphones owner change default password installation ssh ikee worm infected would find iphones mobile network vulnerable infect well worm would n't affect users n't jailbroken installed ssh iphone worm nothing changing infected user lock screen wallpaper source code ikee worm says written ikex | [
11266,
10756,
901,
7739,
10341,
2538,
2259,
2041,
7515,
4957
] | Test |
4,650 | 5 | MAC_service_data_unit:mac service data unit mac service data unit media access control service data unit msdu service data unit received logical link control llc sub-layer lies media access control mac sub-layer protocol stack llc mac sub-layers collectively referred data link layer dll | [
7865,
5118,
3847
] | Validation |
4,651 | 1 | Ideas_bank:ideas bank ideas bank widely available shared resource usually website people post exchange discuss polish new ideas ideas banks used develop new inventions technologies many corporations installed internal ideas banks gather input employees improve ideation process ideas banks employ voting system estimate idea value cases ideas banks humor-oriented serious counterparts many ideas banks provided free charge set around certain companies general work new inventions although ideas provided community people problems arise people take ideas site begin developing possible way prove idea ideas bank original taken something else front end innovation quite distinct remainder innovation process best ideas discovered managed stage gate oriented project management system work flow defined front end innovation commonly referred fuzzy functions best collaborative system nurtures chaos disruption serendipitous discovery ideas ideas submitted via electronic suggestion box limited incremental innovation things way always better nothing wrong incremental innovation fact ideas leading projects resulting incremental innovation typically yield rapid revenue gains cost savings organizations using collaborative idea management systems get breakthrough radical innovation ideas thought box thinking fuzzy front end innovation benefits collaborative tool serving backbone nurture organization culture innovation everyone log system post objects interest users search information comment information discover experts organization needed result everyone well informed sense collaborative tool serves knowledge management system facebook-like except everyone talking work course collaborative tool also accepts submission ideas idea management software solution manages ideas allowing others comment shaping idea clustering similar ideas utilizing idea management software similarity search capabilities accepting sort voting scheme order score idea worth better idea management software systems use algorithm measure wisdom crowd gauging social media type activity instance means best ideas automatically promoted get combination votes comments votes comments views follows alerts bookmarks similar ideas posted ... combined mathematical formula determine idea best measured group collaborators working ideas unsolicited ideas typically lead incremental innovation get radical breakthrough innovation idea management system needs indulge strategic guidance issuing challenges campaigns seeding essence bottom grown organizational engagement collaborative idea management system managed little bit top strategic guidance company saying 're glad 're talking together us favor talk ... ask ideas address big issues company instance make company 'green next new product us collaborating companies assemble smart people company exchange ideas enhance ideas best ideas automatically promoted need automated promotion mechanism software problem n't wo n't get enough ideas problem 'll get many n't want someone manually filter | [
7114,
6202
] | Train |
4,652 | 0 | Audio_mining:audio mining audio mining technique content audio signal automatically analysed searched commonly used field automatic speech recognition analysis tries identify speech within audio audio typically processed speech recognition system order identify word phoneme units likely occur spoken content information may either used immediately pre-defined searches keywords phrases real-time word spotting system output speech recogniser may stored index file one audio mining index files loaded later date order run searches keywords phrases results search normally terms hits regions within files good matches chosen keywords user may able listen audio corresponding hits order verify correct match found audio mining systems used field speech recognition often divided two groups use large vocabulary continuous speech recognisers lvcsr use phonetic recognition musical audio mining also known music information retrieval relates identification perceptually important characteristics piece music melodic harmonic rhythmic structure searches carried find pieces music similar terms melodic harmonic and/or rhythmic characteristics | [
1890,
10557
] | Validation |
4,653 | 2 | Wii_Freeloader:wii freeloader wii freeloader bootdisc developed datel circumvent regional lockout wii video game console allows playing games regions allow use dvd±r commonly used backups copies homebrew used combination modchip allow compatibility games use update blocker user enters bootdisc wii system launches application wii menu replaces disc region-locked game disc disc allows user play foreign gamecube games issues reported different signals games simply working foreign system even use wii freeloader wii games one version game disc siliconera reported north american version video game played japanese wii using wii freeloader switch play japanese version game system | [
1067,
6878
] | Test |
4,654 | 4 | Default_password:default password device needs username and/or password log default password usually provided allows device accessed initial setup resetting factory defaults manufacturers equipment typically use simple password admin password equipment ship expectation users change password configuration default username password usually found instruction manual common devices device default passwords one major contributing factors large-scale compromises home routers leaving password devices available public huge security risk devices wireless routers come unique default router username passwords printed sticker secure option common default password vendors however derive password device mac address using known algorithm case password also easily reproduced attackers access internet connected devices network user must know default ip address manufacturers typically use codice_1 also codice_2 default router ip address however variations similarly login details leaving unchanged lead security issues | [
5002,
107,
4373,
7411
] | Validation |
4,655 | 7 | Nsite_Software:nsite software nsite a.k.a nsite.com nsite software platform service company based bay area specializing sales force enhancements although several pre-built applications offered platform promising part nsite ability customer use product develop application using simple internet-based interface since 2006 part sap business objects company claimed 27,000 customers worldwide acquired sap business objects november 2006 flagship product subscription-based nsite platform components provide quote proposal order management custom development platform ajax front-end ms-sql back-end paul tabet co-founded nsite 1998 together others chief executive officer 2002 2002 alf goebel announced ceo two years later bob jandro announced new ceo nsite grew 27,000 customers height success started downward spiral shortly sap business objects acquisition finally met end 2010 announced retirement | [
3405
] | Validation |
4,656 | 9 | GrGen:grgen grgen.net software development tool offers programming languages domain specific languages optimized processing graph structured data core languages consists modular graph rewrite rules built declarative graph pattern matching rewriting supplemented many constructs used imperative object-oriented programming completed language devices known database query languages graph rewrite generator compiles languages efficient cli assemblies via c -code intermediate step integrated via api code written .net-language grgen executed windows linux mono needed open source available lgpl v3 rapid prototyping debugging interactive shell vcg- graph viewer included package languages visual stepwise debugging grgen allows one develop natural level abstraction graph-based representations employed engineering model transformation computational linguistics compiler construction intermediate representation grgen increases productivity kinds tasks far beyond achieved programming traditional programming language due many implemented performance optimizations still allows one achieve high-performance solutions authors claim system offers highest combined speed development execution available algorithmic processing graph-based representations based performance regarding diverse tasks posed different editions transformation tool contest /grabats example containing graph model rule specifications grgen.net-solution antworld-case posed grabats 08 graph model rewrite rules | [
1952,
9345,
1890,
8262,
9926,
5612,
6797,
7983,
10703,
823,
987,
7325
] | Validation |
4,657 | 2 | Apple_Software_Restore:apple software restore apple software restore asr command line utility mac os x used apply dmg disk image selected partition mount point file system often used cloning large numbers macintosh computers apple software restore read image locally server via http multicast asr // uri asr two methods use restore image volume either copy items file-by-file mode directly block-copy image latter method need go os filesystem much faster typically limited speed drives network connections involved order use faster method .dmg file involved must first checksummed cases files re-ordered inside image also done tool graphical disk utility uses asr processes background perform restores | [
11137,
11521,
2819,
1796,
3719,
4615,
10888,
11402,
9100,
5647,
10512,
1042,
8852,
9109,
7318,
4888,
3228,
11037,
2207,
1439,
9762,
811,
3371,
5292,
1710,
6700,
7983,
8877,
1074,
10036,
3766,
2232,
9912,
11257,
9406,
6849,
4933,
713,
9418,
... | None |
4,658 | 2 | Internet_Server_Application_Programming_Interface:internet server application programming interface internet server application programming interface isapi n-tier api internet information services iis microsoft collection windows-based web server services prominent application iis isapi microsoft web server isapi also implemented apache mod_isapi module server-side web applications written microsoft iis used apache third-party web servers like zeus web server offer isapi interfaces microsoft web server application software called internet information services made number sub-applications configurable asp.net one slice iis allowing programmer write web applications choice programming language vb.net c f supported microsoft .net clr isapi much lower-level programming system giving much better performance expense simplicity isapi consists two components extensions filters two types applications developed using isapi filters extensions must compiled dll files registered iis run web server isapi applications written using language allows export standard c functions instance c c++ delphi couple libraries available help ease development isapi applications delphi pascal intraweb components web-application development mfc includes classes developing isapi applications additionally atl server technology includes c++ library dedicated developing isapi applications isapi extensions true applications run iis access functionality provided iis isapi extensions implemented dlls loaded process controlled iis clients access isapi extensions way access static html page certain file extensions complete folder site mapped handled isapi extension isapi filters used modify enhance functionality provided iis always run iis server filter every request find one need process filters programmed examine modify incoming outgoing streams data internally programmed externally configured priorities determine order filters called filters implemented dlls registered iis server site level global level i.e. apply sites iis server filters initialised worker process started listens requests site installed common tasks performed isapi filters include list common isapi applications implemented isapi extensions isapi applications developed using development tool generate windows dll wizards generating isapi framework applications available microsoft development tools since visual c++ 4.0 | [
8582,
1802,
10506,
6797,
9229,
11154,
1556,
8350,
10654,
10020,
10026,
7212,
1837,
10284,
2485,
5048,
7608,
1468,
4797,
8644,
1098,
11466,
3920,
4439,
5593,
5849,
6366,
225,
865,
7784,
9834,
9580,
4974,
8689,
9841,
5754,
124,
9726
] | Test |
4,659 | 4 | MacKeeper:mackeeper mackeeper utility software distributed kromtech alliance known heavily promoted aggressive advertising affiliate marketing mackeeper faced class-action lawsuit company allegedly deceived users paying unneeded fixes lawsuit settled 2015 us 2 million without admission guilt company five major versions mackeeper released first beta version mackeeper 0.8 released 13 may 2010 mackeeper 1.0 released october 26 2010 mackeeper 2.0 released 30 january 2012 macworld – iworld expanded number utilities related security data control cleaning optimization kromtech alliance acquired mackeeper zeobit april 2013 mackeeper 3.0 released june 2014 software service new human expert feature optimization os x yosemite july 2018 mackeeper 4.0 released mackeeper initially developed 2009 zeobit april 2013 zeobit sold mackeeper kromtech alliance corp. kromtech closely affiliated zeobit ukraine hired many former kiev-based zeobit employees december 2015 security researcher chris vickery discovered publicly accessible database 21gb mackeeper user data internet exposing usernames passwords information 13 million mackeeper users according kromtech result server misconfiguration error fixed within hours discovery integrates avira anti-malware scanning engine versions opened critical security hole filesystem-level encryption tool encrypt files folders password data recovery utility permits users recover unintentionally deleted files backup software also included copy files usb flash drive external hdd ftp server data erasure permits users permanently delete files although pc world argues feature duplicates secure empty trash feature formerly built macos disk cleaner finds removes junk files hard drive order free space earlier bundles received mixed reviews reviewers divided effectiveness software macworld gave mackeeper 3.5 5 stars august 2010 based 0.9.6 build program found reasonably priced set tools experienced lagging switching tools maclife rated 2.5 5 said useful mainly freeing drive space found features offered inconsistent results believed users ’ need antivirus feature av-comparatives found mackeeper excellent ability detect mac-based malware noted well suited enthusiasts good understanding security issues ideal non-expert users need pre-configured optimal security macs opswat awarded program gold certification protecting users anti-phishing attempts well spyware malware zeobit claims negative attacks launched mackeeper unnamed competitor many users press confusing mackeeper another application reviews latest software version largely negative may 2015 test pc world found mackeeper identified need extensive corrections brand new fully patched machines december 2015 business insider imore suggested users avoid product install top ten reviews removed mackeeper top 10 ranking noting software features competitors performance mac malware identification tests showed software better detection rates resulting score 7.5 10 july 2017 av-test assessment found mackeeper detected 85.9 percent tested malware mackeeper criticized difficult uninstall tom guide macworld published how-to guides deleting software according macworld users frequently ask get rid mackeeper sophos malwarebytes competing vendors kromtech anti-virus software market identified mackeeper potentially unwanted program sophos reported mackeeper 2017 prolific macos potentially unwanted program macworld observed aggressive mackeeper advertising leads people believe software either malware scam neither macworld also notes pop-up pop-under ads may due third-party installers computerworld described mackeeper virulent piece software promises cure mac woes instead makes things much worse softonic.com described software perfect genuinely useful also noting mackeeper exaggerates threat associated user security app multiple reviewers criticized zeobit marketing promotional techniques kromtech buys upwards 60 million ad impressions month making one largest buyers web traffic aimed mac users zeobit accused employing misleading advertising regard promotion mackeeper including aggressive affiliate marketing pop-under ads planting sockpuppet reviews well websites set discredit competitors kromtech also issues affiliate advertisers attracted 50 percent commissions kromtech pays sales mackeeper wrapped mackeeper ads adware 2018 kromtech began take steps affiliate marketers said scamming users january 2014 class action lawsuit filed zeobit illinois lawsuit alleged neither free trial full registered versions mackeeper performed credible diagnostic testing reported consumer mac need repair at-risk due harmful error may 2014 lawsuit filed zeobit pennsylvania alleging mackeeper fakes security problems deceive victims paying unneeded fixes 10 august 2015 zeobit settled class action lawsuit customers bought mackeeper 8 july 2015 apply get refund kromtech also filed least two unsuccessful lawsuits perceives defaming july 2013 kromtech filed lawsuit macpaw developers cleanmymac kromtech alleged macpaw employees created several usernames posts several websites defaming mackeeper software case dismissed hearing year later 2014 kromtech filed lawsuit david a. cox alleging defamed kromtech calling mackeeper fraudulent application youtube video judge dismissed case lack personal jurisdiction july 2016 kromtech sent cease desist letter luqman wadood 14-year old technology reviewer alleged harassment slander mackeeper brand number youtube videos luqman said videos diplomatic | [
9025,
4994,
6309,
11368,
9771,
3885,
8493,
7983,
4464,
467,
4889,
1242,
7515,
11225,
9055
] | None |
4,660 | 5 | Mail_Transfer_Protocol:mail transfer protocol mail transfer protocol mtp obsolete network protocol defined rfc 780 used reliably transfer email tcp udp ports 57 allocated mtp allocation removed iana simple mail transfer protocol smtp defined rfc 788 replaced mail transfer protocol | [
6993,
10924,
9909,
11413
] | None |
4,661 | 5 | Galeon:galeon galeon discontinued gecko-based web browser created marco pesenti gritti goal delivering consistent browsing experience gnome desktop environment gained popularity early 2000s due speed flexibility configuration features disagreement future galeon split development team 2002 resulted departure browser initial author several developers event marked beginning browser popularity decline led discontinuation september 2008 galeon features subsequently ported epiphany called web – descendant galeon galeon made use gecko features including configuration options standards support apart galeon several features uncommon browsers time project started marco pesenti gritti goal creating web browser would fast consistent gnome desktop environment first public version galeon 0.6 released june 2000 first releases galeon criticised lack basic features cookie proxy support though browser added features every release version 1.2 galeon introduced many new features drew attention general public time galeon creation popular linux browsers including netscape mozilla large multi-functional programs made slow start often impractical due high memory usage processor requirements opera somewhat faster proprietary software distributed trialware adware versions lacked functionality microsoft windows version galeon widely seen one best linux browsers available polls revealed substantial usage share galeon though popularity regarded owing lack stability evident mozilla browsers release new version gtk+ widget toolkit used construct user interface galeon team decided write new version galeon scratch time gnome project adopted new human interface guidelines promoted simplicity uniform design galeon team differing opinions new guidelines author lead developer marco pesenti gritti endorsed saw rewrite opportunity make galeon simpler many developers believed reducing number preferences simplifying user interface would harm project november 2002 result several discussions topic gritti made decision cease work galeon fork project started development hig-compliant web browser called epiphany known web gritti longer controlled development galeon previous functionality restored subsequent releases new features added though development got slow split time rising popularity firefox status default browser major distribution overwhelming number extensions led decline galeon user base eventually galeon developers announced plans halt development galeon saying current approach unsustainable regarding resources required maintain instead planned develop set extensions epiphany provide similar functionality even development ceased september 2008 browser remained popular december 2011 still available linux distribution repositories debian 6 squeeze although part debian 7 wheezy galeon praised customizability speed compared netscape navigator firefox though konqueror opera still faster older hardware galeon noted session handling crash recovery november 2002 osnews conducted poll determine popular gecko-based browser included several browsers microsoft windows mac os x linux n't include netscape navigator mozilla suite linux-only galeon second popular cross-platform firefox time known phoenix critics noted galeon tricky plugin installation | [
513,
6657,
9736,
2579,
6171,
9757,
7713,
3110,
10791,
9770,
559,
3639,
10808,
3643,
9275,
64,
5707,
10834,
6231,
8281,
6747,
1642,
9834,
9841,
115,
9843,
3191,
119,
4728,
637,
1664,
2182,
6797,
10910,
8351,
7340,
9394,
9908,
185,
11449,
... | Test |
4,662 | 0 | Sentence_extraction:sentence extraction sentence extraction technique used automatic summarization text shallow approach statistical heuristics used identify salient sentences text sentence extraction low-cost approach compared knowledge-intensive deeper approaches require additional knowledge bases ontologies linguistic knowledge short sentence extraction works filter allows important sentences pass major downside applying sentence-extraction techniques task summarization loss coherence resulting summary nevertheless sentence extraction summaries give valuable clues main points document frequently sufficiently intelligible human readers usually combination heuristics used determine important sentences within document heuristic assigns positive negative score sentence heuristics applied highest-scoring sentences included summary individual heuristics weighted according importance seminal papers laid foundations many techniques used today published hans peter luhn 1958 h. p edmundson 1969 luhn proposed assign weight sentences beginning document paragraph edmundson stressed importance title-words summarization first employ stop-lists order filter uninformative words low semantic content e.g grammatical words also distinguished bonus words stigma words i.e words probably occur together important e.g word form significant unimportant information idea using key-words i.e words occur significantly frequently document still one core heuristics today summarizers large linguistic corpora available today tf–idf value originated information retrieval successfully applied identify key words text example word cat occurs significantly often text summarized tf term frequency corpus idf means inverse document frequency corpus meant document cat likely important word text text may fact text cats | [
5122,
2440,
2059,
6798,
11538,
1044,
5399,
538,
7599,
4531,
3127,
2488,
10557,
6208,
3533,
5197,
6223,
8538,
5857,
7780,
7918,
8046,
8688,
10231,
8440,
7164
] | Test |
4,663 | 2 | Generic_Security_Services_Application_Program_Interface:generic security services application program interface generic security service application program interface gssapi also gss-api application programming interface programs access security services gssapi ietf standard addresses problem many similar incompatible security services use today gssapi provide security instead security-service vendors provide gssapi implementations usually form libraries installed security software libraries present gssapi-compatible interface application writers write application use vendor-independent gssapi security implementation ever needs replacing application need rewritten definitive feature gssapi applications exchange opaque messages tokens hide implementation detail higher-level application client server sides application written convey tokens given respective gssapi implementations gssapi tokens usually travel insecure network mechanisms provide inherent message security exchange number tokens gssapi implementations ends inform local application security context established security context established sensitive application messages wrapped encrypted gssapi secure communication client server typical protections guaranteed gssapi wrapping include confidentiality secrecy integrity authenticity gssapi also provide local guarantees identity remote user remote host gssapi describes 45 procedure calls significant ones include gssapi standardized c rfc 2744 language java implements gssapi jgss java generic security services application program interface limitations gssapi include standardizes authentication authorization assumes client–server architecture anticipating new security mechanisms gssapi includes negotiating pseudo mechanism spnego discover use new mechanisms present original application built dominant gssapi mechanism implementation use kerberos unlike gssapi kerberos api standardized various existing implementations use incompatible apis gssapi allows kerberos implementations api compatible | [
7,
10631,
4242,
3477,
2080,
2083,
9635,
2087,
5677,
2737,
10167,
5433,
5568,
961,
9665,
7368,
10058,
6098,
8539,
6750,
2143,
8670,
2274,
10341,
6888,
2027,
1012,
2804,
2045,
10366
] | Train |
4,664 | 3 | SPARC_T4:sparc t4 sparc t4 sparc multicore microprocessor introduced 2011 oracle corporation processor designed offer high multithreaded performance 8 threads per core 8 cores per chip well high single threaded performance chip chip 4th generation processor t-series family sun microsystems brought first t-series processor ultrasparc t1 market 2005 chip first sun/oracle sparc chip use dynamic threading out-of-order execution incorporates one floating point unit one dedicated cryptographic unit per core cores use 64-bit sparc version 9 architecture running frequencies 2.85 ghz 3.0 ghz built 40 nm process die size eight core eight thread per core chip built 40 nm process running 2.5 ghz described sun microsystems processor roadmap 2009 codenamed yosemite falls given expected release date late 2011 processor expected introduce new microarchitecture codenamed vt core online technology website register speculated chip would named t4 successor sparc t3 yosemite falls cpu product remained oracle corporation processor roadmap company took sun early 2010 december 2010 t4 processor confirmed oracle vp hardware development designed improved per-thread performance eight cores expected release within one year processor design presented 2011 hot chips conference cores renamed s3 vt included dual-issue 16 stage integer pipeline 11-cycle floating point pipeline giving improvements previous s2 core used sparc t3 processor core associated 16 kb data 16 kb instruction l1 caches unified 128 kb l2 cache eight cores share 4 mb l3 cache total transistor count approximately 855 million design first sun/oracle sparc processor out-of-order execution first processor sparc t-series family include ability issue one instruction per cycle core execution units t4 processor officially introduced part oracle sparc t4 servers september 2011 initial product releases single processor t4-1 rack server ran 2.85 ghz dual processor t4-2 ran 2.85 ghz frequency quad processor t4-4 server ran 3.0 ghz sparc s3 core also include thread priority mechanism called dynamic threading whereby thread allocated resources based need giving increased performance s3 core resources shared among active threads 8 shared resources include branch prediction structures various buffer entries out-of-order execution resources static resource allocation reserves resources threads based policy whether thread use dynamic threading allocates resources threads ready use thus improving performance cryptographic performance also increased t3 chip design improvements including new set cryptographic instructions ultrasparc t2 t3 per-core cryptographic coprocessors replaced in-core accelerators instruction-based cryptography implementation designed achieve wire speed encryption decryption sparc t4 10-gbit/s ethernet ports architectural changes claimed deliver 5x improvement single thread integer performance twice per-thread throughput performance compared previous generation t3 published specjvm2008 result 16-core t4-2 454 ops/m 321 ops/m 32-core t3-2 ratio 2.8x performance per core | [
5378,
9090,
9731,
1801,
4235,
6926,
1809,
4241,
1818,
8863,
8231,
1707,
2731,
10926,
3247,
6322,
10675,
4285,
6464,
7104,
9665,
9541,
3911,
2895,
3919,
597,
731,
6107,
2269,
9955,
7270,
11626,
10734,
1776,
11636,
630,
1399,
9976,
1788
] | Test |
4,665 | 2 | Benoit_Schillings:benoit schillings benoit schillings belgian software engineer distinguished engineer google x leading early projects x known one lead developers operating system beos noted amateur astronomer schillings association inc. began 1990 developer software apple macintosh visited apple expo paris met jean-louis gassée gassée left apple computer found asked schillings become second engineer would work operating system new computer called bebox schillings accepted offer starting march 1991 developed file system known old file system ofs associated user-space database application called zookeeper indexed metadata file system file system fast efficient later replaced dominic giampaolo file system schillings also developed graphics system beos known app server well programming frameworks interface kit application kit used software developers write software operating system joining trolltech october 2005 schillings worked distinguished engineer cto openwave mike reed led team developed version 7 openwave phone suite mobile phone applications benoit also ran android ios mobile teams yahoo 2013 2017 | [
3312,
8928,
4804,
11118
] | Validation |
4,666 | 3 | Dragon_MSX:dragon msx dragon msx msx 1 home computer designed radofin creators mattel aquarius dragon data well known dragon 64 home computer clone trs-80 color computer rare prototypes ever built | [
11657,
1515,
3788,
9006,
7983,
1776,
1403
] | Test |
4,667 | 9 | Anthony_James_Barr:anthony james barr anthony james barr born september 24 1940 aka tony barr jim barr american programming language designer software engineer inventor among notable contributions statistical analysis system sas automated lumber yield optimization automated classification medical entities acme widely used internationally science government industry academia sas system founded barr 1966 september 1966 athens georgia presented conceptual ideas sas members committee statistical software university statisticians southern experiment stations usses barr earlier created analysis-of-variance modeling language inspired notation statistician maurice kendall developed assembly language ibm 1410 graduate student north carolina state university 1962 1963 dr. a. grandage author ibm 650 analysis-of-variance programs advised statistical computations followed multiple regression program flexible input format algebraic transformation variables 1963 1964 drawing programs along experience structured data files created sas placing statistical procedures formatted file framework barr experience structured data files gained working formatted file system see 1966 1968 barr developed fundamental structure language sas 1968 barr began collaboration others barr designed implemented programming language data management report writing systems areas evolving system 1976 sas institute inc. incorporated anthony j. barr james h. goodnight john p. sall jane t. helwig barr holding largest share 40 sold shares 1979 barr created acme program national center health statistics 1967 1969 acme computer program assigns one underlying cause death based multiple causes death listed death certificate acme conjunction components comprise mortality medical data system mmds system used uniformly determine underlying cause death death certificates united states acme become de facto international standard automated selection underlying cause death components mmds variations used many nations around world system provides essential data used calculating mortality statistics 1971 1972 barr along partner sandy mullin designed patented built first computerized equipment optimize usage lumber furniture industry device read marked flaws board calculated cross rip cuts required optimal board usage marked cut lines board 1973 barr-mullin inc. incorporated lumber yield optimization technology remains widely used american wood industry 1968 barr created first non-ibm linking loader ibm/360 named ldr loader sponsored american data processing inc. raleigh north carolina barr loader cut typical program testing times twenty-five percent ibm offer equivalent loader eighteen months barr loader commercially available 1971 barr created first non-ibm hasp terminal emulator marketed university computing company ucc hasp emulator gave significant performance increase ibm 2780 emulator developed ucc 1969 emulators developed pdp-8 minicomputer allowed cope terminals communicate ibm/360 ibm/370 1971 barr also implemented hasp workstation computer industries orange california implemented data general nova minicomputer program became singer corporation remote batch terminal singer ucc sold terminal divisions harris corporation continued market products 1983 barr developed hardware software performing hasp remote job entry communication ibm pc company barr systems inc. marketed sold barr hasp went implement support bisync sna sdlc workstations gateways along data communications output management products barr employed ibm federal systems division pentagon washington d.c. 1964 1966 worked nips formatted file system ffs generalized data base management system retrieval report writing one first data management systems take advantage defined file structure data storage retrieval efficiency assigned work national military command center information processing branch joint chiefs staff barr rewrote enhanced ffs implementing three five major components retrieval sorting file update work featured innovation uniform lexical analyzer languages system uniform method handling error messages working ffs introduced barr potential defined file structure become central concept sas barr born new york city grew summit new jersey graduated summit high school 1958 | [
4546,
11236,
8262,
8011,
6544,
8732,
3323,
2652,
477
] | Validation |
4,668 | 2 | Memory_pool:memory pool memory pools also called fixed-size blocks allocation use pools memory management allows dynamic memory allocation comparable malloc c++ operator new implementations suffer fragmentation variable block sizes recommendable use real time system due performance efficient solution preallocating number memory blocks size called memory pool application allocate access free blocks represented handles run time many real-time operating systems use memory pools transaction processing facility systems like web server nginx use term memory pool refer group variable-size allocations later deallocated also known region see region-based memory management simple memory pool module allocate example three pools compile time block sizes optimized application deploying module application allocate access free memory following interface benefits drawbacks | [
6115,
10883,
3237,
1126,
1736,
5074,
6067,
3512,
5626,
9628,
10013
] | Test |
4,669 | 2 | TempleOS:templeos templeos formerly j operating system sparrowos losethos biblical-themed lightweight operating system designed third temple prophesied bible created american programmer terry a. davis developed alone course decade series episodes later described revelation god system characterized modern x86-64 commodore 64 using interface similar mixture dos turbo c. davis proclaimed system features 640x480 resolution 16-color display single audio voice explicitly instructed god programmed original variation c named holyc place basic included original flight simulator compiler kernel templeos released 2013 last updated 2017 received largely favorable reviews tech communities davis amassed small online following died august 11 2018 terry a. davis 1969–2018 began experiencing regular manic episodes 1996 leading numerous stays mental hospitals initially diagnosed bipolar disorder later declared schizophrenic remained unemployed rest life suffered delusions space aliens government agents left briefly hospitalized mental health issues experiencing self-described revelation proclaimed direct communication god god told operating system god third temple davis began developing templeos circa 2003 one early names j operating system renaming losethos reference scene 1986 film platoon 2008 davis wrote losethos primarily making video games networking internet support far 'm concerned would reinventing wheel another name used sparrowos settling templeos mid-2013 website announced god temple finished god kills cia spreads davis died hit train august 11 2018 templeos 64-bit non-preemptive multi-tasking multi-cored public domain open source ring-0-only single address space non-networked pc operating system recreational programming os runs 8-bit ascii graphics source code 2d 3d graphics library run 640x480 vga 16 colors like modern operating systems keyboard mouse support supports iso 9660 fat32 redsea file systems last created davis support file compression according davis many specifications—such 640x480 resolution 16-color display single audio voice—were instructed god explained limited resolution make easier children draw illustrations god operating system includes original flight simulator compiler kernel one bundled program egypt game player travels burning bush use high-speed stopwatch stopwatch meant act oracle generates pseudo-random text something davis likened ouija board glossolalia example generated text follows templeos written programming language developed davis c c++ called holyc holyc variation c developed davis programming language templeos used interact shell write execute entire applications shell ide comes templeos supports several features embedding images code uses non-standard text format known doldoc support hypertext links images 3d meshes embedded otherwise regular ascii files file spinning 3d model tank comment source code code jit-compiled davis ultimately wrote 100,000 lines code os templeos received mostly favorable reviews tech journalist david cassel opined partly programming websites tried find necessary patience understanding accommodate davis techrepublic osnews published positive articles davis work even though davis banned latter hostile comments targeting readers staff review techrepublic james sanders concluded templeos testament dedication passion one man displaying technological prowess n't need anything osnews editor kroc kamen wrote os shows computing still hobby everybody serious days want code os uses interpretive dance input method allowed companies like apple damned 2017 os shown part outsider art exhibition bourogne france davis death osnews editor thom holwerda wrote davis clearly gifted programmer – writing entire operating system small feat – sad see affected mental illness one fan described davis programming legend another computer engineer compared development templeos one-man-built skyscraper engineer previously spoken davis length believed davis could steve jobs steve wozniak illness added actually boggles mind one man wrote hard lay person understand phenomenal achievement write entire operating system alone another computer engineer said templeos contained innovations developer accomplished particularly runs certain part computer processor maintain extremely quick speed | [
1952,
8609,
2179,
10851,
5413,
8262,
2282,
5356,
7983,
5363,
10675,
2045,
6974
] | Test |
4,670 | 9 | Frank_Pfenning:frank pfenning frank pfenning professor computer science adjunct professor department philosophy head computer science department carnegie mellon university received ph.d. carnegie mellon university department mathematics 1987 dissertation entitled proof transformations higher-order logic student peter b. andrews research includes work area programming languages logic type theory logical frameworks automated deduction trustworthy computing one principal authors twelf system also developed carnegie mellon introductory imperative programming course undergraduates c0 programming language used course 2015 named fellow association computing machinery contributions logical foundations automatic theorem proving types programming languages competitive squash player ranked top five university squash ladder | [
5585,
5213,
6070,
4791
] | Test |
4,671 | 5 | MC-LAG:mc-lag mc-lag multi-chassis link aggregation group type link aggregation group lag constituent ports terminate separate chassis primarily purpose providing redundancy event one chassis fails ieee 802.1ax-2008 industry standard link aggregation mention mc-lag preclude implementation varies vendor notably protocol existing chassis proprietary 2012 ieee created standardized alternative mc-lag ieee 802.1aq shortest path bridging lag link aggregation group method inverse multiplexing multiple ethernet links thereby increasing bandwidth providing redundancy defined ieee 802.1ax-2008 standard states link aggregation allows one links aggregated together form link aggregation group mac client treat link aggregation group single link layer 2 transparency achieved lag using single mac address device ’ ports lag group lag configured either static dynamic dynamic lag uses peer-to-peer protocol control called link aggregation control protocol lacp lacp protocol also defined within 802.1ax-2008 standard lag implemented two ways lag n lag n+n lag n load sharing mode lag lag n+n provides worker standby flavour lag n protocol automatically distributes load balances traffic across working links within lag thus maximising use group ethernet links go come back providing improved resilience throughput different style resilience 2 nodes complete implementation lacp protocol supports separate worker/standby lag subgroups lag n+n worker links group fail standby links one links worker group fail note lacp marks links standby mode using sync flag mc-lag adds node-level redundancy normal link-level redundancy lag provides allows two nodes share common lag endpoint multiple nodes present single logical lag remote end note mc-lag implementations vendor-specific cooperating chassis remain externally compliant ieee 802.1ax-2008 standard nodes mc-lag cluster communicate synchronize negotiate automatic switchovers failover implementations may support administrator-initiated manual switchovers diagram shows four configurations ha configuration superior spanning tree load shared across links normal operation whereas spanning tree must disable links prevent loops following table lists known vendor implementations mc-lag proprietary | [
3847,
2184,
7049,
7411,
1977
] | Test |
4,672 | 4 | Kasidet_POS_RAM_Scraper_Malware:kasidet pos ram scraper malware kasidet pos malware variant point sale pos malware performs ddos attacks using namecoin dot-bit service scrape payment card details also known trojan.mwzlesson neutrino found september 2015 cyber security experts combination backdoor.neutrino.50 pos malware kasidet pos worm gets system along malware gets downloaded unknowingly user visits malicious websites malware different pos malware scrapes data advanced features first scrapes pos ram steals payment card details scraped information sent cyber criminal intercepted get post requests browser difficult detect bot using security programs sometimes detectable email spam campaigns exploit kits scraping capability kasidet enhanced cyber criminals hides c c server namecoin dns service dot-bit | [
10309,
2409,
6091,
6360,
7515
] | Test |
4,673 | 2 | Parabola_GNU/Linux-libre:parabola gnu/linux-libre parabola gnu/linux-libre operating system i686 x86-64 armv7 architectures based many packages arch linux arch linux arm distinguishes former offering free software includes gnu operating system components common many linux distributions linux-libre kernel instead generic linux kernel parabola listed free software foundation completely free operating system true free system distribution guidelines parabola uses rolling release model like arch regular system update needed obtain latest software development focuses system simplicity community involvement use latest free software packages parabola originally proposed members gnewsense irc channel 2009 members different arch linux communities especially spanish-speaking members started development maintenance project software documentation may 20 2011 parabola distribution recognized completely free project gnu making part fsf list free distributions february 2012 dmitrij d. czarkoff reviewed parabola osnews czarkoff reported test computer number hardware problems surfaced due lack free firmware said effectively means many devices supported parabola eg. installing acer aspire one 531h netbook could n't use broadcom bluetooth module intel wifi/wimax link 5150 adapter still could use htc magic custom gingerbread rom usb 3g/wifi modem though something always connected usb port pretty annoying laptop specifically netbook czarkoff also criticized lack documentation available parabola concluded overall impression parabola gnu/linux user experience exactly matches one arch system easy flexible installation configuration process good choice free software packages though lack documentation spoils user experience arch linux resources used configure extend distribution hardware would allow would probably stick parabola parabola used mips64el port provide support chinese loongson processor used lemote yeeloong laptop discontinued due lack resources interest final activity seen july 2014 robert rijkhoff reviewed parabola gnu/linux distrowatch september 2017 project uses 100 free software official arch repositories i686 x86-64 architectures official arch arm repositories except alarm aur armv7 uses free replacements possible linux-libre kernel instead generic linux kernel filtering process removes around 700 software packages repositories meet requirements free software definition architecture parabola established social contract parabola social contract commits project free software community viewing competing nonfree systems free culture democracy follow arch philosophy covenant included gnu free system distribution guidelines two ways install parabola either scratch using installable iso images migrating existing arch-based system latter process almost simple switching parabola repositories list talkingparabola derivative install cd based talkingarch respin parabola iso modified include speech braille output blind visually impaired users talkingparabola retains features parabola live image adds speech braille packages make possible blind visually impaired users install parabola eyes-free parabola community created number cartoon characters project characters gnu cat named bola conceived parabola main characteristics elegant minimalist lightweight | [
4611,
3079,
3089,
4113,
8209,
10257,
8727,
543,
11297,
3618,
7204,
9253,
11305,
56,
3129,
4153,
59,
8248,
9276,
7234,
3654,
5190,
3147,
2125,
1107,
1110,
89,
5721,
4192,
3685,
10860,
5742,
2671,
9851,
11388,
2180,
2692,
7300,
8837,
9353,
... | None |
4,674 | 9 | GW-BASIC:gw-basic gw-basic dialect basic programming language developed microsoft basica originally compaq otherwise identical microsoft/ibm basica fully self-contained executable need rom basic bundled ms-dos operating systems ibm pc compatibles microsoft microsoft also sold basic compiler bascom compatible gw-basic programs needing speed language suitable simple games business programs like since included versions ms-dos also low-cost way many aspiring programmers learn fundamentals computer programming release ms-dos 5.0 gw-basic place eventually taken qbasic interpreter part separately available quickbasic compiler ibm basica gw-basic largely ports mbasic version 5.x added features specifically ibm pc hardware common features basic-80 5.x basica/gw-basic include ability crunch program lines omitting spaces common feature earlier microsoft basic implementations removed basic-80 5.x basica/gwbasic basic-80 programs using peek/poke statements would run gw-basic basica added large number features ibm pc sound graphics memory commands features present basic-80 included ability execute rnd function parameters ability also save programs protected format preventing listed basica also allowed double-precision numbers used mathematical trigonometric functions cos sin atn n't allowed 8-bit versions basic feature normally enabled required optional parameter /d startup i.e codice_1 basic memory footprint slightly increased used microsoft offer generic version ms-dos v3.20 1986 variants operating system oem versions depending oem basic distributed either basica.exe gwbasic.exe former confused ibm basica always came .com file variants basic extra features support particular machine example tandy versions dos included special gw-basic supported enhanced sound graphics capabilities initial version gw-basic one included compaq dos 1.13 released compaq portable 1983 analogous ibm basica 1.10 used cp/m-derived file control blocks disk access support subdirectories later versions added feature improved graphics capabilities gw-basic 3.20 1986 added ega graphics support version basica gw-basic vga support effect last new version released superseded qbasic buyers hercules graphics cards received special version gw-basic card utility disk called hbasic added support 720×348 monochrome graphics versions basica/gw-basic support hercules graphics could display graphics card use third-party cga emulation simcga gw-basic command line-based integrated development environment ide based dartmouth basic using cursor movement keys line displayed screen edited also includes function key shortcuts bottom screen like early microcomputer versions basic gw-basic lacked many structures needed structured programming local variables gw-basic programs executed relatively slowly interpreted language program lines must numbered non-numbered lines considered commands direct mode executed immediately program source files normally saved binary compressed format tokens replacing keywords option save ascii text form gw-basic command-line environment commands codice_2 current program quit operating codice_3 commands also used program statements little support structured programming gw-basic codice_4 conditional statements must written one line although codice_5 statements may group multiple lines functions defined using single line codice_6 statement e.g. codice_7 data type variables specified character end variable name codice_8 string characters codice_9 integer etc groups variables also set default types based initial letter name use codice_10 etc. statements default type undeclared variables identified typing statements single-precision floating point 32-bit mbf gw-basic allowed use joystick light pen input devices gw-basic read write files com ports also event trapping ports since cassette port interface original ibm pc never implemented compatibles cassette operations supported gw-basic play simple music using codice_11 statement needing string notes represented music macro language e.g. codice_12 low-level control possible codice_13 statement takes arguments frequency hertz length clock ticks standard internal pc speaker ibm machines consequently sound limited single channel beeps whistles befits 'business machine home-based pcs like tandy 1000 allowed three channels sound codice_13 codice_11 commands several theories initials gw stand greg whitten early microsoft employee developed standards company basic compiler line says bill gates picked name gw-basic whitten refers gee-whiz basic unsure gates named program microsoft user manual microsoft press also refers name may also nicknamed gee-whiz large number graphics commands common theories initials origins include graphics windows gates william microsoft president time gates-whitten two main designers program | [
5635,
7691,
22,
4642,
8227,
4136,
11315,
6709,
4160,
8262,
83,
92,
608,
5733,
8301,
2159,
5747,
6778,
2181,
3718,
655,
10900,
11412,
10902,
11414,
3224,
3736,
9881,
3233,
7343,
7355,
7870,
712,
3303,
8429,
759,
6910,
6921,
1805,
9997,
7... | Test |
4,675 | 3 | GT_Racing_Cockpit:gt racing cockpit gt racing cockpit see trademark symbols difference name line gran turismo official video game racing cockpits designed sparco logitech a.k.a logicool japan collaboration polyphony digital official kits co-designed released japan logicool sparco distributed import tuner endless north america compatible kits designed released worldwide european manufacturers playseats movetech fia homologated driving simulation cockpit line sku lpsk standing logicool playstation sparco kit official kits logicool auto part maker sparco joint designed sparco racing cockpit/seat official wheels gt force wheels although gt force wheels supported professional oriented playseats compatible kits line playseats based upon different design e.g g25 racing wheel playseats kit includes parts named gearshift holder seat slider sparco racing cockpit official kit original gt force gran turismo 3 a-spec released japan 2001 kits two parts named steering pod bucket chair official product steering pod features sparco gran turismo double name emblem plate sparco speed seat gt logos official kit gt force pro gran turismo 5 prologue sparco racing cockpit pro fighter model released december 22 2003 japan first kit one features emblem plate logos racing cockpit pro kits specially designed gt force pro wheel compatible models including prior gt force wheels updated version gt force pro gran turismo 4 kit released june 10 2004 japan kit replaces fighter seat gran turismo custom sparco speed seat evolution speed bucket seat still features official sparco gran turismo plate logos released june 2005 endless sku north american licensed version racing cockpit pro hence srcp sparco racing cockpit pro seat kit frame e.g steering floor mat steering pod official sparco gran turismo plate available though sparco sprint bucket seat north american version lpsk-02002 though replaces fighter bucket seat similar sparco model called sprint although sparco gran turismo plate included sparco seat regular one gt logo larger individuals version type 1 simultaneously released north american market version called sparco siena reclinable seat type 2 replaces regular bucket seat larger retractable model called siena srcp-001 kit sparco seat gt custom | [
5746,
5291,
1974
] | Train |
4,676 | 0 | Hindi-to-Punjabi_Machine_Translation_System:hindi-to-punjabi machine translation system hindi punjabi machine translation system developed punjabi university patiala gurpreet singh lehal dr. vishal goyal aimed translate hindi text punjabi text based direct approach includes preprocessing text normalization replacing collocations replacing proper nouns translation engine identifying surnames identifying titles lexicon lookup word-sense disambiguation inflection analysis transliteration post processing module system available online | [
538,
7164
] | Test |
4,677 | 4 | CounterSpy_(software):counterspy software counterspy proprietary spyware removal program microsoft windows software developed sunbelt software counterspy scans pc spyware examining files hard drive objects memory windows registry cookies capability called dnr resuscitate according sunbelt improves chances killing resuscitators past tool based used giant antispyware engine program currently version 3.1 sunbelt software released version 2 includes revamped interface smaller memory footprint available download 15-day trial version effective may 23 2011 counterspy discontinued longer available purchase | [
5891,
6797,
7886,
7983,
10392,
7515
] | None |
4,678 | 4 | IASME:iasme iasme governance information assurance standard designed simple affordable help improve cyber security small medium-sized enterprises smes iasme governance technical controls aligned cyber essentials scheme certification iasme standard includes certification cyber essentials iasme governance standard developed 2010 proven effective improving security supply chains large organisations standard maps closely international iso/iec 27001 information assurance standard iasme governance originally developed academic-sme partnership attracted lot interest government small businesses research towards iasme model undertaken uk 2009-10 acknowledgement current international information assurance standard iso/iec 27001 complex resource-strapped smes providing weakness supply chain iasme developed 2010-11 launched later year revised regularly keep pace changes risk environment smes development process smes explained published international sme conference paper iasme governance standard follows implementation pattern used international standards community including pdca plan-do-check-act principles information security management system isms provides management framework refined expressed business terms recognisable organisations sizes iasme governance standard developed piloted help small businesses mostly west midlands uk encouraging results standard shown useful smes uk internationally large organisations use iasme governance standard supply chains understand reduce supplier risk article explaining supply chain benefits written developer david booth large small organisations use iasme certification alternative iso/iec 27001 standard standard managed iasme consortium ltd operate network 150 certification bodies licensed certify candidate organisations question set free anyone download without registration licensed creative commons by-nc-nd license standard available two levels assurance 2017 standard updated include additional questions enable organisations comply general data protection regulations gdpr iasme governance standard covers following information security topics iasme governance risk-led standard similar set controls annex iso/iec 27001 standard iasme governance maps closely uk government ncsc 10 steps cyber security mapping two standards available cyber assessment framework caf developed uk government allow organisations demonstrate compliance nis directive iasme governance standard maps closely caf nhs digital data security protection toolkit online self-assessment tool allows organisations measure performance national data guardian ’ 10 data security standards iasme governance maps closely toolkit majority topics iasme standard become focus attention information security threat uk businesses continues increase vulnerabilities systems continue cause expensive data breaches system failures increasing number newspaper journal articles subject reflect increased security awareness recognised states jersey suitable security standard government supply chain iasme specifically mentioned keynote speech infosec europe 2013 event held london received innovation award computer weekly europe shortly afterwards.. april 2019 iasme awarded cyber business year prestigious uk national cyber awards | [
6360,
7979,
9901,
10823
] | None |
4,679 | 3 | Acorn_Network_Computer:acorn network computer acorn network computer network computer type thin client designed manufactured acorn computers ltd implementation network computer reference profile oracle corporation commissioned acorn specify network computers detail history see acorn network computer sophie wilson acorn led effort launched august 1996 ncos operating system used first implementation based risc os ran arm hardware manufacturing obligations achieved contract fujitsu subsidiary d2d 1997 acorn offered designs cost licensees netstation available two versions one modem home use via television version ethernet card use businesses schools vga monitors on-site bsd unix fileserver based riscbsd early arm port netbsd versions upgradable modem ethernet cards replaceable podules acorn-format eurocards home version trialled 1997/98 conjunction bt used supported pal ntsc svga displays identical specifications used strongarm sa-110 200mhz processor arm7500-based desklite launched 1998 acorn continued produce arm-based designs demonstrating first strongarm prototype may 1996 6 months later evolved concord launched late 1997 designs included set-top box nc second generation network computer operating system longer based risc os instead consisted netbsd 1.2.1 code later ncs produced based intel pentium architecture netstation planned ship smart card enable internet banking | [
1121,
3722,
9163,
9964,
10862,
7983,
1776,
9137,
9745,
10481,
5492,
10325,
10548,
1849,
9978,
1790,
5375
] | Validation |
4,680 | 1 | Borland_Database_Engine:borland database engine borland database engine bde windows-based core database engine connectivity software behind borland delphi c++builder intrabuilder paradox windows visual dbase windows borland ’ turbo pascal database toolbox add-on beginning borland compiler add-ons facilitated database connectivity came paradox engine windows – pxengwin – could compiled program facilitate connectivity paradox tables first dll-based connectivity engine odapi open database api represented borland ’ attempt centralise connectivity suite applications included brand-new paradox windows 4 quattro version 4.5 5.0 paradox windows database engine crystallised idapi 2000 borland introduced new sql driver architecture called dbexpress deprecated bde sql links technology 2014 embarcadero removed bde installer rad studio xe7 install making separate download order strengthen message bde deprecated number years programmers using bde encouraged update software use newer database connectivity technologies like embarcadero firedac third party provided solutions included set database drivers enables consistent access standard data sources paradox dbase foxpro access text databases add microsoft odbc drivers needed built-in odbc socket optionally borland sql links product provides access range database management systems dbms including informix db2 interbase oracle sybase bde object-oriented design runtime application developers interact bde creating various bde objects runtime objects used manipulate database entities tables queries bde application program interface api provides direct c c++ optimized access database engine well bde built-in drivers dbase paradox foxpro access text databases core database engine files consist set dlls fully re-entrant thread-safe included bde set supplemental tools examples sample code bde system configured using bde administrator bdeadmin.exe included bde borland local sql subset ansi-92 sql enhanced support paradox dbase standard naming conventions tables fields called columns sql local sql lets use sql query local standard database tables reside database server well remote dbms servers local sql also essential make multi-table queries across local standard tables remote sql servers older name bde api integrated database application program interface idapi | [
6850,
7523,
6797,
10413,
4592,
10737,
10899,
4598,
3096,
2045
] | Test |
4,681 | 4 | Application_portfolio_attack_surface:application portfolio attack surface realm application security term application portfolio attack surface apas refers collective risk organization posed sum total security vulnerabilities found within set mission critical systems software run organization enterprise | [
5404
] | None |
4,682 | 3 | R800_(CPU):r800 cpu r800 central processing unit used msx turbo-r home computer r800 designed ascii corporation japan built mitsui co. ltd.. goals fastest cpu possible maintaining compatibility old msx zilog z80-based hardware software order preserve software compatibility old msx software r800 uses superset z80 instruction set addition z80 opcodes two multiplication instructions added mulub 8-bit muluw 16-bit also many undocumented z80 instructions made official including opcodes dealing ix iy 8-bit registers ixh ixl iyh iyl r800 based directly z80 stems z800 family lacks undocumented z80 features instance undocumented flags represented bits 3 5 f register n't assume values z80 causing fail zexall tests undocumented opcode often called sll alias sla instruction hardware side radical changes made internal 4-bit alu z80 replaced new 16-bit alu opcodes like add hl bc previously took 11 clock cycles run fast one bus cycle conditions maximum cpu clock speed also increased 14.32 mhz—four times fast original 3.57 mhz z80 used msx bus clock increased 7.16 mhz data bus remained 8-bit maintain compatibility old hardware additional changes made way cpu fetches opcodes original z80 uses 4 cycles fetch simple instruction like additional waitstate issued msx architecture review z80 fetch mechanism typical msx environment needed understand r800 since implementations msx use ram memory disposed 256×256 bytes block two cycles required set address fetch r800 avoids remembering last known state higher 8-bits next instruction 256-byte boundaries higher 8-bits set cycle saved however z80 refresh cycles destroy information higher bits workaround needed solution used r800 refresh entire blocks ram instead refreshing one line ram instruction issued 30μs cpu halted 4μs time used refresh block ram since refresh fetch instructions waitstate removed due faster ram chips simple instructions issued using one cycle cycle would cycle 2 z80 example cycle 1 becomes optional issued program crosses 256-byte boundary applies fast ram used msx turbor external hardware connected cartridge slots uses timings similar z80 even internal rom turbor fast enough fetch scheme additional chips turbor mirror contents rom ram order make run faster | [
5762,
6020,
5128,
2573,
9006,
1776,
4465,
372,
6203,
1501
] | Train |
4,683 | 7 | Chromebit:chromebit chromebit dongle running google chrome os operating system placed hdmi port television monitor device turns display personal computer chromebit allows adding keyboard mouse bluetooth wi-fi device announced april 2015 began shipping november chromebit turns display hdmi port desktop variant chromebook laptop runs google chrome os operating system chrome os primarily supports single application web browser thereby relying heavily internet connection software functionality data storage chromebits superficial resemblance chromecast another google device whereas chromecast designed display video still images television large-screen display chromebit self-contained personal computer device compete intel compute stick offers similar plug-in functionality using two operating systems windows 8.1 ubuntu internally first chromebit resembles standard chromebook laptop device features 802.11ac wi-fi bluetooth 4.0 well usb 2.0 port one end end swivels enabling fit variety hdmi slots google announced chromebit march 31 2015 google asus began shipping first model november | [
4096,
4623,
3600,
8719,
7700,
9244,
9766,
5159,
10284,
3121,
3633,
11343,
3664,
7248,
8285,
2658,
4194,
5732,
8821,
2170,
7816,
4236,
10893,
5262,
6800,
11408,
10393,
8858,
7841,
6307,
1203,
7352,
7359,
4289,
196,
3269,
3782,
1224,
10445,
... | Validation |
4,684 | 9 | SAM76:sam76 sam76 macro programming language used late 1970s present 2007 initially ran cp/m sam76 language list string processor designed interactive user-directed applications including artificial intelligence programming permits high portability machine machine language shares certain features common lisp forth shell programming languages unix operating system claude a. r. kagan language developer sought combine within single interpretive processor characteristics two different string general-purpose macro generators provisions embed multiple infix operator mathematical systems sam76 designed language based around idea programming macros user define macro code word defined user invoke specific set instructions perform routine within program execute set instructions usually either machine assembly language use macro program way user need define routine particular operation string required user substitute macro name since language rewritten c compiles windows unix linux similar operating systems source code available online still compiles runs 2006 sam76 language follows well defined syntax easy learn read relies heavily however system symbols replace pseudo english words basic pascal sam76 interpreter also provides highly reactive interactive language almost converse user task task consequently language capability performing complex operations program control text editing manipulation gaming simulation mathematics features similar lisp forth list processors sam76 also capability functioning query language providing powerful human machine interaction uses keyboard data interaction modify shape future responses language also capable growing extension like lisp logo almost difference procedures data structures procedures treated data acted upon procedures even procedures defined different users new procedures mapped created behave language primitives inherent functions language like logo means new users create separate vocabularies saved executed adding language vocabulary providing individual customization | [
3904,
6594,
6502,
8262,
1804,
6797,
8524,
10387,
5492,
823,
4409,
2045,
6430
] | None |
4,685 | 2 | List_of_Android_launchers:list android launchers list android launchers presents main view device responsible starting apps hosting live widgets 51 lyse kim 8 march 2019 go launcher popular android launcher retrieved original 28 february 2019 | [
5637,
8719,
3600,
7700,
9244,
11294,
1578,
7722,
5677,
1083,
6212,
69,
8262,
3664,
8280,
8285,
2658,
11391,
1670,
5262,
10393,
7835,
673,
8870,
1191,
196,
8907,
8413,
9949,
1255,
8940,
5892,
7428,
2828,
280,
10009,
10525,
798,
288,
2852,
... | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.