node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
4,686
6
ZFS+:zfs+ zfs+ combined file system logical volume manager software subsystem initially released common development distribution license cddl based zfs originally developed sun microsystems proprietary data deduplication features added greenbytes subsequently made proprietary storage system product greenbytes originally owned trademark zfs+ confused zfs trademark currently held oracle corporation greenbytes owned oracle greenbytes created storage appliance called cypress nas filer originally based upon sun microsystems x86-64-based sun fire x4500 platform bundled zfs+ implementation value-add technology greenbytes claimed zfs+ technology could reduce storage power consumption 50 2009 greenbytes relaunched technology new name gbfs greenbytes file system
[ 9665, 9762, 5356, 4438, 9343 ]
Validation
4,687
5
Internet_Control_Message_Protocol_for_IPv6:internet control message protocol ipv6 internet control message protocol version 6 icmpv6 implementation internet control message protocol icmp internet protocol version 6 ipv6 icmpv6 defined rfc 4443 icmpv6 integral part ipv6 performs error reporting diagnostic functions e.g. ping framework extensions implement future changes several extensions published defining new icmpv6 message types well new options existing icmpv6 message types neighbor discovery protocol ndp node discovery protocol ipv6 replaces enhances functions arp secure neighbor discovery send extension ndp extra security multicast listener discovery mld used ipv6 routers discovering multicast listeners directly attached link much like internet group management protocol igmp used ipv4 multicast router discovery mrd allows discovery multicast routers icmpv6 messages may classified error messages information messages icmpv6 messages transported ipv6 packets ipv6 next header value icmpv6 set value 58 icmpv6 message consists header protocol payload header contains three fields type 8 bits code 8 bits checksum 16 bits type specifies type message values range 0 127 high-order bit 0 indicate error message values range 128 255 high-order bit 1 indicate information message code field value depends message type provides additional level message granularity checksum field provides minimal level integrity verification icmp message control messages identified value type field code field gives additional context information message messages serve purpose correspondingly named icmp message types note table comprehensive current complete list assigned icmpv6 types found link iana icmpv6 parameters icmpv6 provides minimal level message integrity verification inclusion 16-bit checksum header checksum calculated starting pseudo-header ipv6 header fields according ipv6 standard consists source destination addresses packet length next header field latter set value 58 following pseudo header checksum continued icmpv6 message checksum computation performed according internet protocol standards using 16-bit ones complement summation followed final ones complement checksum inserting checksum field note differs way calculated ipv4 icmp similar calculation done tcp icmpv6 node receives packet must undertake actions depend type message icmpv6 protocol must limit number error messages sent destination avoid network overloading example node continues forward erroneous packets icmp signal error first packet periodically fixed minimum period fixed network maximum load icmp error message must never sent response another icmp error message
[ 10242, 1030, 8211, 6681, 6682, 10271, 6689, 9251, 2085, 7208, 7214, 8238, 562, 1586, 9269, 11321, 3133, 5181, 6723, 6724, 8265, 10341, 10344, 3695, 4723, 2679, 4729, 5251, 649, 7817, 9868, 3218, 9365, 11413, 152, 3742, 9380, 9381, 3751, 3...
Test
4,688
8
Java_API_for_XML-based_RPC:java api xml-based rpc java api xml-based rpc jax-rpc allows java application invoke java-based web service known description still consistent wsdl description jax-rpc one java xml programming apis seen java rmis web services jax-rpc 2.0 renamed jax-ws 2.0 java api xml web services jax-rpc 1 deprecated java ee 6 jax-rpc service utilizes w3c world wide web consortium standards like wsdl web service description language works follows advantage method allows web service implemented server-side servlet ejb container thus servlet ejb applications made available web services
[ 4960, 9441, 4740, 10020, 8070, 1128, 5677, 6328, 3517, 479 ]
None
4,689
4
Cyberattack:cyberattack computers computer networks attack attempt expose alter disable destroy steal gain unauthorized access make unauthorized use asset cyberattack type offensive maneuver targets computer information systems infrastructures computer networks personal computer devices attacker person process attempts access data functions restricted areas system without authorization potentially malicious intent depending context cyberattacks part cyberwarfare cyberterrorism cyberattack employed nation-states individuals groups society organizations may originate anonymous source cyberattack may steal alter destroy specified target hacking susceptible system cyberattacks range installing spyware personal computer attempting destroy infrastructure entire nations legal experts seeking limit use term incidents causing physical damage distinguishing routine data breaches broader hacking activities cyberattacks become increasingly sophisticated dangerous user behavior analytics siem used help prevent attacks since late 1980s cyberattacks evolved several times use innovations information technology vectors committing cybercrimes recent years scale robustness cyberattacks increased rapidly observed world economic forum 2018 report offensive cyber capabilities developing rapidly ability deal hostile incidents may 2000 internet engineering task force defined attack rfc 2828 cnss instruction 4009 dated 26 april 2010 committee national security systems united states america defines attack increasing dependencies modern society information computers networks private public sectors including military led new terms like cyber attack cyberwarfare cnss instruction 4009 define cyber attack first six months 2017 two billion data records stolen impacted cyberattacks ransomware payments reached double 2016 cyberwarfare utilizes techniques defending attacking information computer networks inhabit cyberspace often prolonged cyber campaign series related campaigns denies opponent ability employing technological instruments war attack opponent critical computer systems cyberterrorism hand use computer network tools shut critical national infrastructures energy transportation government operations coerce intimidate government civilian population means end result cyberwarfare cyberterrorism damage critical infrastructures computer systems linked together within confines cyberspace three factors contribute cyber-attacks launched state individual fear factor spectacularity factor vulnerability factor spectacularity factor measure actual damage achieved attack meaning attack creates direct losses usually loss availability loss income garners negative publicity 8 february 2000 denial service attack severely reduced traffic many major sites including amazon buy.com cnn ebay attack continued affect still sites next day amazon reportedly estimated loss business 600,000 vulnerability factor exploits vulnerable organization government establishment cyber-attacks organizations without maintenance systems might running old servers vulnerable updated systems organization vulnerable denial service attack government establishment defaced web page computer network attack disrupts integrity authenticity data usually malicious code alters program logic controls data leading errors output professional hackers either working employed government military service find computer systems vulnerabilities lacking appropriate security software vulnerabilities found infect systems malicious code remotely control system computer sending commands view content disrupt computers needs pre-existing system flaw within computer antivirus protection faulty system configuration viral code work many professional hackers promote cyberterrorists new set rules govern actions cyberterrorists premeditated plans attacks born rage need develop plans step-by-step acquire appropriate software carry attack usually political agendas targeting political structures cyber terrorists hackers political motivation attacks impact political structure corruption destruction also target civilians civilian interests civilian installations previously stated cyberterrorists attack persons property cause enough harm generate fear attack active passive attack perpetrated insider outside organization term attack relates basic security terms shown following diagram resource physical logical called asset one vulnerabilities exploited threat agent threat action result confidentiality integrity availability resources may compromised potentially damage may extend resources addition one initially identified vulnerable including resources organization resources involved parties customers suppliers so-called cia triad basis information security attack active attempts alter system resources affect operation compromises integrity availability passive attack attempts learn make use information system affect system resources compromises confidentiality threat potential violation security exists circumstance capability action event could breach security cause harm threat possible danger might exploit vulnerability threat either intentional i.e. intelligent e.g. individual cracker criminal organization accidental e.g. possibility computer malfunctioning possibility act god earthquake fire tornado set policies concerned information security management information security management systems isms developed manage according risk management principles countermeasures order accomplish security strategy set following rules regulations applicable country attack led security incident i.e security event involves security violation words security-relevant system event system security policy disobeyed otherwise breached overall picture represents risk factors risk scenario organization make steps detect classify manage security incidents first logical step set incident response plan eventually computer emergency response team order detect attacks number countermeasures set organizational procedural technical levels computer emergency response team information technology security audit intrusion detection system example attack usually perpetrated someone bad intentions black hatted attacks falls category perform penetration testing organization information system find foreseen controls place attacks classified according origin i.e conducted using one computers last case called distributed attack botnets used conduct distributed attacks classifications according procedures used type vulnerabilities exploited attacks concentrated network mechanisms host features attacks physical i.e theft damage computers equipment others attempts force changes logic used computers network protocols order achieve unforeseen original designer result useful attacker software used logical attacks computers called malware following partial short list attacks detail number techniques utilize cyber-attacks variety ways administer individuals establishments broader scale attacks broken two categories syntactic attacks semantic attacks syntactic attacks straightforward considered malicious software includes viruses worms trojan horses virus self-replicating program attach another program file order reproduce virus hide unlikely locations memory computer system attach whatever file sees fit execute code also change digital footprint time replicates making harder track computer worm need another file program copy self-sustaining running program worms replicate network using protocols latest incarnation worms make use known vulnerabilities systems penetrate execute code replicate systems code red ii worm infected 259 000 systems less 14 hours much larger scale worms designed industrial espionage monitor collect server traffic activities transmit back creator trojan horse designed perform legitimate tasks also performs unknown unwanted activity basis many viruses worms installing onto computer keyboard loggers backdoor software commercial sense trojans imbedded trial versions software gather additional intelligence target without person even knowing happening three likely attack individual establishment emails web browsers chat clients remote software updates semantic attack modification dissemination correct incorrect information information modified could done without use computers even though new opportunities found using set someone wrong direction cover tracks dissemination incorrect information utilized two instances india pakistan involved cyberspace conflicts started 1990s earlier cyber attacks came known early 1999 since india pakistan engaged long-term dispute kashmir moved cyberspace historical accounts indicated country hackers repeatedly involved attacking computing database system number attacks grown yearly 45 1999 133 2000 275 end august 2001 2010 indian hackers laid cyber attack least 36 government database websites going name indian cyber army 2013 indian hackers hacked official website election commission pakistan attempt retrieve sensitive database information retaliation pakistani hackers calling true cyber army hacked defaced ~1,059 websites indian election bodies according media pakistan working effective cyber security system program called cyber secure pakistan csp program launched april 2013 pakistan information security association program expanded country universities within cyberwarfare individual must recognize state actors involved committing cyber-attacks one another two predominant players discussed age-old comparison east versus west china cyber capabilities compared united states capabilities many state non-state actors involved cyberwarfare russia iran iraq al qaeda since china u.s. leading foreground cyberwarfare capabilities two state actors discussed q2 2013 akamai technologies reported indonesia toppled china portion 38 percent cyber attack high increase 21 percent portion previous quarter china set 33 percent us set 6.9 percent 79 percent attack came asia pacific region indonesia dominated attacking ports 80 443 90 percent china people liberation army pla developed strategy called integrated network electronic warfare guides computer network operations cyberwarfare tools strategy helps link together network warfare tools electronic warfare weapons opponent information systems conflict believe fundamentals achieving success seizing control opponent information flow establishing information dominance science military science campaigns identify enemy logistics systems networks highest priority cyber-attacks states cyberwarfare must mark start campaign used properly enable overall operational success focusing attacking opponent infrastructure disrupt transmissions processes information dictate decision-making operations pla would secure cyber dominance adversary predominant techniques would utilized conflict gain upper hand follows pla would strike electronic jammers electronic deception suppression techniques interrupt transfer processes information would launch virus attacks hacking techniques sabotage information processes hopes destroying enemy information platforms facilities pla science campaigns noted one role cyberwarfare create windows opportunity forces operate without detection lowered risk counterattack exploiting enemy periods blindness deafness paralysis created cyber-attacks one main focal points cyberwarefare able weaken enemy full extent possible physical offensive higher percentage success pla conduct regular training exercises variety environments emphasizing use cyberwarfare tactics techniques countering tactics employed faculty research focusing designs rootkit usage detection kylin operating system helps train individuals cyberwarfare techniques china perceives cyberwarfare deterrent nuclear weapons possessing ability greater precision leaving fewer casualties allowing long ranged attacks west united states provides different tone voice cyberwarfare tip everyone tongue united states provides security plans strictly response cyberwarfare basically going defensive attacked devious cyber methods u.s. responsibility cybersecurity divided department homeland security federal bureau investigation department defense recent years new department created specifically tend cyber threats department known cyber command cyber command military subcommand us strategic command responsible dealing threats military cyber infrastructure cyber command service elements include army forces cyber command twenty-fourth air force fleet cyber command marine forces cyber command ensures president navigate control information systems also military options available defense nation needs enacted cyberspace individuals cyber command must pay attention state non-state actors developing cyberwarfare capabilities conducting cyber espionage cyber-attacks nation allies cyber command seeks deterrence factor dissuade potential adversaries attacking u.s. multi-faceted department conducting cyber operations three prominent events took place may catalysts creation idea cyber command failure critical infrastructure reported cia malicious activities information technology systems disrupted electrical power capabilities overseas resulted multi-city power outages across multiple regions second event exploitation global financial services november 2008 international bank compromised payment processor allowed fraudulent transactions made 130 automated teller machines 49 cities within 30-minute period last event systemic loss u.s. economic value industry 2008 estimated 1 trillion losses intellectual property data theft even though events internal catastrophes real nature meaning nothing stop state non-state actors thing even grander scale initiatives like cyber training advisory council created improve quality efficiency sufficiency training computer network defense attack exploitation enemy cyber operations ends spectrum east west nations show sword shield contrast ideals chinese offensive minded idea cyberwarfare trying get pre-emptive strike early stages conflict gain upper-hand u.s. reactionary measures taken creating systems impenetrable barriers protect nation civilians cyber-attacks according homeland preparedness news many mid-sized u.s. companies difficult time defending systems cyber attacks around 80 percent assets vulnerable cyber attack owned private companies organizations former new york state deputy secretary public safety michael balboni said private entities type capability bandwidth interest experience develop proactive cyber analysis response cyber-attacks 1 april 2015 president obama issued executive order establishing first-ever economic sanctions executive order impact individuals entities designees responsible cyber-attacks threaten national security foreign policy economic health financial stability us specifically executive order authorizes treasury department freeze designees assets according ted koppel book 2008 united states collaboration israel ran cyberattack iran nuclear program becoming first use digital weapon instrument policy series powerful cyber attacks began 27 june 2017 swamped websites ukrainian organizations including banks ministries newspapers electricity firms fifa world cup 2018 russia countered stopped around 25 million cyber attacks infrastructure june 2019 russia conceded possible electrical grid cyberattack united states new york times reported american hackers united states cyber command planted malware potentially capable disrupting russian electrical grid 2007 cyberattacks estonia series cyberattacks began 27 april 2007 targeted websites estonian organizations including estonian parliament banks ministries newspapers broadcasters amid country disagreement russia relocation bronze soldier tallinn elaborate soviet-era grave marker well war graves tallinn attacks triggered number military organizations around world reconsider importance network security modern military doctrine direct result cyberattacks creation nato cooperative cyber defence centre excellence tallinn 2019 reuters reported united arab emirates launched series cyberattacks political opponents journalists human rights activists project raven espionage platform namely karma team included ex-us intelligence agents project raven commenced 2009 planned continued coming ten years whole industry working trying minimize likelihood consequence information attack partial list see offer different products services aimed many organizations trying classify vulnerability consequence famous vulnerability database common vulnerabilities exposures computer emergency response teams set government large organization handle computer security incidents cyber-attack initiated certain targets need attacked cripple opponent certain infrastructures targets highlighted critical infrastructures time conflict severely cripple nation control systems energy resources finance telecommunications transportation water facilities seen critical infrastructure targets conflict new report industrial cybersecurity problems produced british columbia institute technology pa consulting group using data far back 1981 reportedly found 10-fold increase number successful cyber-attacks infrastructure supervisory control data acquisition scada systems since 2000 cyberattacks adverse physical effect known cyber-physical attacks control systems responsible activating monitoring industrial mechanical controls many devices integrated computer platforms control valves gates certain physical infrastructures control systems usually designed remote telemetry devices link physical devices internet access modems little security offered dealing devices enabling many hackers cyberterrorists seek systematic vulnerabilities paul blomgren manager sales engineering cybersecurity firm explained people drove remote substation saw wireless network antenna immediately plugged wireless lan cards took laptops connected system n't using passwords within 10 minutes mapped every piece equipment facility blomgren said within 15 minutes mapped every piece equipment operational control network within 20 minutes talking business network pulled several business reports never even left vehicle energy seen second infrastructure could attacked broken two categories electricity natural gas electricity also known electric grids power cities regions households powers machines mechanisms used day-to-day life using u.s. example conflict cyberterrorists access data daily report system status shows power flows throughout system pinpoint busiest sections grid shutting grids cause mass hysteria backlog confusion also able locate critical areas operation attacks direct method cyberterrorists access instructions connect bonneville power administration helps direct fault system process major advantage utilized cyber-attacks made foreign attackers prior knowledge system attack highest accuracy without drawbacks cyberattacks natural gas installations go much way would attacks electrical grids cyberterrorists shutdown installations stopping flow even reroute gas flows another section occupied one allies case russia gas supplier known gazprom lost control central switchboard routes gas flow inside operator trojan horse program bypassed security financial infrastructures could hit hard cyber-attacks financial system linked computer systems constant money exchanged institutions cyberterrorists attack transactions rerouted large amounts money stolen financial industries would collapse civilians would without jobs security operations would stall region region causing nationwide economical degradation u.s. alone average daily volume transactions hit 3 trillion 99 non-cash flow able disrupt amount money one day period days cause lasting damage making investors pull funding erode public confidence cyberattack financial institution transactions may referred cyberheist attacks may start phishing targets employees using social engineering coax information may allow attackers hack network put keyloggers accounting systems time cybercriminals able obtain password keys information organization bank accounts accessed via information stolen using keyloggers may 2013 gang carried us 40 million cyberheist bank muscat cyberattacking telecommunication infrastructures straightforward results telecommunication integration becoming common practice systems voice ip networks merging everything run internet speeds storage capabilities endless denial-of-service attacks administered previously mentioned complex attacks made bgp routing protocols dns infrastructures less likely attack would target compromise traditional telephony network ss7 switches attempted attack physical devices microwave stations satellite facilities ability would still shut physical facilities disrupt telephony networks whole idea cyber-attacks cut people one another disrupt communication impede critical information sent received cyberwarfare critical way gaining upper-hand conflict controlling flow information communication nation plan accurate strikes enact better counter-attack measures enemies transportation infrastructure mirrors telecommunication facilities impeding transportation individuals city region economy slightly degrade time successful cyber-attacks impact scheduling accessibility creating disruption economic chain carrying methods impacted making hard cargo sent one place another january 2003 slammer virus continental airlines forced shut flights due computer problems cyberterrorists target railroads disrupting switches target flight software impede airplanes target road usage impede conventional transportation methods may 2015 man chris roberts cyberconsultant revealed fbi repeatedly 2011 2014 managed hack boeing airbus flights controls via onboard entertainment system allegedly least ordered flight climb fbi detaining april 2015 syracuse interviewed allegations water infrastructure could one critical infrastructures attacked seen one greatest security hazards among computer-controlled systems potential massive amounts water unleashed area could unprotected causing loss life property damage even water supplies could attacked sewer systems compromised calculation given cost damages estimated cost replace critical water systems could hundreds billions dollars water infrastructures well developed making hard cyber-attacks cause significant damage equipment failure occur causing power outlets disrupted short time
[ 5636, 10756, 7174, 9233, 535, 10777, 9771, 3125, 7739, 7228, 4163, 6211, 6735, 612, 107, 5245, 5774, 4755, 2709, 10392, 9375, 176, 1200, 2737, 8881, 6842, 4813, 1251, 5373, 4863, 3843, 8978, 4883, 278, 1827, 3880, 297, 9000, 10539, 2878, ...
None
4,690
3
Arkanoid:arkanoid player controls vaus space vessel acts game paddle prevents ball falling playing field attempting bounce number bricks ball striking brick causes brick disappear bricks gone player goes next level another pattern bricks appears number variations bricks hit multiple times flying enemy ships etc power-up capsules enhance vaus expand vaus multiply number balls equip laser cannon break directly next level etc gameplay remains final stage 33 versions 36 nes player takes game boss doh head resembling moai point reached player longer option continue running lives making segment difficult game regardless outcome japan gave silver award one four best games 1986 along taito bubble bobble sega fantasy zone tecmo rygar europe reviewed clare edgeley december 1986 issue computer video games compared pong space invaders simplicity addictiveness described arkanoid lovely game fast colourful simple addictive concluded great little game also commercially successful arcades game appeared number-three euromax nationwide uk arcade chart 1987 capcom 1942 number-one westone wonder boy number-two home versions also well received computer gaming world stated 1988 arkanoid amiga perfect version arcade game ... incredible named nes version best arcade translation console year praising graphics play mechanics game reviewed 1989 dragon 144 hartley patricia kirk lesser role computers column reviewers gave game 5 5 stars compute named game list nine great games 1989 describing hypnotic addictive fascinating along breakout magazine noted arkanoid also elements pong space invaders well pac-man use power-ups arkanoid ported zx spectrum amstrad cpc commodore 64 bbc micro msx atari 8-bit family apple ii nes amiga atari st apple ii ibm pc macintosh version released 1987 port released tandy color computer 3 1989 computer conversions published imagine nes port packaged custom controller arkanoid followed number direct indirect sequels tournament arkanoid released 1987 exclusively united states romstar unlike original game developed taito america rather taito japan mission-pack sequel true sequel since exact gameplay original arkanoid levels different. arkanoid 2 released arcades 1987 unlike tournament arkanoid revenge doh true sequel game featuring new gameplay mechanics. arkanoid returns published 1997 followed arkanoid ds 2007 xbox 360 version arkanoid titled arkanoid live released may 6 2009 xbox live arcade wiiware version arkanoid titled arkanoid plus released japan may 26 2009 pal regions august 21 2009 north america september 28 2009 version arkanoid iphone released worldwide august 31 2009 mashup arkanoid vs. space invaders released 2017 ios android arkanoid world-record score belongs zack hample known snagged 10,000 baseballs major league baseball games
[ 3075, 9732, 8709, 9735, 5275, 9501, 1693, 4894, 8492, 9006, 10931, 5692, 4043, 3788, 10188, 9166, 11477, 3039, 11231, 7916, 2159, 1776, 4082, 6390 ]
Test
4,691
5
G.hn:g.hn g.hn specification home networking data rates 2 gbit/s operation four types legacy wires telephone wiring coaxial cables power lines plastic optical fiber single g.hn semiconductor device able network supported home wire types benefits multi-wire standard lower equipment development costs lower deployment costs service providers allowing customer self-install g.hn developed international telecommunication union telecommunication standardization sector itu-t promoted homegrid forum several organizations itu-t recommendation itu term standard g.9960 received approval october 9 2009 specified physical layers architecture g.hn data link layer recommendation g.9961 approved june 11 2010 key promoters cepca homepna upa creators two interfaces united behind latest version standard february 2009 itu-t extended technology multiple input multiple output mimo technology increase data rates signaling distance new feature approved march 2012 g.9963 recommendation amendments main g.9960/g.9961 added new functionalities base standard g.hn specifies single physical layer based fast fourier transform fft orthogonal frequency-division multiplexing ofdm modulation low-density parity-check code ldpc forward error correction fec code g.hn includes capability notch specific frequency bands avoid interference amateur radio bands licensed radio services g.hn includes mechanisms avoid interference legacy home networking technologies also wireline systems vdsl2 types dsl used access home ofdm systems split transmitted signal multiple orthogonal sub-carriers g.hn one sub-carriers modulated using qam maximum qam constellation supported g.hn 4096-qam 12-bit qam g.hn media access control based time division multiple access tdma architecture domain master schedules transmission opportunities txops used one devices domain two types txops although elements g.hn common three media supported standard power lines phone lines coaxial cable g.hn includes media-specific optimizations media media-specific parameters include g.hn uses advanced encryption standard aes encryption algorithm 128-bit key length using ccmp protocol ensure confidentiality message integrity authentication key exchange done following itu-t recommendation x.1035 g.hn specifies point-to-point security inside domain means pair transmitter receiver uses unique encryption key shared devices domain example node alice sends data node bob node eve domain alice bob able easily eavesdrop communication g.hn supports concept relays one device receive message one node deliver another node farther away domain relaying becomes critical applications complex network topologies need cover large distances found industrial utility applications relay read source target addresses read message content due body end-to-end-encrypted g.hn architecture includes concept profiles profiles intended address g.hn nodes significantly different levels complexity g.hn higher complexity profiles proper supersets lower complexity profiles devices based different profiles interoperate examples g.hn devices based high complexity profiles residential gateways set-top boxes examples g.hn devices based low complexity profiles home automation home security smart grid devices g.hn spectrum depends medium shown diagram g.hn specifies physical layer data link layer according osi model pmd sub-layer sub-layer g.hn stack medium dependent i.e. parameters may different values media power lines phone lines coaxial cable rest sub-layers apc llc mac pcs pma medium independent interface application entity data link layer called a-interface interface data link layer physical layer called medium independent interface mii interface physical layer actual transmission medium called medium dependent interface mdi recommendation g.9960 granted approval october 2009 study group 15 plenary meeting recommendation g.9961 received approval june 11 2010 meeting concerns regulatory conformance raised amendment g.hn standard proposed eliminated passband 100 mhz 200 mhz reduced baseband operational spectrum 100 mhz 80 mhz changes included amendment included reduction transmit power meet regulatory complaints raised meeting june 2011 joint forum held itu-t itu-r organizations recognized itu-t g.hn considered electromagnetic compatibility emc mitigation techniques go well beyond considered essential protecting radio services non-itu compliant home network equipment may cause problems october 2010 sigma designs announced first g.hn-compliant chipset called cg5110 january 2011 lantiq introduced family g.hn-compliant chips called hnx176 hnx156 june 2011 four silicon vendors lantiq marvell semiconductor metanoia sigma designs announced participation open interoperability plugfest geneva hosted homegrid forum broadband forum itu homegrid forum showcased world first live public demonstration g.hn interoperability ces january 10–13 2012 homegrid forum members lantiq marvell metanoia sigma designs joined together highlight real-world g.hn capabilities january 2012 tangotec ltd. announced fully compliant itu-t g.hn chipset family available 2012 tangotec demonstrated g.hn capabilities three media ces 2012 december 2012 marvell homegrid forum announced marvell g.hn silicon passed compliance tests first compliance certified g.hn silicon first certified g.hn silicon interop testing remains homegrid forum non-profit trade group promoting g.hn homegrid forum provides technical marketing efforts addresses certification interoperability g.hn-compliant products cooperates complementary industry alliances homegrid forum members include actiontec electronics inc. allion test labs inc. arris bc institute technology best buy british telecom bt chunghwa telecom comtrend corporation holland electronics llc institute information industry iii korea electrotechnology research institute keri korea polytechnic university kpu kwangwoon university lan s.a.r.l marvell metanoia communications inc. mitrastar sigma designs teleconnect gmbh telefónica university british columbia trac global xingtera inc vendors promoting g.hn include maxlinear lantiq devolo ag microprocessor manufacturer intel system-on-a-chip vendor sigma designs xingtera announced product january 2013 first live public demonstration g.hn interoperability shown ces january 10–13 2012 lantiq marvell technology group metanoia sigma designs february 26 2009 part homepna press release makes use wireline home networking part u-verse iptv service expressed support work developed itu-t creating standards home networking including g.hn service providers like promoted g.hn service providers contributors work itu-t study group include british telecom telefónica april 2008 first announcement homegrid forum echostar manufacturer set-top boxes service provider market expressed support unified standard march 2009 best buy largest retailer consumer electronics united states joined board directors homegrid forum expressed support g.hn panasonic one largest manufacturers consumer electronics also contributor member homegrid forum 2008 several marketing firms promoted g.hn made optimistic predictions february 25 2009 three home networking organizations promoted previously incompatible technologies cepca homepna universal powerline association announced agreed work homegrid forum promote g.hn single next-generation standard wired home networking work ensure coexistence existing products market october 2008 continental automated buildings association caba homegrid forum signed liaison agreement support homegrid forum efforts conjunction itu-t g.hn make easy consumers connect devices enjoy innovative applications using existing home wiring july 2009 homegrid forum dlna signed liaison agreement setting stage collaboration two organizations approval g.hn dlna-recognized physical layer technology june 2010 broadband forum homegrid forum signed agreement deliver compliance interoperability testing program products using g.hn technology broadband forum support homegrid forum validation g.hn products promotion product conformance interoperability help expedite total time market homegrid forum certified products may 2011 organizations jointly announced first open g.hn plugfest itu g.9970 also known g.hnta recommendation developed itu-t describes generic architecture home networks interfaces operators broadband access networks itu g.9972 also known g.cx recommendation developed itu-t specifies coexistence mechanism home networking transceivers capable operating power line wiring coexistence mechanism would allow g.hn devices implement g.9972 coexist devices implementing g.9972 operating power line wiring itu g.9991 also known g.vlc recommendation developed itu-t specifies phy dll high speed indoor visible light communication transceivers used applications li-fi g.vlc reuses phy dll g.hn enabling chips used applications major motivation wired home networking technologies iptv especially offered service provider part triple play service voice data service offering u-verse smart grid applications like home automation demand side management also targeted g.hn-compliant devices implement low-complexity profiles many customers homes residential gateway provides internet access located close iptv set-top box scenario becomes common service providers start offer service packages multiple set-top boxes per subscriber g.hn connect residential gateway one set-top boxes using existing home wiring using g.hn iptv service providers need install new ethernet wires 802.11 wireless networks g.hn supports kind home wiring end users might install iptv home network thus reducing cost service provider although wi-fi technology popular consumer home networks g.hn also intended use application g.hn adequate solution consumers situations using wireless needed example connect stationary device like tv network-attached storage device desired due security concerns feasible example due limited range wireless signals consumer electronics ce products support internet connectivity using technologies wi-fi bluetooth ethernet many products traditionally associated computer use tvs hi-fi equipment provide options connect internet computer using home network provide access digital content g.hn intended provide high-speed connectivity ce products capable displaying high definition television integrating power connection data connection provides potential energy savings ce devices given ce devices home theater receivers often run standby vampire power represent major savings homeowners power connection also data connection device could reliably turned displaying source g.hn operate wires including ac dc power lines provide communication infrastructure required smart grid applications comprehensive smart grid system requires reaching every ac outlet home building devices participate energy conserving strategies september 2009 us national institute standards technology included g.hn one standards smart grid believed strong stakeholder consensus part early draft nist framework roadmap smart grid interoperability standards january 2010 g.hn removed final version standards identified implementation broad concept smart grid includes applications overlapping scopes demand side management energy conservation measures advanced metering infrastructure ami home networks g.hn supports popular protocols like ipv4 ipv6 g.hn-based networks easily integrated ip-based networks well-known network management protocols like simple network management protocol snmp manage ip networks including g.hn devices
[ 4609, 11267, 9860, 1541, 3847, 6670, 1297, 7698, 2203, 2206, 10270, 10021, 9640, 3629, 11181, 5433, 7865, 3133, 2752, 11332, 7498, 5581, 4691, 2772, 5469, 5470, 8160, 1121, 1893, 7400, 7407, 5875, 7411, 5373, 5118, 2431 ]
Test
4,692
5
TCP_window_scale_option:tcp window scale option tcp window scale option option increase receive window size allowed transmission control protocol former maximum value 65,535 bytes tcp option along several others defined ietf rfc 1323 deals long fat networks lfns throughput communication limited two windows congestion window receive window congestion window tries exceed capacity network congestion control receive window tries exceed capacity receiver process data flow control receiver may overwhelmed data example busy web server tcp segment contains current value receive window example sender receives ack acknowledges byte 4000 specifies receive window 10000 bytes sender send packets byte 14000 even congestion window allows tcp window scale option needed efficient transfer data bandwidth-delay product bdp greater 64k instance t1 transmission line 1.5 mbit/second used satellite link 513 millisecond round trip time rtt bandwidth-delay product formula_1 bits 96,187 bytes using maximum buffer size 64 kib allows buffer filled 65,535 96,187 68 theoretical maximum speed 1.5 mbits/second 1.02 mbit/s example receive window formula_2 bytes receive window 2 bytes tcp header window scale factor options tcp 3 calculation follows formula_3 bytes essence formula_4 shifting 3 bits left note options field window scale factor sent syn packet also value window scale factor go 255 formula_5 byte maximum allowed 14 reason maximum value 14 formula_6 increases beyond surpass sequence sequence 4 bytes formula_7 size window ca n't go beyond maximum value sequence using window scale option receive window size may increased maximum value 1,073,725,440 bytes done specifying one byte shift count header options field true receive window size left shifted value shift count maximum value 14 may used shift count value would allow single tcp connection transfer data example satellite link 1.5 mbit/second utilizing available bandwidth essentially one full transmission window transferred within one round-trip time period window scale option enables single tcp connection fully utilize lfn bdp 1 gb e.g 10 gbit/s link round-trip time 800 ms. firewalls properly implement tcp window scaling cause user internet connection malfunction intermittently minutes appear start working reason also issue firewall n't support tcp extensions tcp window scaling implemented windows since windows 2000 enabled default windows vista server 2008 newer turned manually required windows vista windows 7 fixed default tcp receive buffer 64 kb scaling 16 mb autotuning limiting manual tcp tuning long fat networks linux kernels 2.6.8 august 2004 enabled tcp window scaling default configuration parameters found /proc filesystem see pseudo-file companions information section sysctl scaling turned issuing command root maintain changes restart include line systemd 207 default setting freebsd openbsd netbsd mac os x window scaling features related rfc 1323 enabled verify status user check value variable via sysctl command value 1 output means scaling enabled 0 means disabled enabled turned issuing command setting lost across system restart ensure set boot time add following line /etc/sysctl.conf codice_1
[ 8192, 10115, 1541, 10924, 6797, 2221, 4918 ]
Train
4,693
3
Brian_Jacks_Superstar_Challenge:brian jacks superstar challenge brian jacks superstar challenge 1985 sports simulation game released various home computers martech licensed british sportsman brian jacks released systems including commodore 64 bbc micro acorn electron electron user praised superb graphics variety found different games
[ 9006 ]
Test
4,694
4
WhiteSource:whitesource whitesource open source security license compliance management platform founded 2011 ron rymon azi cohen rami sass company founded three co-founders sold previous company eurekify ca technologies due diligence process co-founders experienced first hand challenge generating accurate open source inventory report company launched open source license management platform software discovers open source components customers ’ apps alerts vulnerable code added software projects used threats pop affect existing software main investors company include susquehanna growth equity 83north microsoft ventures david strohm israeli innovation authority company raised 46 million 2018 whitesource bolt launched 2016
[]
Validation
4,695
3
X86_virtualization:x86 virtualization article documents hardware capabilities cpus implementing x86 x86-64 instruction sets regards hardware-assisted virtualization late 1990s x86 virtualization achieved complex software techniques necessary compensate processor lack hardware-assisted virtualization capabilities attaining reasonable performance 2006 intel vt-x amd amd-v introduced limited hardware virtualization support allowed simpler virtualization software offered speed benefits greater hardware support allowed substantial speed improvements came later processor models following discussion focuses virtualization x86 architecture protected mode protected mode operating system kernel runs higher privilege ring 0 applications lower privilege ring 3 software-based virtualization host os direct access hardware guest oss limited access hardware like application host os one approach used x86 software-based virtualization overcome limitation called ring deprivileging involves running guest os ring higher lesser privileged 0 three techniques made virtualization protected mode possible techniques incur performance overhead due lack mmu virtualization support compared vm running natively virtualizable architecture ibm system/370 traditional mainframes classic type 1 hypervisor self-standing depend operating system run user applications contrast first x86 virtualization products aimed workstation computers ran guest os inside host os embedding hypervisor kernel module ran host os type 2 hypervisor controversy whether x86 architecture hardware assistance virtualizable described popek goldberg vmware researchers pointed 2006 asplos paper techniques made x86 platform virtualizable sense meeting three criteria popek goldberg albeit classic trap-and-emulate technique different route taken systems like denali l4 xen known paravirtualization involves porting operating systems run resulting virtual machine implement parts actual x86 instruction set hard virtualize paravirtualized i/o significant performance benefits demonstrated original sosp'03 xen paper initial version x86-64 amd64 allow software-only full virtualization due lack segmentation support long mode made protection hypervisor memory impossible particular protection trap handler runs guest kernel address space revision later 64-bit amd processors rule thumb manufactured 90 nm less added basic support segmentation long mode making possible run 64-bit guests 64-bit hosts via binary translation intel add segmentation support x86-64 implementation intel 64 making 64-bit software-only virtualization impossible intel cpus intel vt-x support makes 64-bit hardware assisted virtualization possible intel platform platforms possible run 64-bit guest 32-bit host os underlying processor 64-bit supports necessary virtualization extensions 2005 2006 intel amd working independently created new processor extensions x86 architecture first generation x86 hardware virtualization addressed issue privileged instructions issue low performance virtualized system memory addressed mmu virtualization added chipset later based painful experiences 80286 protected mode suitable enough run concurrent ms-dos applications well intel introduced virtual 8086 mode 80386 chip offered virtualized 8086 processors 386 later chips hardware support virtualizing protected mode however became available 20 years later amd developed first generation virtualization extensions code name pacifica initially published amd secure virtual machine svm later marketed trademark amd virtualization abbreviated amd-v may 23 2006 amd released athlon 64 orleans athlon 64 x2 windsor athlon 64 fx windsor first amd processors support technology amd-v capability also features athlon 64 athlon 64 x2 family processors revisions f g socket am2 turion 64 x2 opteron 2nd generation third-generation phenom phenom ii processors apu fusion processors support amd-v. amd-v supported socket 939 processors sempron processors support huron sargas amd opteron cpus beginning family 0x10 barcelona line phenom ii cpus support second generation hardware virtualization technology called rapid virtualization indexing formerly known nested page tables development later adopted intel extended page tables ept cpu flag amd-v svm may checked bsd derivatives via dmesg sysctl linux via codice_1 previously codenamed vanderpool vt-x represents intel technology virtualization x86 platform november 13 2005 intel released two models pentium 4 model 662 672 first intel processors support vt-x cpu flag vt-x capability vmx linux checked via codice_1 macos via codice_3 vmx stands virtual machine extensions adds ten new instructions vmptrld vmptrst vmclear vmread vmwrite vmcall vmlaunch vmresume vmxoff vmxon instructions permit entering exiting virtual execution mode guest os perceives running full privilege ring 0 host os remains protected almost newer server desktop mobile intel processors support vt-x intel atom processors primary exception motherboards users must enable intel vt-x feature bios setup applications make use intel started include extended page tables ept technology page-table virtualization since nehalem architecture released 2008 2010 westmere added support launching logical processor directly real mode feature called unrestricted guest requires ept work since haswell microarchitecture announced 2013 intel started include vmcs shadowing technology accelerates nested virtualization vmms virtual machine control structure vmcs data structure memory exists exactly per vm managed vmm every change execution context different vms vmcs restored current vm defining state vm virtual processor soon one vmm nested vmms used problem appears way similar required shadow page table management invented described cases vmcs needs shadowed multiple times case nesting partially implemented software case hardware support processor make shadow vmcs handling efficient intel implemented hardware support vmcs shadowing via nano 3000 series processors higher support via vt virtualization technology compatible intel vt 2012 amd announced advanced virtual interrupt controller avic targeting interrupt overhead reduction virtualization environments technology announced support x2apic 2016 avic available amd family 15h models 6xh carrizo processors newer also 2012 intel announced similar technology interrupt apic virtualization brand name announcement time later branded apic virtualization apicv became commercially available ivy bridge ep series intel cpus sold xeon e5-26xx v2 launched late 2013 xeon e5-46xx v2 launched early 2014 graphics virtualization technology introduced intel iris pro intel integrated gpu either dedicatedly assigned virtual machine gvt-d shared multiple virtual machines time-sharing basis using native graphics driver gvt-g shared multiple virtual machines using virtual graphics driver gvt-s memory i/o virtualization performed chipset typically features must enabled bios must able support also set use input/output memory management unit iommu allows guest virtual machines directly use peripheral devices ethernet accelerated graphics cards hard-drive controllers dma interrupt remapping sometimes called pci passthrough iommu also allows operating systems eliminate bounce buffers needed allow communicate peripheral devices whose memory address spaces smaller operating system memory address space using memory address translation time iommu also allows operating systems hypervisors prevent buggy malicious hardware compromising memory security amd intel released iommu specifications addition cpu support motherboard chipset system firmware bios uefi need fully support iommu i/o virtualization functionality usable pci pci express devices supporting function level reset flr virtualized way required reassigning various device functions virtual machines device assigned support message signaled interrupts msi must share interrupt lines devices assignment possible conventional pci devices routed behind pci/pci-x-to-pci express bridge assigned guest virtual machine pci express devices restriction pci-sig single root i/o virtualization sr-iov provides set general non-x86 specific i/o virtualization methods based pci express pcie native hardware standardized pci-sig sr-iov common host vmm configures supported devices create allocate virtual shadows configuration spaces virtual machine guests directly configure access shadow device resources sr-iov enabled virtualized network interfaces directly accessible guests avoiding involvement vmm resulting high overall performance example sr-iov achieves 95 bare metal network bandwidth nasa virtualized datacenter amazon public cloud
[ 3586, 5378, 7940, 3973, 6150, 7941, 6153, 6924, 8333, 11539, 8725, 4886, 2334, 8625, 823, 9655, 5049, 2237, 5822, 10813, 6339, 9157, 6730, 2379, 7117, 1614, 7248, 1745, 5457, 7377, 1237, 7039, 5080, 602, 2525, 3294, 1247, 1632, 8671, 1162...
None
4,696
1
Clustrix:clustrix clustrix inc. san francisco-based private company founded 2006 develops database management system marketed newsql clustrix founded november 2006 sometimes called sprout-clustrix formed help combinator founders include paul mikesell formerly emc isilon sergei tsarev technology tested customers since 2008 initially called sierra official announcement 2010 product called clustered database system cds company received 10 million funding sequoia capital u.s. venture partners usvp ata ventures december 2010 robin purohit became chief executive october 2011 another round 6.75 million raised july 2012 another round funding original backers 16.5 million announced may 2013 round 10 million new funding august 2013 led highbar ventures purohit replaced mike azevedo 2014 round 23 million debt financing disclosed february 2016.. september 20 2018 announced clustrix acquired mariadb corporation clustrix supports workloads involve scaling transactions real-time analytics system drop-in replacement mysql designed overcome mysql scalability issues minimum disruption also built fault-tolerance features high availability within cluster parallel backup parallel replication among clusters disaster recovery clustrix scale-out sql database management system part often called newsql database systems modern relational database management systems closely following nosql movement product marketed hardware appliance using infiniband 2014 clustrix database made available downloadable software amazon web services marketplace 2013 primary competitors like microsoft sql server mysql supported online transaction processing online analytical processing distributed clustrix provides distributed relational acid database scales transactions support real-time analytics distributed relational databases columnar n't support primary transaction workload focus offline analytics includes emc greenplum hp vertica infobright amazon redshift notable players primary sql database space in-memory includes voltdb memsql excel low-latency transactions target real-time analytics nosql competitors like mongodb good handling unstructured data read heavy workloads compete space write heavy workloads transactions coarse grained db-level locking sql features like joins newsql nosql databases complementary clustrix database operates distributed cluster shared-nothing nodes using query data approach nodes typically subset data sql queries split query fragments sent nodes data enables clustrix scale horizontally scale additional nodes added clustrix database automatically splits distributes data evenly across nodes slice copies nodes uniform data distribution maintained nodes added removed data inserted unevenly automatic data distribution approach removes need shard enables clustrix maintain database availability face node loss performance test completed percona 2011 three-node cluster saw 73 increase speed similarly equipped single mysql server running tests 1024 simultaneous threads additional nodes added clustrix cluster provided roughly linear increases speed
[ 10048, 11136, 1636, 5640, 5960, 7499, 8683, 7022, 10286, 7248, 4817, 3219, 2901, 1142, 7767, 10389, 11030, 7802 ]
None
4,697
9
OpenWebGlobe:openwebglobe openwebglobe project technology processing interactively visualizing vast volumes geospatial data 3d virtual globe openwebglobe virtual globe several data categories like image data elevation data points interest vector data 3d objects streaming massive complex data internet data must pre-processed pre-processing usually comprises transformation local global reference system creation pyramid layers levels detail lod tiling data optionally compression encryption recently algorithms ported high performance compute cluster using openmp mpi also released open-source data sets usually large containing several terabytes advanced out-of-core rendering mechanisms level detail approach used visualization openwebglobe open-source project written webgl lead developer institute geomatics engineering university applied sciences northwestern switzerland openwebglobe sdk also 3d engine top webgl openwebglobe sdk possible create custom virtual globe applications javascript hello world example creates virtual globe adds image elevation layer demo version potential 3d viewer codice_1 geo-portal swiss confederation online openwebglobe website july 31 2012 scene covered entire switzerland based high resolution data swisstopo swissimage
[ 803, 5612, 7983 ]
Test
4,698
3
L'Empereur:l'empereur user controls napoleon bonaparte napoleonic wars late 18th early 19th centuries goal conquer europe game begins napoleon army officer victories combat user may get promoted commander-in-chief first consul finally emperor french powers actions available level emperor user also controls napoleon brothers louis jérôme lucien joseph well napoleon stepson eugene beauharnais game military civilian aspects user lead armies act mayor cities depending level achieved engage diplomacy nations historically accurate game reproduces many historical figures militaries europe great detail player chooses one four scenarios loads saved game starts different years earliest scenario napoleon commander marseille 1796 historically poised invasion italy second scenario napoleon st. malo commander-in-chief 1798 third scenario arguably easiest starting point napoleon first consul france 1802 final scenario napoleon emperor starts 1806 mode player control napoleon siblings stepson well turn lasts one full month per year total 12 turns per year although years change every january march gameplay elements affected game engine drafting soldiers officers termination certain diplomatic agreements collection taxes month player well commanders cities manage military civil affairs respective cities additionally every three months starting march national leaders may carry diplomatic national affairs crux gameplay rests actual battles take place special tiled battlefields arranged hexes opposing commanders place armies accordingly maneuver around battlefield battle defenders responsibility keeping city hexes control repelling enemy attackers either take city hexes annihilate defenders run food forced retreat number terrain features add depth gameplay swamps forests hills mountains rivers tundra also seasons weather affect battle invasions winter months causing bodies water freeze generally slowing movement troops troops frozen water fall bombarded happened battle austerlitz army may consist three types units basic infantry build explode bridges cavalry charge enemy allowing repeatedly attack unit single turn artillery bombard enemies afar unit three main factors determining well fight strength go 200 soldiers per unit training affects accurate unit attacks speed unit moves morale determines well unit absorbing attacks avoiding falling crippling disorder additionally unit commanding officer ratings leadership experience commanding unit type infantry cavalry artillery affects unit attack/defense power morale napoleon player basic goal conquer europe many players could daunting task time sheer size task require patient planning careful strategizing accomplish scenario presents easier goal achieve basically napoleon promoted commander c-in-c first consul emperor l'empereur features large number historical figures including emperor alexander russia king george iii britain duke wellington marshal kutusov russia general blücher prussia archduke charles austria many french generals masséna macdonald davout soult lannes oudinot berthier also appear give significant advantage france political figures also make appearances talleyrand godoy metternich game models several nations republican imperial france including kingdom naples republic venice prussia britain holland bavaria spain portugal ottoman empire turkey austria denmark sweden russia historical events portrayed napoleon invasion egypt divorce josephine marriage marie louise napoleon overthrowing barras also portrayed although events napoleon overthrow peacefully also modeled russian cossacks spanish guerrillas greatly complicating invasions respective countries plague also appear disaster game permits recreation battle trafalgar occurs whenever napoleon attempts invade england gibraltar sea nelson killed england gets free naval victory france french naval force small english automatically win combat lord nelson die computer gaming world disliked game historical inaccuracies describing disappointing seeking computer version empires arms miniature wargame 1993 survey pre 20th-century strategy games magazine gave game one-plus stars five stating little ambience napoleonic era including unrealistic artillery ranges
[ 11477, 9006 ]
None
4,699
3
Ensoniq_AudioPCI:ensoniq audiopci ensoniq audiopci pci-based sound card released 1997 ensoniq last sound card product acquired creative technology card represented shift ensoniq market positioning whereas soundscape line made primarily low-volume high-end products full features audiopci designed simple low-cost product appeal system oems thus hopefully sell mass quantities towards end 1990s ensoniq struggling financially cards popular pc oems costs high musical instrument division fading revenue pressure intense competition especially dominant creative labs forcing audio card makers try keep prices low audiopci released july 1997 designed primarily cheap comparison wide variety chips sheer size older soundscape boards highly integrated two chip design audiopci obvious shift design philosophy board consists small software-driven audio chip one following s5016 es1370 es 1371 companion digital-to-analog converter dac another cost-cutting move previously typical rom chip used storage samples sample-based synthesis replaced facility use system ram storage audio data made possible move pci bus far greater bandwidth efficient bus mastering interface compared older isa bus standard audiopci designed cheap still quite functional offers many audio capabilities soundscape elite card surpasses soundscape cards notably audiopci supports several digital effects reverb chorus spatial enhancement used microsoft windows 95 later versions windows audiopci surprises market one first cards microsoft directsound3d 4-speaker playback support 4-speaker mode activated software supporting directsound3d quadraphonic mode oddity rear channel connected output jack line input jack switches modes 4-speaker output became active dos windows drivers support sample-based synthesis ensoniq .ecw patch set format several patch set choices available varying size instrument quality 2 4 8 mb .ecw file format ensoniq concert wavetable never made open hoped enthusiasts consequently custom wave sets available contrast huge availability home-made releases e-mu soundfont format particularly unfortunate audiopci used system ram patch set storage offers tremendous potential new patch sets traditional rom storage previously used also disappointing considering incredible popularity longevity ensoniq es1370 chipset descendants still use six years original audiopci board fact dos drivers far newer sound blaster audigy still use .ecw wave sets newer cards unable use soundfonts dos limiting three official .ecw wavesets late '90s one incomplete unofficial waveset audiopci supported dos games applications using software driver would install dos real-mode boot-time portion windows 9x driver virtualized sound blaster-compatible isa sound card use pc nmi tsr program allowed audiopci compatible out-of-the-box dos support pci competitors time example competing monster sound diamond multimedia limited running dos games windows 9x-based dos command windows meaning dos compatibility frequently reliable additional isa sound card creative struggling challenge legacy support well created sb-link interconnect allowed access serial-irq pc/pci grant/request sideband signals offered pci chipsets time order achieve dos compatibility sound blaster awe64-variant pci sound cards sb-link also used number chipset vendors ess yamaha ensoniq approach generally worked games older games problems detecting virtualized hardware systems addition dos driver required memory manager emm386 loaded required additional conventional memory space also put cpu virtual-86 mode conflicting games utilized modified form protected mode called 'flat mode mode allowed fast direct access system entire ram without requiring memory manager memory protection mechanism requirement exclusive audiopci however number isa sound cards used well including creative awe isa series audiopci dos driver included ensoniq soundscape 16-bit digital audio sample-based synthesis support along support sound blaster pro adlib gold general midi mt-32 however without actual hardware fm synthesis fm music sound effects simulated using samples often unacceptable results therefore practical configure dos games utilize general midi synthesizer digital sound effects whenever possible better sound quality dos midi utilizes .ecw patch set files windows midi part deal ensoniq purchased creative labs integrate audiopci dos driver upcoming sound blaster live creative added sound blaster 16 emulation driver removed ensoniq soundscape support audiopci re-branded several creative labs sound cards including sound blaster pci 64 pci 128 vibra pci others ensoniq es1370 audio chip renamed creative 5507 revised ac'97-compliant variants es1371 es1373 used several years card integrated motherboard audio cards es1370 run natively 44 khz sampling frequency meaning 12 24 32 48 khz become resampled resampling means lower sound quality worse synchronization possibly higher cpu utilization cards es1371 run 48 khz conforming ac97 11 22 44 khz become resampled soundcards feature multiple quartzes pll resampling often used potential problems creative labs malvern former ensoniq company acquired later released ectiva 1938 ev1938 single chip pci audio controller based es1371/es1373 register compatible previous chips main difference ev1938 previous chips inclusion built-in ac'97 codec hence producing cheaper single chip audio solution ev1938 also used integrated audio laptops/motherboards cards sound blaster audiopci 64v ct4730 audiopci es1370 developed ensoniq one important feature chip used pci bus instead isa bus commonly used sound cards point one first pci sound card solutions offer ms-dos legacy compatibility without special hardware extensions standard pci slot paired capable codec ak4531 pre-ac'97 es1370 supported then-latest 3d audio positioning 4-speaker surround sound chip also pci bus master device designed provide high-speed access system ram resources sample synthesis data effect processing depending drivers may also called sound blaster 64/128 device manager es1370 one first audio chips support microsoft directsound3d audio api programs took full advantage api capabilities es1370 capable global spatial localized 3d sound effects 2 4-speaker mode chip capable spatializing audio automatically still required directsound3d usage specific localization sounds es1370 also emulated piece virtual hardware qemu vmware ensoniq/creative es1371 es1373 audiopci 97 ac'97-compatible versions https //downloadcenter.intel.com/detail_desc.aspx lang=eng changelang=true dwnldid=2583 ct5880 chip relabeled es1371 may found cheap cards i.e sb creative vibra 128 pci creative ev1938 audiopci 64v virtually identical es1371/es1373 later cost reduced product
[ 5377, 10369, 10371, 6153, 8976, 10360, 8241, 823, 6971, 2368, 3142, 5702, 3272, 9799, 9166, 4699, 1247, 8561, 8945, 10359, 5368, 10363, 1660 ]
Validation
4,700
8
Personyze:personyze personyze web 2.0 start-up company based tel aviv israel provides software service saas website personalization personyze founded november 2008 tel aviv israel yakov shabat danny hen within two years became leading personalization website providers facebook integration behavioral targeting personyze also provides analytics a/b testing june 2011 rapleaf announced partnership personyze allow use demographics database july 2011 introduced plugins content management systems wordpress joomla personyze criticized forbes contributing filter bubble technology sorts everything basis user activities may consequently present visitors portion content/offers excluding content/offers ever presented russian website- http //www.personyze.ru
[ 1353, 467 ]
Test
4,701
2
Sendo_X2:sendo x2 sendo x2 second series 60 mobile phone developed sendo announced smallest lightest series 60 mobile marketplace sendo x2 first music mobile announced good six months sony ericsson announced w800 walkman phone although phone announced shown 3gsm world congress cannes february 2005 x2 never made production sendo went administration matter weeks x2 due released led uk based mobile phone magazines publishing reviews phone knew sendo codename x2 development tobi
[ 7246, 1083, 6685, 2259 ]
Test
4,702
2
ODBC_Administrator:odbc administrator odbc administrator 32-bit utility mac os x operating system administering odbc enables interaction odbc-compliant data sources features include connection pooling trace log creation odbc driver management among administration features although apple started including underlying iodbc libraries mac os x jaguar 10.2.x continued least macos high sierra 10.13.x apple included odbc administrator mac os x leopard 10.5.x temporarily made available separate download since removed mac os x snow leopard 10.6.x alternatives apple 32-bit odbc administrator include free open source 32-bit 64-bit iodbc administrator included iodbc sdk available extant versions mac os x 10.0.x 10.13.x
[ 4615, 5647, 1042, 6700, 4657, 1074, 576, 9802, 5713, 3670, 4184, 2141, 2149, 8303, 6771, 2676, 9343, 3719, 10888, 11402, 8852, 1686, 7318, 3228, 2207, 1699, 5292, 8877, 1710, 3766, 2232, 9912, 9406, 1729, 6849, 713, 9418, 3790, 9430, 3289...
Test
4,703
4
DoublePulsar:doublepulsar doublepulsar backdoor implant tool developed u.s. national security agency nsa equation group leaked shadow brokers early 2017 tool infected 200,000 microsoft windows computers weeks used alongside eternalblue may 2017 wannacry ransomware attack variant doublepulsar first seen wild march 2016 discovered symantec sean dillon senior analyst security company risksense inc. first dissected inspected doublepulsar said nsa exploits 10 times worse heartbleed security bug use doublepulsar primary payload doublepulsar runs kernel mode grants cybercriminals high level control computer system installed uses three commands ping kill exec latter used load malware onto system
[ 1024, 5636, 4117, 8726, 535, 9761, 4644, 4133, 1608, 3657, 8779, 8288, 8292, 107, 10875, 3711, 8320, 5764, 2187, 6797, 4240, 1688, 2717, 9375, 7855, 9904, 9395, 8886, 3789, 7887, 4304, 4314, 9435, 4830, 3807, 5349, 1254, 10477, 9460, 7418...
Train
4,704
8
Windows_Live:windows live windows live discontinued brand-name set web services software products microsoft part software plus services platform chief components brand name included web services exposed corresponding web apps several computer programs interact services specialized web services mobile devices according microsoft windows live way extend windows user experience windows vista welcome screen provides link download windows live messenger subscribe windows live onecare also windows mail windows photo gallery windows movie maker offered windows 7 became exclusive part windows live microsoft announced windows 8 would see windows live apps included right out-of-the-box would include built-in synchronization technologies powered onedrive skydrive windows live brand phased august 2012 microsoft released windows 8 manufacturing active windows live services remained active gradually renamed live domain however continues used urls many online microsoft sites addition windows live mainly aimed individuals microsoft brands properties live including windows live first announced november 1 2005 initial release several windows live properties rebranded enhanced microsoft msn set products services however msn still exists alongside windows live means delivering content opposed customized content communications may 2012 microsoft began renaming windows live services partly anticipation windows 8 integrates many windows live products services operating system following services part windows live still online services still use live branding url even though brand name dropped windows phone free online companion service windows phone mobile devices provides users free mobile phone back-up solution wirelessly synchronizing contacts calendar appointments photos onenote notebooks password-protected online portal users access manage information stored windows phone devices via online portal using microsoft account well accessing set features remotely ringing locking mapping erasing lost phones service integrates tightly windows live services including people calendar skydrive microsoft released windows live messenger application ios app store allows users mobile devices running ios communicate contacts via microsoft messenger service addition instant messaging functionalities application also allows users view messenger social feed view friends profile integrate hotmail photos windows live also provides customised services specifically created feature phones offered via three channels — client-based windows mobile supported mobile devices nokia phones web-based wap gprs-enabled mobile web browsers sms-based services bing replacement search engine live search originally named windows live search msn search prior part windows live family services windows live search occupied homepage live.com domain windows live services however march 21 2007 microsoft decided separate search developments windows live services family forming part live search ad platform part reorganization new search brand live search consolidated microsoft adcenter part microsoft platform systems division however microsoft recognised brand issue word live continued remain brand effort create new identity microsoft search services june 3 2009 live search officially rebranded bing live connect collection apis common controls allow developers deeper control offers access core windows live services data open easily accessible application programming interfaces apis live connect built standard web technologies oauth 2.0 representational state transfer rest javascript object notation json designed work technology device live connect unites previously separate apis windows live single api based industry standards specifications microsoft released several computer programs windows live brand summary included except windows live onecare freeware published software suite called windows essentials formerly windows live essentials essentials programs designed integrate well within windows windows live services onedrive outlook.com windows live onecare hand commercial consumers utility marketed software service licensing model windows live butterfly awards program formerly msn butterfly program program whose members given benefit new microsoft software test beta releases went public direct contact program managers windows live products microsoft initiated windows live butterfly program order recognize contributions made exemplary beta testers prospective 'butterflies selected windows live product team nominated term one year could renominated windows live butterfly program closed june 2009 windows live websites sport common theme different themes used sites phase product release called waves wave set online services desktop programs windows essentials web services labelled wave example hotmail wave 4 programs windows essentials usually called year number example windows live messenger 2011 original windows live applications services used visual theme known blue vapor flair theme longer exists current windows live properties public beta release windows live wave 2 suite wave refers group wave products released new visual theme released enable aero transparency effect windows vista theme longer exists current windows live properties microsoft released set new themes windows live wave 3 services allows users customize pages windows live using set pre-selected background pictures several themes dynamic change according time day current weather condition user theme remains use sites windows live admin center addition themes provided windows live wave 3 release windows live wave 4 provided additional themes users customise pages windows live several dynamic themes changes according time day weather conditions user location several newly added themes similar wallpapers originating windows 7 addition windows live wave 4 header features reorganised dynamic navigation menu displays number user current online contacts number unread e-mails well in-built windows live web messenger service allowing users connect microsoft messenger service facebook chat service chat online contacts browsing windows live properties using web browser theme remains use sites family safety windows live apps windows 8 designed metro-style user interface web services also feature new metro-style user interface stop using windows live names ui header contains pull-down element allow users easily switch outlook.com people calendar onedrive header color also changes depending web service user using exception outlook.com allow users customize header color according preference new interface also in-built messaging sidebar allow users view presence instant message audio call video call contacts messenger facebook chat well skype february 2014 wave 5 services office web apps consolidated rebranded office online windows live services renamed listed
[ 2945, 4356, 11524, 10118, 1417, 2443, 6797, 782, 1935, 4624, 11667, 2196, 10388, 10900, 3610, 540, 2589, 11549, 7456, 5666, 7970, 1832, 6827, 1581, 430, 8753, 3890, 820, 1077, 2101, 6709, 8757, 6972, 4289, 5057, 9025, 10053, 5193, 1098, 9...
None
4,705
3
Superman:_The_Man_of_Steel_(1989_video_game):superman man steel 1989 video game superman man steel 1989 video game based dc comics flagship character superman developed published uk software company tynesoft license first star software game split distinct levels including 3d flying overhead vertical scrolling side scrolling sections sections different almost like different games number sections depended format e.g part seven missing versions sections linked comic book graphics telling story first level pseudo-3d forward scrolling flying level similar space harrier superman en route metropolis s.t.a.r labs attacked darkseid para-demons part two set ship lois lane held hostage terrorists takes form side scrolling fighting game superman fighting terrorists reach free lois third part overhead view vertical scrolling section set space superman must escort space shuttle manned professor gorwin asteroid kryptonite field s.t.a.r lab satellite next section another side-scrolling level set inside satellite superman must battle faulty robot defence system mistaken superman enemy intruder fifth part set outside satellite another asteroid field approaches gameplay identical level three part six similar parts three five rather asteroids superman must fly enemy satellite disrupting signals s.t.a.r lab satellite way must battle darkseid mini-robots large boss robot part seven set outside enemy satellite identified belonging lex luthor superman uses telescopic sight identify attack weak spots avoiding satellite defences final part set inside lex satellite similar part four superman must battle defence robots side-scrolling level object game destroy 'geo-disruptor found end level tynesoft ported published first star boulder dash spy vs. spy acorn platforms uk looking licenses first star held home computer rights superman used tynesoft developed entirely new game many different computers possible versions released home computer platforms day including atari st amiga pc commodore 64 zx spectrum amstrad cpc msx bbc micro acorn electron version apple ii also created us market evidence ever published released game published first star us distributed capstone software 16-bit versions generally received moderately favourable reviews one praised game incorporation style comic book source found gameplay frustrating particularly play sub games sequence gave score 69 amiga version 66 atari st version amiga computing similarly praised look game also pointing top notch sound awarding overall score 62 reception 8-bit versions game much mixed still praising presentation graphics zzap 64 gave c64 version overall score 39 complaining lightweight nature sub games tedious multi-load particular problem loading tape lengthy load level start new game tape would need rewound correct position first level crash gave spectrum version 35 praise given sound even graphics version came criticism including matchstick figure representing superman sideways scrolling section electron user much positive acorn electron version giving overall score 8/10 still criticised multi-load frustrating gameplay
[ 9006, 6129, 10931, 8444, 9853 ]
Validation
4,706
3
Gunship_(video_game):gunship video game gunship combat flight simulator video game developed published microprose 1986 game controlling simulated ah-64 apache helicopter players navigate missions attack enemy targets protect friendly forces commercially critically successful gunship followed gunship 2000 gunship game features missions seven regions including u.s. training southeast asia 1st air cavalry division central america 82nd airborne division middle east 101st airborne division western europe 3rd armored division selection region style enemies pilot assigned primary mission secondary mission could include objectives destroy enemy headquarters support friendly troops i.e destroy targets near friendly forces latter would easier mission battle would fought closer friendly lines pilot arms apache helicopter gunship usually selecting agm-114 hellfire air-to-ground missiles guided missiles destroy hard targets bunkers tanks ffars folding fin aerial rockets unguided rockets destroy soft targets infantry installations hedp high-explosive dual-purpose rounds 30 mm cannon all-purpose weapon maximum range 1.5 km central america middle east western europe aim-9 sidewinders would also standard equipment usually backup air-to-air weapon case cannon failure patient players might move short jumps crouching behind hills block enemy line sight suddenly popping attack aggressive players generally fly fast erratically evade enemy fire flying low deliver devastating cannon attacks close range since flight time component mission evaluation either method advantages latter however rather dangerous 1st line enemies whose fast reaction times cause chopper pummelled relentless fire enemy fire especially small caliber deflected armor cause systems damage enough damaging hits structural integrity fail causing general power failure manifests dual-engine flameout warranting emergency landing emergency landing seriously injured pilot enemy territory causes become missing action pilot lands without serious injury escape back base live fight another day defined time limit game player return number forward area resupply points rearmed refueled damage repaired returning home base end mission ideally pilot completes missions knocks targets makes back base within 20 minutes ending gunship promotions stop pilot makes colonel although continue amassing medals purple heart air medal bronze star silver star distinguished service cross medal honor retire final promotion brig general medals game prerequisites earning others requirement shooting two hinds one mission medal honor led believe possible earn earning lower medals repeated medals harder earn first one criteria winning medals based types targets destroyed number targets destroyed objectives met time elapsed sometimes whether pilot wounded real life medals game awarded posthumously microprose intended gunship simulate urban helicopter akin blue thunder found city graphics difficult instead used tools developed f-15 strike eagle create another military simulation game released 1986 pc dos atari st amiga commodore 64 fm towns msx pc-98 sharp x68000 zx spectrum gunship also ported sega mega drive u.s. gold 1993 however version game differed others featuring arcade-style gameplay horizontal shoot 'em stages gunship microprose third best-selling commodore game late 1987 sales surpassed 250,000 copies november 1989 info magazine gave gunship commodore 64 five stars five describing without qualification best combat flight simulator ever released 8-bit computer praising graphics weapons sound controls physics documentation magazine concluded prime computer gaming world stated reviewer heartily recommends gunship ... five-star rating highest well-deserved 1994 survey wargames magazine gave title three stars five stating initially released helicopter simulation gunship received origins award best screen graphics home computer game 1986 award best simulation game year according readers crash 1987 computer gaming world named gunship action game year 1988 game joined magazine hall fame games highly rated time readers 1996 magazine ranked 102nd best game time follow-up game gunship 2000 released microprose several platforms 1991 1996 successor gunship followed 1999 pc windows
[ 1120, 9166, 9006, 10999, 312 ]
Validation
4,707
2
Tim_Bray:tim bray timothy william bray born june 21 1955 canadian software developer entrepreneur one co-authors original xml specification worked amazon web services since december 2014 previously google sun microsystems digital equipment corporation dec several start-ups bray born june 21 1955 alberta canada grew beirut lebanon returned canada attend school university guelph guelph ontario graduated 1981 bachelor science double majoring mathematics computer science 2009 would return guelph receive honorary doctor science degree tim described switch focus math computer science way math ’ worked like dog cs cs worked much less as—and learned got paid well fresh university bray joined digital equipment corporation dec toronto software specialist 1983 bray left dec microtel pacific research joined new oxford english dictionary oed project university waterloo 1987 manager time bray worked sgml technology would later become central open text corporation xml atom standardization work bray co-founded antarctica systems bray director web technologies sun microsystems early 2004 early 2010 joined google developer advocate 2010 focusing android identity left google march 2014 unwilling relocate silicon valley vancouver started working amazon web services december 2014 bray involved several entrepreneurial activities including tim bray served part-time ceo waterloo maple 1989–1990 waterloo maple developer popular maple mathematical software bray left new oed project 1989 co-found open text corporation two colleagues open text commercialised search engine employed new oed project bray recalled “ 1994 heard conference speaker say search engines would big internet five seconds pieces fell place head realized could build thing technology. ” thus 1995 open text released open text index one first popular commercial web search engines open text corporation publicly traded nasdaq symbol otex 1991 1996 bray held position senior vice president—technology bray along wife dr. lauren wood ran textuality successful consulting practice field web publishing technology contracted netscape 1999 along ramanathan v. guha part create new version meta content framework called resource description framework rdf used xml language 1999 founded antarctica systems vancouver british columbia canada-based company specializes visualization-based business analytics bray contributed several important standards technology particularly web standards world wide web consortium w3c invited expert world wide web consortium 1996 1999 bray co-edited xml xml namespace specifications halfway project bray accepted consulting engagement netscape provoking vociferous protests netscape competitor microsoft supported initial moves bring sgml web bray temporarily asked resign editorship led intense dispute working group eventually solved appointment microsoft jean paoli third co-editor 2001 bray wrote article called taxi future xml.com proposed means improve web client user experience web server system performance via transform-aggregate-send xml-interact architecture—this proposed system similar ajax paradigm popularized around 2005 2001 2004 served tim berners-lee appointee w3c technical architecture group october 2007 bray co-chairing paul hoffman atom-focused atompub working group internet engineering task force atom web syndication format developed address perceived deficiencies rss 2.0 format bray worked ietf json working group 2013 2014 serving editor rfc 7159 specification json data interchange format revised rfc 4627 highlighted interoperability best practices released march 2014 bray written many software applications including bonnie inspiration bonnie++ unix file system benchmarking tool lark first xml processor ape atom protocol exerciser
[ 2081, 9665, 4707, 9762, 10020, 4840, 1802, 8558, 7248, 5492, 119, 124, 9245, 479 ]
Test
4,708
6
LogFS:logfs logfs linux log-structured scalable flash file system intended use large devices flash memory written jörn engel part sponsored ce linux forum logfs introduced mainline linux kernel version 2.6.34 released may 16 2010 removed codebase merge window version 4.10 december 2016 unmaintained years seemingly unused logfs mature enough pass entire test suite subsequently included mainline linux kernel marked 'experimental version 2.6.34 released may 16 2010 however attract large user base removed kernel december 2016 logfs motivated difficulties jffs2 larger flash-memory drives logfs stores inode tree drive jffs2 requires scan entire drive mount cache entire tree ram larger drives scan take dozens seconds tree take significant amount main memory logfs avoids penalties work system running uses drive space holding inode tree logfs stores file inode tree drive means write file ancestor node tree must rewritten done wandering tree update lowest node tree i.e. data written first node written ascending tree root inode updated writing root last maintains atomicity update flash-memory block unit erasures usually larger file-system block logfs handles disparity packing multiple file-system blocks single flash-memory block sum entry end flash-memory block records data stored flash-memory block file-system blocks moved deleted erased used new data peak usage flash-memory drive necessary compact data flash-memory blocks full useful data accomplished garbage collection logfs garbage collection strategy relies file data placed certain way flash-memory blocks flash-memory block hold file data level inode tree logfs garbage collect top level trees using 1 empty flash-memory block garbage collect top 2 levels trees using 2 empty flash-memory blocks garbage collect n levels trees using n empty flash memory blocks algorithm exponential time worst case worst case rare algorithm requires reserving handful flash-memory blocks latest logfs source available logfs git tree
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 9249, 9762, 5158, 7225, 11323, 8772, 1109, 9836, 7789, 9333, 6263, 9335, 7802, 9343, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, 11431, 5293, 7344, 2230, ...
None
4,709
3
Zoids:_The_Battle_Begins:zoids battle begins zoids battle begins 1986 battle simulation developed released europe zx spectrum amstrad cpc msx c64 personal computers martech licensed zoids toy manufacturer tomy players control human fused machine known spiderzoid human tasked reclaiming six parts large machine named zoidzilla parts captured enemy red zoids part reclaimed boost power player spiderzoid game well received magazines
[ 10931, 9006 ]
Test
4,710
7
Norton_Zone:norton zone norton zone cloud file sharing online backup tool service operated symantec used share sync access store backup data also allows file collaboration commenting norton zone accessible apps windows windows rt android mac ios platforms norton zone uses encrypted replicated cloud storage provides client-side encryption leading antivirus provider via norton antivirus software symantec distinguishes norton zone competition automatically scanning files malware viruses norton zone offered 5 gb storage free larger storage allocations via subscription june 3 2014 symantec announced norton zone would discontinued august 6 2014
[ 9569, 6565, 7739, 10185, 3629, 6797, 4623, 7983, 10161, 5650, 6643, 7515, 1049, 2267 ]
Test
4,711
4
Sealing_wax:sealing wax sealing wax wax material seal melting hardens quickly paper parchment ribbons wire material forming bond difficult separate without noticeable tampering wax used verify something document unopened verify sender identity example signet ring decoration sealing wax used take impressions seals wax used seal letters close later 16th century envelopes sealing wax romans used bitumen purpose formulas vary major shift european trade indies opened middle ages sealing wax typically made beeswax venice turpentine greenish-yellow resinous extract european larch tree earliest wax uncoloured later wax coloured red vermilion 16th century compounded various proportions shellac turpentine resin chalk plaster colouring matter often vermilion red lead necessarily beeswax proportion chalk varied coarser grades used seal wine bottles fruit preserves finer grades documents situations large seals public documents beeswax used occasion sealing wax historically perfumed ambergris musk scents 1866 many colours available gold using mica blue using smalt verditer black using lamp black white using lead white yellow using mercuric mineral turpeth also known schuetteite green using verdigris users british crown assigned different colours different types documents today range synthetic colours available sealing wax available form sticks sometimes wick granules stick melted one end ignited blackened granules heated spoon normally using flame placed required usually flap envelope wax still soft seal preferably temperature wax best impression quickly firmly pressed released modern day brought sealing wax new level use application traditional sealing wax candles produced canada spain france italy scotland formulations similar used historically since advent postal system use sealing wax become ceremony security modern times required new styles wax allowing mailing seal without damage removal new waxes flexible mailing referred glue-gun sealing wax faux sealing wax flexible sealing wax
[ 1821 ]
Test
4,712
2
New_Executable:new executable new executable abbreviated ne newexe 16-bit .exe file format successor dos mz executable format used windows 1.0–3.x multitasking ms-dos 4.0 os/2 1.x os/2 subset windows nt version 5.0 windows 2000 ne also called segmented executable first product released using new executable format windows 1.0 1985 followed 1986 multitasking ms-dos 4.0 separate branch ms-dos development released mainstream ms-dos versions 3.2 3.3 sometimes referred european ms-dos 4.0 os/2 1.0 released 1987 target operating system field file header reserves value 01 os/2 02 windows suggesting format designed os/2 already mind joint development agreement ibm microsoft os/2 signed august 1985 months windows 1.0 released november 1985 portable executable pe format replaced ne format 32-bit 64-bit versions windows linear executables lx replaced ne 32-bit programs os/2 designed 16-bit oses ne executables run 32-bit windows beginning windows vista icon resources inside new executables extracted shown even 32-bit shell 64-bit versions windows completely lack native support running ne executables 64-bit windows run 16-bit programs processor without help emulator due rare fairly complex nature files .exe packers support winlite packwin pklite 2.01 slr optloader nelite os/2 ne format also still used non-executable container codice_1 microsoft windows bitmapped fonts new ne linear lx portable pe executables retain dos mz format file header backward compatibility dos run dos so-called dos stub executed usually prints message exits constitutes minimal form called fat binary windows 1.0 executables however file header formatted way dos refuses run program large fit memory error message see windows 1.0 features
[ 10176, 1922, 6664, 5225, 6921, 2380, 6797, 8301, 7983, 2672, 8976, 3410, 2804, 5557, 3386, 1501, 2942, 8959 ]
None
4,713
1
Schema-agnostic_databases:schema-agnostic databases schema-agnostic databases vocabulary-independent databases aim supporting users abstracted representation data supporting automatic semantic matching queries databases schema-agnosticism property database mapping query issued user terminology structure automatically mapping dataset vocabulary increase size semantic heterogeneity database schemas bring new requirements users querying searching structured data scale become unfeasible data consumers familiar representation data order query center discussion semantic gap users databases becomes central scale complexity data grows evolution data environments towards consumption data multiple data sources growth schema size complexity dynamicity decentralisation scodd schemas increases complexity contemporary data management scodd trend emerges central data management concern big data scenarios users applications demand complete data produced independent data sources different semantic assumptions contexts use typical scenario semantic web data applications evolution databases direction heterogeneous data environments strongly impacts usability semiotics semantic assumptions behind existing data accessibility methods structured queries keyword-based search visual query systems schema-less databases containing potentially millions dynamically changing attributes becomes unfeasible users become aware 'schema vocabulary order query database scale effort understanding schema order build structured query become prohibitive schema-agnostic queries defined query approaches structured databases allow users satisfying complex information needs without understanding representation schema database similarly tran et al defines search approaches require users know schema underlying data approaches keyword-based search databases allow users query databases without employing structured queries however discussed tran et al points users however navigation exploration address complex information needs unlike keyword search used web focuses simple needs keyword search elaborated used obtain complex results instead single set resources goal compute complex sets resources relations development approaches support natural language interfaces nli databases aimed towards goal schema-agnostic queries complementarily approaches based keyword search targeted keyword-based queries express complex information needs approaches explored construction structured queries databases schema constraints relaxed approaches natural language keyword-based search structured queries targeted different degrees sophistication addressing problem supporting flexible semantic matching queries data vary completely absence semantic concern principled semantic models demand schema-agnosticism implicit requirement across semantic search natural language query systems structured data sufficiently individuated concept necessary requirement contemporary database management systems recent works started define model semantic aspects involved schema-agnostic queries consist schema-agnostic queries following syntax structured standard example sql sparql syntax semantics operators maintained different terminologies used maps following sparql query dataset vocabulary maps following sparql query dataset vocabulary consist schema-agnostic queries using keyword queries case syntax semantics operators different structured query syntax 2016 concept schema-agnostic queries developed primarily academia schema-agnostic query systems investigated context natural language interfaces databases semantic web works explore application semantic parsing techniques large heterogeneous schema-less databases recently individuation concept schema-agnostic query systems databases appeared explicitly within literature freitas et al provide probabilistic model semantic complexity mapping schema-agnostic queries
[ 11457, 6629, 10413, 8046, 10452, 2901, 1174 ]
Test
4,714
1
FloraBase:florabase florabase public access web-based database flora western australia provides authoritative scientific information 12,978 taxa including descriptions maps images conservation status nomenclatural details 1,272 alien taxa naturalised weeds also recorded system takes data datasets including census western australian plants western australian herbarium specimen database nearly 725,000 vouchered plant collections operated western australian herbarium within department parks wildlife established november 1998 distribution guide uses combination ibra version 5.1 john stanley beard botanical provinces
[]
Test
4,715
4
Merritt_method:merritt method overwrite session consists lead-in random write patterns followed patterns 2-3 executed random order lead-out one random patterns followed 00000000 another random drive written passes even though table shows bit patterns passes specifically targeted encoding scheme end result obscure data drive advanced physical scanning e.g using magnetic force microscope drive likely able recover data series patterns follows
[ 3880 ]
None
4,716
3
Hang-On:hang-on game also built versions master system title derived biker turning hang bike bike leaning suzuki read japanese bike magazine though suzuki learned later technique called hang north america nevertheless chose keep former name 1995 interview suzuki said felt hang-on impressive game time release master system version also came two different compilation cartridges one astro warrior one safari hunt using behind motorcycle perspective player races linear race track divided several stages within limited time reaching checkpoint end stage extends time limit game ends time runs race finished arcade game contains in-game billboards bridgestone desert dueler tires shell garelli motorcycles tag john player special cigarettes forum cigarettes marbor obvious parody marlboro cigarettes arcade flyer features bike marlboro colors sponsored yamaha yzr500 world championships mid late 1980s would controversy cigarette ads games marketed children upon release another sega racing game super monaco gp 1989 three arcade cabinet designs—the usual upright machine handlebar brake levers instead joystick buttons upright machine addition seat third version looked roughly like real motorcycle steer player leaned tilt bike steered in-game bike screen mounted windshield area bike sg-1000-exclusive sequel hang-on ii released 1985 though essentially port original game modified work within limitations console hardware 1987 followed sequel super hang-on arcade later range platforms including sega genesis zx spectrum commodore 64 amstrad cpc commodore amiga atari st. polygon based sequel developed genki released sega saturn named variously hang-on gp '95 japan hang-on gp usa hang-on gp '96 europe power drift motorcycle hidden vehicle accessed finishing first place five tracks courses c e. playable extra stage sonic riders hang-on gear super hang-on gear bought shop one playing respective music racing. gear unlockable form sit-down arcade cabinet however collecting 100 rings pressing button race changes gear main music sequel sit-down arcade cabinet outride crisis said game sonic free riders hang-on gear super hang-on gear bought shop original sonic riders shenmue shenmue ii feature hang-on mini-game well ability win miniature toy versions bikes gashapon machines xbox version shenmue ii playable xbox 360 crashes trying play hang-on sonic all-stars racing transformed ryo drives hang-on sit-down arcade cabinet water-based portions race daytona usa h.o entered high score table clip main theme hang-on play
[ 11690, 3307, 8300, 9006, 1776, 5011, 629, 11452, 11231 ]
Test
4,717
3
Socket_G1:socket g1 socket g1 also known rpga 988a socket g/rpga 989 sockets take socket g1/rpga 988a socket g2/rpga 988b packaged processors intel cpu socket line mobile core i7 successor core 2 line based intel nehalem architecture first available 1366-pin socket b like predecessor lga775 uses lga socket configuration later followed updated lga-1156 socket moved qpi pci-express controller northbridge onto cpu result lower pin count lga-1156 systems later socket g1 systems run dual-channel memory mode opposed triple-channel mode unique lga-1366 platform subsequent xeon sockets nehalem mobile variant released september 23 2009 form i7-720qm 820qm 920xm models followed i7-740qm 840qm 940xm models june 21 2010 newer cpus use new clarksfield core maintained 45 nm manufacturing process desktop-based nehalems nehalem received die shrink january 7 2010 core name westmere intel gma hd graphics ironlake core packaged onto cpu substrate integrated directly processor die goes create arrandale-based line current cpus use package core i7-6x0m series core i5-4x0m series core i5-5x0m series core i3-3x0m series finally pentium p6x00 series celeron p4x00 series released march 28 2010 however available socket g1 available bga package also known pga988 socket processors
[ 3588, 3973, 5386, 5901, 5523, 2455, 3992, 8855, 11417, 3995, 4252, 6175, 7714, 10019, 4523, 2604, 2350, 6192, 9649, 4537, 7105, 6339, 4805, 7110, 8394, 3403, 4427, 4179, 3798, 4185, 7002, 9945, 11484, 9570, 8035, 10468, 613, 8552, 1260, 1...
Test
4,718
4
Movieland:movieland movieland also known movieland.com moviepass.tv popcorn.net subscription-based movie download service subject thousands complaints federal trade commission washington state attorney general office better business bureau agencies consumers said held hostage repeated pop-up windows demands payment triggered free 3-day trial period many said never even heard movieland saw first pop-up movieland advertised service spyware personal information would need filled begin free trial federal trade commission ftc filed complaint movieland eleven defendants august 2006 charging engaged nationwide scheme use deception coercion extract payments consumers attorney general state washington also filed complaint charging movieland several defendants violating state computer spyware act consumer protection act movieland advertises movie download service using pop-up ads sites ads offer three-day free trial access members-only content including music news updated sports scores adult movies ads say forms fill need provide credit card number e-mail address making trial appear anonymous site homepage states spyware virus free extra charge site installs program mediapipe used access service movieland.com began operations sometime fall 2005 earlier consumer complaints began soon thereafter consumers claimed never signed free trial never used service never even heard movieland got first pop-up demand payment said found software computers downloading screensaver free utility company denied installed software stealthy means media coverage early january 2006 recounted consumer complaints mentioned several anti-spyware companies buying google advertisements boasting product ability remove movieland report updated february 20 2008 berkman center internet society harvard law school calls movieland mediapipe component badware fully disclose installing completely remove components 'obligations uninstall process modifies software without disclosure richard stiennon it-harvest referred movieland form ransomware due behaviour july 2008 mediapipe report still cited berkman center internet society harvard law school august 8 2006 ftc filed complaint united states district court obtain preliminary permanent injunctive relief rescission contracts restitution disgorgement equitable relief defendants deceptive unfair acts practices violation section 5 ftc act complaint alleged defendants demanding payment fix problem created installing disruptive software could removed reasonable means according ftc complaint movieland repeatedly bombarded consumers pop-up windows accompanied music lasted nearly minute demanded minimum payment 29.95 end recurring pop-up cycle claiming consumers signed three-day free trial cancel service trial period complaint charged pop-ups large dark background took much screen blocking access windows contain close minimize buttons forcing user continue first pop-up showed date time content access software installed system 3 day free trial began text click 'continue purchase license stop reminders graphic reading stop reminders click continue option offered button labeled continue clicking continue brought next pop-up 40-second audiovisual clip featuring woman introduced personal customer service representative stated cancel trial period legally obligated make payment per terms conditions agreed installed content delivery software clip neared conclusion new dialog box entitled payment options appeared choosing close window option ended pop-ups unvarying cycle began addition complaint alleged defendants made numerous false statements attempting collect payments consumers claiming computer owner someone else consented receiving pop-up payment demands paid owner computer received pop-ups legally obligated pay movieland computer owner obligated satisfy contract person entered using computer customer service telephone number provided 900 number consumers called recorded greeting told would incur 34.95 charge hang within three seconds complaint also alleged defendants made difficult impossible consumers uninstall software attempting remove windows control panel add remove programs function redirected web page telling pay 29.95 fee stop pop-ups way many consumers could regain control computers pay fee pay computer technician remove software movieland representatives said downloads spyware get computers accidentally insisting drive-by downloads said ftc lawsuit improperly brought pointed time complaint filed federal judge rejected ftc request temporary restraining order would immediately ended cited billing practices terms service movieland web site warned users cancel pay three-day period pop-up billing reminders would begin appear frequently choose one payment options pay license movieland said pop-ups anti-fraud mechanism received without consumers intentionally downloading software several intentional steps default setting cancel company also stated extrinsic programs adware otherwise bundled software company disputed ftc claim software difficult get rid said could removed using windows control panel following ten companies two individuals named defendants ftc complaint november 2006 defendants ftc signed stipulations governing pre-trial conduct without admitting wrongdoing violation law involvement acts practices alleged complaint defendants agreed make clear prominent disclosures prior software download installation download install software without user explicit consent without disclosing clearly prominently site terms service nature frequency duration pop-up windows may appear regarding purported obligation payment pop-ups also must lock access rest computer also agreed fixed limits many pop-ups generate computer maximum 5 per day 1 per hour requirement provide mute button sound content pop-ups able close windows provide hyperlink toll-free number email utility request stopping pop-ups certain conditions defendants also promised clearly label single-click download install buttons pre-select default also required represent consumers legal contractual obligation pay software unless computer owner provided personal identification agreed pay failure pay result collection proceedings affect computer owner credit status unless owner provided personal identification credit card agreed pay customer service agents may state believe computer owner responsible paying download offer several purchase options including one-time 30-day non-renewing license 29.95 access service terminate ftc complaint scheduled tried united states district court january 2008 trial defendants chose settle court ftc movieland settled ftc september 2007 without admitting wrongdoing violation law defendants agreed make permanent terms pre-trial stipulations including limiting number frequency duration billing pop-ups pay ftc 501,367 reimburse consumers paid program result repeated pop-up demands defendants also agreed stop offering anonymous free trials users certify install time least 18 years age provide install-time link terms service end user license agreement download software reinstalls user removed prominently post removal instructions web sites agreement also requires herd garroni notify ftc change name address employment status new business affiliations five years august 14 2006 rob mckenna attorney general state washington charged movieland digital enterprises herd garroni violating state computer spyware act consumer protection act complaint filed king county superior court seattle alleged misrepresentations unlawful business acts practices similar alleged ftc complaint alleged violations washington state law defendants subject fines 100,000 per violation spyware act 2,000 per violation consumer protection act found liable also subject paying restitution affected consumers alleged violations washington state law included taking control user computer violation spyware act consumer protection act cpa remotely installing billing software initiates controls pop-up cycle misrepresenting ability uninstall software violation acts listing software add/remove programs although software uninstalled unconscionable business practices violation cpa aggressive harassing billing method used failure disclose including use billing method forces payment completely obstructing users access computers threats harassment intimidation billing practices violation cpa threatening collection proceedings adverse effect users credit records fact defendants even know consumer name referring consumers legal obligation pay fact legally binding contract failure disclose material facts violation cpa aggressive relentless threatening form payment demands fact uninstallation option software disabled defendants transmit software user computer surreptitiously misrepresentations violation cpa including stating software contains spyware fact software constitutes spyware behavior announcing suit following seven-month investigation washington attorney general rob mckenna rejected one possible defense defendants claim users legally obligated pay service lacks merit consumers provide knowing consent installation relentless pop-up demands said furthermore computer owners responsible satisfy contracts people including minors entered using computer also said defendants threats collection proceedings adverse effects users credit ratings empty defendants way personally identify computer users assistant attorney general paula selis said tactics forced consumers give pay 20 100 service said sued getting complaints consumers felt harassed held barrel payments n't agree make selis said harassment intimidation consumer using high-pressure tactic make pay something legally obligated pay movieland settled washington april 2007 terms similar ftc settlement specific washington consumers agreeing pay washington 50,000 consumer reimbursement prominently state important contract terms including cost subscription service advertisements
[ 3555, 4718, 2611, 10392, 3163, 1629 ]
Test
4,719
4
Ann_Z._Caracristi:ann z. caracristi ann zeilinger caracristi february 1 1921 – january 10 2016 american cryptanalyst former deputy director national security agency served various positions 40-year career served member secretary defense joint security commission president foreign intelligence advisory board became first woman nsa promoted gs-18 rank 1975 became chief research operations born bronxville new york attended russell sage college women ’ college troy new york graduated 1942 english history major graduation recruited army signal intelligence service work code breaker recommendation dean russell sage caracristi sent washington d.c. attended cryptanalysis courses william friedman puzzles used train cryptographers art pattern recognition world war ii caracristi cryptography work focused deciphering additive systems used japanese military forces merchant fleet known exceptional talent reconstructing enemy code books colleagues among first americans learn japan planned surrender deciphered code august 14 1945 following war caracristi hired agency would later become part national security agency promoted first supergrade higher civil service paygrade 1959 gs-18 highest supergrade chief research operations 1975 1980 caracristi became sixth nsa deputy director first woman serve role received department defense distinguished civilian service award 1980 highest award given civilians deputy director credited providing leadership new generations code breakers integrating use computers technology retired 1982 continued serve panels intelligence community including president clinton ’ foreign intelligence advisory board appointed 1993 2003 caracristi given honorary degree national intelligence university academic award name given high-performing graduate student year lived adult life one-bedroom cottage georgetown hobbies included birds collecting pewter 2002 name given naval intelligence professionals award caracristi died january 10 2016 washington age 94 dementia later years 1980 received department defense distinguished civilian service award one subjects 2017 non-fiction book code girls untold story american women code breakers world war ii liza mundy
[ 266, 6668, 9357, 2580, 1941, 2712, 289, 4898, 11302, 4007, 1714, 10305, 327, 6343, 7887, 10832, 2897, 4566, 6749, 7137, 365 ]
Validation
4,720
9
Compiler_correctness:compiler correctness computing compiler correctness branch computer science deals trying show compiler behaves according language specification techniques include developing compiler using formal methods using rigorous testing often called compiler validation existing compiler compiler validation formal methods involves long chain formal deductive logic however since tool find proof theorem prover implemented software complex high probability contain errors one approach use tool verifies proof proof checker much simpler proof-finder less likely contain errors complete example approach compcert formally verified optimizing compiler large subset c99 methods include model checking formal verification provably correct semantics-directed compiler generation testing represents significant portion effort shipping compiler receives comparatively little coverage standard literature 1986 edition single-page section compiler testing named examples 2006 edition omits section testing emphasize importance “ optimizing compilers difficult get right dare say optimizing compiler completely error-free thus important objective writing compiler correct. ” fraser hanson 1995 brief section regression testing source code available bailey davidson 2003 cover testing procedure calls number articles confirm many released compilers significant code-correctness bugs sheridan 2007 probably recent journal article general compiler testing commercial compiler compliance validation suites available solid sands perennial plum-hall purposes largest body information available compiler testing fortran cobol validation suites common techniques testing compilers fuzzing generates random programs try find bugs compiler test case reduction tries minimize found test case make easier understand
[ 1952, 8262, 2262 ]
None
4,721
6
Install_(Unix):install unix install command unix program used copy files set file permissions implementations offer invoke strip installing executable files
[ 2432, 811, 5492, 5759 ]
Test
4,722
4
Anti-phishing_software:anti-phishing software anti-phishing software consists computer programs attempt identify phishing content contained websites e-mail forms used accessing data usually internet block content usually warning user often option view content regardless often integrated web browsers email clients toolbar displays real domain name website viewer visiting attempt prevent fraudulent websites masquerading legitimate websites popular web browsers comes built-in anti-phishing anti-malware protection services almost none alternate web browsers protections password managers also used help defend phishing mutual authentication techniques study conducted 3sharp company helps businesses manage demo content released september 27 2006 tested ability eight anti-phishing solutions block known phishing sites warn phishing sites allow legitimate sites study commissioned microsoft titled gone phishing evaluating anti-phishing tools windows concluded internet explorer netcraft toolbar effective anti-phishing tools later independent study conducted carnegie mellon university cylab titled phinding phish evaluation anti-phishing toolbars released november 13 2006 tested ability ten anti-phishing solutions block warn known phishing sites block warn legitimate sites exhibit false-positives well usability solution solutions tested netcraft toolbar earthlink scamblocker spoofguard able correctly identify 75 sites tested netcraft toolbar receiving highest score without incorrectly identifying legitimate sites phishing severe problems however discovered using spoofguard incorrectly identified 38 tested legitimate sites phishing leading conclusion inaccuracies might nullify benefits spoofguard offers identifying phishing sites google safe browsing since built firefox internet explorer performed well testing ability detect fresh phishes netcraft toolbar scored high 96 google safe browsing scored low 0 possibly due technical problems google safe browsing testing performed using phishing data obtained anti-phishing working group phishtank unnamed email filtering vendor latest study conducted smartware mozilla released november 14 2006 concluded anti-phishing filter firefox effective internet explorer 10 results study questioned critics noting testing data sourced exclusively phishtank anti-phishing provider study compared internet explorer firefox leaving among others netcraft toolbar opera browser use data phishtank anti-phishing solutions led speculations limited testing data opera netcraft toolbar would gotten perfect score part study two directly aforementioned reports released one day apart asa dotzler director community development mozilla responded criticism mozilla-commissioned report saying 're agreeing recent legitimate data puts firefox ahead good enough since studies conducted microsoft opera software started licensing netcraft anti-phishing data bringing effectiveness browser built-in anti-phishing par netcraft toolbar beyond
[ 2049, 3971, 8584, 6028, 11418, 1052, 9757, 6431, 7713, 422, 6699, 6064, 10928, 5178, 704, 5078, 5082, 4326, 488, 9712, 10872, 9983 ]
None
4,723
5
Common_Open_Policy_Service:common open policy service common open policy service cops protocol part internet protocol suite defined ietf rfc 2748 cops specifies simple client/server model supporting policy control quality service qos signaling protocols e.g rsvp policies stored servers acted upon policy decision points pdp enforced clients also known policy enforcement points pep two models cops outsourcing model provisioning model considered view client pep outsourcing model simplest cops implementation model policies stored pdp whenever pep needs make decision sends relevant information pdp pdp analyzes information makes decision relays pep pep simply enforces decision provisioning model see rfc 3084 cops usage policy provisioning cops-pr pep reports decision-making capabilities pdp pdp downloads relevant policies pep pep make decisions based policies provisioning model uses policy information base repository policies
[ 10242, 3847, 649, 9868, 3218, 9365, 10005, 11413, 5402, 5531, 3742, 10271, 9380, 2085, 9381, 3751, 3752, 10924, 562, 2996, 9909, 10171, 4797, 5181, 3133, 3006, 5437, 7364, 2887, 8265, 11210, 2509, 4687, 5843, 2904, 5469, 5470, 5471, 5472, ...
Validation
4,724
6
Hybrid_disc:hybrid disc hybrid disc disc cd-rom blu-ray disc contains multiple types data used differently different devices include cd-rom music albums containing video files viewable personal computer feature film blu-ray discs containing interactive content used playstation 3 game console hybrid disc optical disc multiple file systems installed typically iso 9660 hfs+ hfs older discs one reason hybrid format restrictions iso 9660 filenames eight characters maximum depths eight directories similar microsoft fat file system another key factor iso 9660 support resource forks critical classic mac os software design os x macos removed much need resource forks application design companies released products dos later windows classic mac os later macos could release cd containing software natively readable either system data files even shared partitions keeping platform specific data separate true shared hybrid hfs filesystem files common iso 9660 hfs partitions stored iso 9660 partition pointing file content hfs area vice versa blizzard entertainment released computer games hybrid cds default mac os 9 macos burn hybrid discs iso 9660/hfs hybrid disc iso 9660 primary volume descriptor makes valid iso 9660 disc apple partition may also apple partition map although necessary iso 9660 portion disc co-exist apple partition header areas define contents disc located different places iso 9660 primary volume descriptor begins 32,768 bytes 32 kb disc present apple partition map begins 512 bytes disc partition map header apple hfs partition known master directory block mdb begins 1,024 bytes disc hybrid-cd also refers audio cd also includes data track storing mp3 digital audio compression format copy cd-da tracks introduction subsequent popularization itunes ipod discs popular sharing music compact disc without requiring recipient extract encode cd-da — technical perhaps time-consuming process older computing hardware however advent faster computing hardware vastly simplified automated extraction encoding tools e.g itunes rhythmbox etc lack automated hybrid feature software popularity hybrid cd subsequently declined however hybrid discs remain commercial setting digital rights management enforcement technique encrypted compressed copies digital audio provided proprietary software listening computer disc drive cd-da included playback stand-alone cd players recent years blu-ray discs released hybrid discs demonstrating compatibility playstation 3 console uses bd primary disc format discs generally include movie feature played blu-ray disc player playable content accessible run playstation 3 console examples include macross frontier itsuwari utahime
[ 576, 9762, 5413, 2149, 8937, 2156, 6797, 8114, 11410, 3167 ]
None
4,725
4
Proxy_server:proxy server computer networks proxy server server computer system application acts intermediary requests clients seeking resources servers client connects proxy server requesting service file connection web page resource available different server proxy server evaluates request way simplify control complexity proxies invented add structure encapsulation distributed systems proxy server may reside user local computer point user computer destination servers internet open proxy forwarding proxy server accessible internet user 2008 gordon lyon estimates hundreds thousands open proxies internet anonymous open proxy allows users conceal ip address browsing web using internet services varying degrees anonymity however well number methods 'tricking client revealing regardless proxy used reverse proxy surrogate proxy server appears clients ordinary server reverse proxies forward requests one ordinary servers handle request response proxy server returned came directly original server leaving client knowledge original server reverse proxies installed neighborhood one web servers traffic coming internet destination one neighborhood web servers goes proxy server use reverse originates counterpart forward proxy since reverse proxy sits closer web server serves restricted set websites several reasons installing reverse proxy servers content-filtering web proxy server provides administrative control content may relayed one directions proxy commonly used commercial non-commercial organizations especially schools ensure internet usage conforms acceptable use policy content filtering proxy often support user authentication control web access also usually produces logs either give detailed information urls accessed specific users monitor bandwidth usage statistics may also communicate daemon-based and/or icap-based antivirus software provide security virus malware scanning incoming content real time enters network many workplaces schools colleges restrict web sites online services accessible available buildings governments also censor undesirable content done either specialized proxy called content filter commercial free products available using cache-extension protocol icap allows plug-in extensions open caching architecture websites commonly used students circumvent filters access blocked content often include proxy user access websites filter trying block requests may filtered several methods url dns blacklists blacklist url regex filtering mime filtering content keyword filtering products known employ content analysis techniques look traits commonly used certain types content providers blacklists often provided maintained web-filtering companies often grouped categories pornography gambling shopping social networks etc. assuming requested url acceptable content fetched proxy point dynamic filter may applied return path example jpeg files could blocked based fleshtone matches language filters could dynamically detect unwanted language content rejected http fetch error may returned requester web filtering companies use internet-wide crawling robot assesses likelihood content certain type resultant database corrected manual labor based complaints known flaws content-matching algorithms proxies scan outbound content e.g. data loss prevention scan content malicious software web filtering proxies able peer inside secure sockets http transactions assuming chain-of-trust ssl/tls transport layer security tampered ssl/tls chain-of-trust relies trusted root certificate authorities workplace setting client managed organization trust might granted root certificate whose private key known proxy consequently root certificate generated proxy installed browser ca list staff situations proxy analysis contents ssl/tls transaction becomes possible proxy effectively operating man-in-the-middle attack allowed client trust root certificate proxy owns destination server filters content based origin request use proxy circumvent filter example server using ip-based geolocation restrict service certain country accessed using proxy located country access service web proxies common means bypassing government censorship although 3 internet users use circumvention tools cases users circumvent proxies filter using blacklists using services designed proxy information non-blacklisted location proxies installed order eavesdrop upon data-flow client machines web content sent accessed – including passwords submitted cookies used – captured analyzed proxy operator reason passwords online services webmail banking always exchanged cryptographically secured connection ssl chaining proxies reveal data original requester possible obfuscate activities eyes user destination however traces left intermediate hops could used offered trace user activities policies administrators proxies unknown user may fall victim false sense security details sight mind inconvenience risk proxy users may find blocked certain web sites numerous forums web sites block ip addresses proxies known spammed trolled site proxy bouncing used maintain privacy caching proxy server accelerates service requests retrieving content saved previous request made client even clients caching proxies keep local copies frequently requested resources allowing large organizations significantly reduce upstream bandwidth usage costs significantly increasing performance isps large businesses caching proxy caching proxies first kind proxy server web proxies commonly used cache web pages web server poorly implemented caching proxies cause problems inability use user authentication proxy designed mitigate specific link related issues degradation performance enhancing proxy peps typically used improve tcp performance presence high round-trip times high packet loss wireless mobile phone networks highly asymmetric links featuring different upload download rates peps make efficient use network example merging tcp acks acknowledgements compressing data sent application layer translation proxy proxy server used localize website experience different markets traffic global audience routed translation proxy source website visitors browse proxied site requests go back source site pages rendered original language content response replaced translated content passes back proxy translations used translation proxy either machine translation human translation combination machine human translation different translation proxy implementations different capabilities allow customization source site local audience excluding source content substituting source content original local content proxy used automatically repair errors proxied content instance bikiniproxy system instruments javascript code fly order detect automatically repair errors happening browser.. another kind repair done proxy fix accessibility issues anonymous proxy server sometimes called web proxy generally attempts anonymize web surfing different varieties anonymizers destination server server ultimately satisfies web request receives requests anonymizing proxy server thus receive information end user address requests anonymous anonymizing proxy server however degree trust present proxy server user many proxy servers funded continued advertising link user access control proxy servers implement logon requirement large organizations authorized users must log gain access web organization thereby track usage individuals anonymizing proxy servers may forward data packets header lines http_via http_x_forwarded_for http_forwarded may reveal ip address client anonymizing proxy servers known elite high-anonymity proxies make appear proxy server client website could still suspect proxy used client sends packets include cookie previous visit use high-anonymity proxy server clearing cookies possibly cache would solve problem advertisers use proxy servers validating checking quality assurance geotargeted ads geotargeting ad server checks request source ip address uses geo-ip database determine geographic source requests using proxy server physically located inside specific country city gives advertisers ability test geotargeted ads proxy keep internal network structure company secret using network address translation help security internal network makes requests machines users local network anonymous proxies also combined firewalls incorrectly configured proxy provide access network otherwise isolated internet proxies allow web sites make web requests externally hosted resources e.g images music files etc cross-domain restrictions prohibit web site linking directly outside domains proxies also allow browser make web requests externally hosted content behalf website cross-domain restrictions place protect websites likes data theft prohibit browser directly accessing outside domains secondary market brokers use web proxy servers buy large stocks limited products limited sneakers tickets web proxies forward http requests request client regular http request except full url passed instead path request sent proxy server proxy makes request specified returns response web proxies allow http connect method set forwarding arbitrary data connection common policy forward port 443 allow https traffic examples web proxy servers include apache mod_proxy traffic server haproxy iis configured proxy e.g. application request routing nginx privoxy squid varnish reverse proxy wingate ziproxy tinyproxy rabbit4 polipo clients problem complex multiple proxy-servers solved client-serer proxy auto-config protocol pac file socks also forwards arbitrary data connection phase similar http connect web proxies also known intercepting proxy inline proxy forced proxy transparent proxy intercepts normal communication without requiring special client configuration clients need aware existence proxy transparent proxy normally located client internet proxy performing functions gateway router 'transparent proxy proxy modify request response beyond required proxy authentication identification 'non-transparent proxy proxy modifies request response order provide added service user agent group annotation services media type transformation protocol reduction anonymity filtering tcp intercept traffic filtering security feature protects tcp servers tcp syn flood attacks type denial-of-service attack tcp intercept available ip traffic 2009 security flaw way transparent proxies operate published robert auger computer emergency response team issued advisory listing dozens affected transparent intercepting proxy servers intercepting proxies commonly used businesses enforce acceptable use policy ease administrative overheads since client browser configuration required second reason however mitigated features active directory group policy dhcp automatic proxy detection intercepting proxies also commonly used isps countries save upstream bandwidth improve customer response times caching common countries bandwidth limited e.g island nations must paid diversion interception tcp connection creates several issues firstly original destination ip port must somehow communicated proxy always possible e.g. gateway proxy reside different hosts class cross site attacks depend certain behaviour intercepting proxies check access information original intercepted destination problem may resolved using integrated packet-level application level appliance software able communicate information packet handler proxy intercepting also creates problems http authentication especially connection-oriented authentication ntlm client browser believes talking server rather proxy cause problems intercepting proxy requires authentication user connects site also requires authentication finally intercepting connections cause problems http caches requests responses become uncacheable shared cache integrated firewall proxy servers router/firewall host proxy communicating original destination information done method example microsoft tmg wingate interception also performed using cisco wccp web cache control protocol proprietary protocol resides router configured cache allowing cache determine ports traffic sent via transparent redirection router redirection occur one two ways gre tunneling osi layer 3 mac rewrites osi layer 2 traffic reaches proxy machine interception commonly performed nat network address translation setups invisible client browser leave proxy visible web server devices internet side proxy recent linux bsd releases provide tproxy transparent proxy performs ip-level osi layer 3 transparent interception spoofing outbound traffic hiding proxy ip address network devices several methods often used detect presence intercepting proxy server cgi web proxy accepts target urls using web form user browser window processes request returns results user browser consequently used device network allow true proxy settings changed first recorded cgi proxy named rover time renamed 1998 cgiproxy developed american computer scientist james marshall early 1996 article unix review rich morin majority cgi proxies powered one cgiproxy written perl language glype written php language phproxy written php language april 2016 cgiproxy received 2 million downloads glype received almost million downloads whilst phproxy still receives hundreds downloads per week despite waning popularity due vpns privacy methods still several thousand cgi proxies online cgi proxies set purposes making websites accessible disabled people since shut due excessive traffic usually caused third party advertising service means bypass local filtering since many users n't care collateral damage causing became necessary organizations hide proxies disclosing urls take trouble contact organization demonstrate genuine need suffix proxy allows user access web content appending name proxy server url requested content e.g en.wikipedia.org. suffixproxy.com suffix proxy servers easier use regular proxy servers offer high levels anonymity primary use bypassing web filters however rarely used due advanced web filters tor short onion router system intended enable online anonymity tor client software routes internet traffic worldwide volunteer network servers order conceal user location usage someone conducting network surveillance traffic analysis using tor makes difficult trace internet activity including visits web sites online posts instant messages communication forms back user intended protect users personal freedom privacy ability conduct confidential business keeping internet activities monitored onion routing refers layered nature encryption service original data encrypted re-encrypted multiple times sent successive tor relays one decrypts layer encryption passing data next relay ultimately destination reduces possibility original data unscrambled understood transit tor client free software additional charges use network i2p anonymous network 'i2p proxy network aiming online anonymity implements garlic routing enhancement tor onion routing i2p fully distributed works encrypting communications various layers relaying network routers run volunteers various locations keeping source information hidden i2p offers censorship resistance goals i2p protect users personal freedom privacy ability conduct confidential business user i2p runs i2p router computer node i2p router takes care finding peers building anonymizing tunnels i2p provides proxies protocols http irc socks ... software free open-source network free charge use 'proxy refers layer-7 application osi reference model network address translation nat similar proxy operates layer-3 client configuration layer-3 nat configuring gateway sufficient however client configuration layer-7 proxy destination packets client generates must always proxy server layer-7 proxy server reads packet finds true destination nat operates layer-3 less resource-intensive layer-7 proxy also less flexible compare two technologies might encounter terminology known 'transparent firewall transparent firewall means proxy uses layer-7 proxy advantages without knowledge client client presumes gateway nat layer-3 idea inside packet method layer-3 packets sent layer-7 proxy investigation dns proxy server takes dns queries usually local network forwards internet domain name server may also cache dns records client programs socks-ify allows adaptation networked software connect external networks via certain types proxy servers mostly socks
[ 4104, 5135, 7695, 9233, 3604, 535, 7710, 8224, 3625, 9771, 7729, 2098, 8753, 5178, 3643, 1597, 64, 10816, 2118, 5199, 2139, 3676, 5724, 94, 2661, 4198, 6757, 3688, 1642, 9325, 112, 624, 1653, 4213, 119, 5749, 8316, 3198, 4224, 10368, 52...
Test
4,726
1
Répertoire_International_de_Littérature_Musicale:répertoire international de littérature musicale répertoire international de littérature musicale international repertory music literature internationales repertorium der musikliteratur commonly known acronym rilm nonprofit organization offers digital collections advanced tools locating research topics related music mission “ make knowledge accessible research performance communities worldwide….to include music scholarship countries languages across disciplinary cultural boundaries thereby fostering research arts humanities sciences social sciences. ” central rilm ’ work mission international bibliography scholarship relating facets music research rilm founded 1966 american musicologist barry s. brook 1918–1997 joint sponsorship international musicological society ims international association music libraries archives documentation centres iaml 2007 international council traditional music ictm joined third sponsoring organization 1967 1968 rilm developed first set computer programs automated processing sorting bibliographic records author/subject indexes ran first mainframe ibm computer ibm system/360 computing center city university new york s/360 delivered ibm 1964 time advanced computing machine original ibm s/360 software later migrated ibm system/370 used production rilm abstracts twenty years 1969 1988 rilm ’ development procedures computerized data processing immediately adopted répertoire international de littérature ’ art rila founded upon rilm ’ model started publishing abstracts 1975 1979 rilm entered agreement lockheed research laboratory palo alto division lockheed missiles space company inc. distribution data telephone lines later agreement transferred dialog information retrieval services although available online already advent internet end twentieth century primary medium distribution bibliographic records printed volumes 1993 onward rilm longer available dialog information retrieval service 1989 national information service corporation nisc baltimore released rilm abstracts music literature cd-rom 1990s rilm abstracts became available online nisc muse 1993–2010 oclc first search 1994–2010 ovid/silverplatter 2002–2010 cambridge scientific abstracts/proquest 2002–2010 platforms rilm databases currently exclusively available ebsco information services rilm ’ first editorial office located queens college city university new york 1967–68 graduate center cuny provided institutional context rilm ’ international center since 1968 rilm staff 40 employees editors technology experts administrators governed guided board directors advisory committee commission mixte international consists appointed members international musicological society ims international association music libraries archives documentation centres iaml international council traditional music ictm barry brook ’ second report published march 1968 issue notes details deliberations commission mixte worked establish procedures functioning rilm rilm abstracts music literature rilm abstracts music literature covers significant international scholarship printed digital media language published since august 1967 consists citations articles single-author books collections essays bibliographies catalogues master ’ theses doctoral dissertations festschriften films videos technical drawings instruments facsimile editions iconographies commentaries included critical editions music ethnographic recordings conference proceedings reviews web resources well 3500 periodicals dovetail coverage répertoire international de la presse musicale differs music periodical indexes coverage books abstracts indexing broad international yet selective coverage entry provides title original language english translation title full bibliographic data abstract detailed index help convey “ aboutness ” record amplified online relevance-based order display individual record many non-english entries also include abstract language publication following unesco model rilm abstracts conceived cooperative national committees responsible contributing bibliographic citations abstracts publications issued respective countries international office new york today committees contribute 15,000 records annually edited indexed added online database another 35,000 records per year produced editors international office bibliographic information abstracts—as well journals yet covered rilm—can also submitted directly international center new york rilm abstracts music literature first abstracted bibliography humanities designated american council learned societies acls pilot project development computerized bibliographical system humanities serve model 30 constituent scholarly societies acls time rilm abstracts published print subject thesaurus name equivalencies led users preferred terms translated seventeen languages alphabetically integrated subject index practice allowed users find desired english-language term spelling personal name initiating search language familiar gradually rilm abstracts expanded multilingual environment database includes besides standard english-language abstracts also abstracts language publication languages whenever available mid-2000s rilm abstracts began expand coverage asian publications music scholarship published chinese periodicals concurrently elements bibliographic records publications issued non-roman writing systems offered bilingual rilm abstracts music literature appeared 1967 1983 triannual printed volumes indexes corresponding annual volumes well cumulative indexes corresponding five-year periods 1984 1999 annual volumes corresponding indexes since 2000 available exclusively online ebsco host rilm abstracts music literature full text july 2016 rilm abstracts music literature expanded addition music periodicals full-text rilm abstracts music literature full text raft offers access 240 music periodicals 50 countries coverage also includes reviews well obituaries editorials correspondence advertisements news published early twentieth century present addition metadata abstracts indexing raft offers searching browsing tools full-text issue cover cover database updated monthly details title ’ current coverage found title list rilm.org/fulltext new titles added time rilm music encyclopedias december 2015 rilm launched rilm music encyclopedias rme 41 titles librarian laurie sampsel asserts “ cross searching full text many titles yields results impossible highly unlikely find using print versions encyclopaedias. ” stephen henry mentions rme ’ “ ability provide access excellent european resources might otherwise available libraries less comprehensive collections. ” rme ’ titles stem different periods countries earliest jean jacques rousseau ’ dictionnaire de musique published 1775 also first edition “ grove ” edition published theodore presser 1895 largest amount titles date 2000 onward among ken bloom ’ broadway lol henderson lee stacey ’ encyclopedia music 20 century peter matzke et al. das gothic- und dark wave-lexikon richard kostelanetz ’ dictionary avant-gardes comprehensive conceived 1972 bis 2006 also included rme holds important titles ethnomusicologists among garland encyclopedia world music eileen southern ’ biographical dictionary afro-american african musicians first single comprehensive volume kind collection expands annually additions four titles average one titles regularly updated new articles additions existing articles titles listed rilm music encyclopedias index printed music 1 july 2018 rilm assumed ownership ipm previously owned james adrian music company founded 2000 george r. hill index printed music ipm digital finding aid searching specific musical works contained printed collections sets series indexes individual pieces music printed complete works composers anthologies containing pieces disparate historical periods scholarly editions provides granular level detail piece including performing forces language multiple clefs figured bass ipm includes complete contents collected editions historical series sets monuments music bibliography george r. hill norris l. stephens berkeley fallen leaf press 1997 turn based upon anna h. heyer ’ historical sets collected editions monuments music guide contents american library association 1957–1980 since 2019 ipm offers new features among biographical facts identifying composers editors lyricists hyperlinks open-access editions music incipits works otherwise difficult distinguish easy toggling collections individual works contained therein expanded search filters enable refined searching place date publication document type genre language text bibliolore rilm hosts blog bibliolore whose posts direct relationships content found rilm abstracts music literature enhancement rilm abstracts music literature full text well rilm music encyclopedias mgg online index printed music new posts appear every week many celebrate round birthdays musical figures anniversaries since inception 2009 bibliolore published 1300 posts viewed 500,000 times 1967 1999 rilm published rilm abstracts music literature print first quarterly later annually 1999 volume last print volume largest 19,619 records since 1972 rilm also published print volumes rilm retrospectives series topical bibliographies commenced first edition barry s. brook ’ thematic catalogues music annotated bibliography stuyvesant ny pendragon press 1972 recent volumes published series include speaking music music conferences 1835–1966 2004 annotated bibliography 5948 papers musical topics presented 447 conferences building previous efforts volume stays true brook ’ original vision expanding upon well covers 130 years conference proceedings worldwide scope though western europe remains focus subsequent volume liber amicorum festschriften music scholars nonmusicians 1840–1966 annotated bibliography catalogue 574 festschriften totaling 118 pages 715 entries next part volume totaling 355 pages 3881 entries documents articles pertaining music found listed festschriften preceded introductory history festschriften volumes principally devoted research materials published rilm issued first volume 1967 rilm perspectives series conference proceedings explores topics related organization ’ global mission inaugural volume music ’ intellectual history founders followers fads 2009 based papers presented conference history music historiography held graduate center cuny 16–19 march 2005 rilm issued two editions comprehensive style guide write music rilm manual style second edition introduces material included 2005 publication well revisions based suggestions readers manual differs significantly generalized style guides mla apa explicating matters gender-neutral language dead language punctuation serial comma em dash lens music manual specifically suited students rilm developed stand-alone platform advanced search browse capabilities host distribute music reference works beginning authoritative german-language music encyclopedia die musik geschichte und gegenwart mgg platform facilitates automatic translation content 100 languages via google translate integration user accounts annotations notes created saved shared cross references linking related content throughout mgg online links related content rilm abstracts music literature others well interface compatible mobile tablet devices search function hailed powerful easy-to-use tool different options available limiting search results specific search results easily located preview section mgg online based second edition includes continuous updates revisions additions platform allows user access earlier versions revised articles platform currently developed knowledge exchange
[ 2624, 10508, 4726 ]
Test
4,727
2
DOS_Plus:dos plus dos plus erroneously also known dos+ first operating system developed digital research oem support group newbury berkshire uk first released 1985 dos plus 1.0 based cp/m-86 plus combined pcmode emulator concurrent pc dos 4.11 cp/m-86 plus concurrent dos 4.1 still developed us concurrent pc dos 4.11 internationalized bug-fixed version brought forward digital research uk later dos plus 2.x issues based concurrent pc dos 5.0 instead broader picture dos plus seen intermediate step concurrent cp/m-86 dr dos dos plus able run programs written either cp/m-86 ms-dos 2.11 read write floppy formats used systems four cp/m-86 programs multitasked one dos program run time dos plus attempts present command-line interface ms-dos like ms-dos command-line interpreter called codice_1 alternative name codice_2 codice_3 file codice_4 except fiddload extension load field-installable device drivers fidd versions dos plus 2.1 major difference user notice bottom line screen contains status information similar left-hand side status bar shows running processes leftmost one visible screen others running background right-hand side shows keyboard layout use uk8 example printer port assignment keyboard caps lock num lock status current time dos program running status line shown dos programs run background keyboard layout use changed pressing ctrl alt one function keys f1-f5 dos plus contains number extra commands support multitasking features also contains subsets standard dos commands cp/m commands – example built-in codice_5 command codice_6 utility copy files codice_7 command assign one three drives n p directory different drive similar manner ms-dos command codice_8 example cause directory codice_9 appear drive n so-called floating drive feature allows old programs n't support subdirectories work dos plus used make file handling command prompt much easier feature also present concurrent dos multiuser dos system manager 7 real/32 however systems extent concept unused drive letters z except drive letter l dr dos 3.31 6.0 november 1992 updates bdos 6.7 also support including drive letter l later systems 4dos/ndos command processor supports features well floating drives implemented bdos kernel command line shell thus feature also used within dos applications entering directory paths long application parse split dirspec processing using similar feature concurrent dos multiuser dos system manager real/32 dynamically assign floating drive l load path loaded application thereby allowing applications refer files residing load directory standardized drive letter instead fixed absolute path load drive feature makes much easier move software installations across disks without adapt paths overlays configuration files user data stored load directory subsequent directories similar reasons appendage environment block associated loaded applications ms-dos/pc dos 3.0 higher contains reference load path executable however consumes resident memory take advantage support must coded executable whereas dri solutions transparently works kind application another feature resulting bdos internal organization current working directories relative links parent directories theoretically unlimited directory depth supported mentioned operating systems – contrast ms-dos/pc dos dr dos since 1992 ms-dos compatible internal data structure named current directory structure cds limits directory depths maximum 66 characters features attributed fact cp/m concept subdirectories dos emulated operating systems directories translated internal cp/m structures intelligent way dos plus boots single file called either dosplus.sys netplus.sys rather io.sys msdos.sys combination ms-dos file cp/m-86 cmd format structured internally number modules dos plus main operating system rom philips originally developed pc compatible versions supplied amstrad pc1512 t.r.a.n yasmin turbo non-ibm pc compatible bbc master 512 came dos plus 1.2 1.2a 2.1 successor solidisk pc plus also came variant dos plus 1.2a 2.1 dos plus 2.1e/g adaptations apricot act series non-standard 315 kb 720 kb fat12 floppy formats logical sectored fat hard disk format partition type 0xf2 sperry pcs 80186 co-processor boards acorn archimedes a300 a310 well acorn 286 prototypes supported well known operating system versions include
[ 3091, 6675, 7187, 10776, 25, 4637, 9762, 5158, 7217, 9784, 10809, 576, 10333, 97, 5220, 8298, 8301, 2672, 9329, 7285, 9335, 2168, 6778, 1147, 3197, 1150, 2179, 10883, 6797, 3216, 9363, 9366, 6296, 2201, 7325, 9887, 7847, 2729, 7849, 3248,...
None
4,728
8
Gecko_(software):gecko software gecko browser engine developed mozilla used firefox browser thunderbird email client many projects gecko designed support open internet standards used different applications display web pages cases application user interface rendering xul gecko offers rich programming api makes suitable wide variety roles internet-enabled applications web browsers content presentation client/server gecko written c++ javascript since 2016 additionally rust free open-source software subject terms mozilla public license version 2 mozilla officially supports use android linux macos windows development layout engine known gecko began netscape 1997 following company purchase digitalstyle existing netscape rendering engine originally written netscape navigator 1.0 upgraded years slow comply well w3c standards limited support dynamic html lacked features incremental reflow layout engine rearranges elements screen new data downloaded added page new layout engine developed parallel old intention integrate netscape communicator mature stable least one major revision netscape expected released old layout engine switch launch mozilla project early 1998 new layout engine code released open-source license originally unveiled raptor name changed nglayout next generation layout due trademark problems netscape later rebranded nglayout gecko mozilla organization forerunner mozilla foundation initially continued use nglayout name gecko netscape trademark eventually gecko branding october 1998 netscape announced next browser would use gecko still called nglayout time rather old layout engine requiring large parts application rewritten decision popular web standards advocates largely unpopular netscape developers unhappy six months given rewrite also meant work done netscape communicator 5.0 including development mariner improvements old layout engine abandoned netscape 6 first netscape release incorporate gecko released november 2000 name netscape 5 never used gecko development continued applications embedders began make use america online time netscape parent company eventually adopted use compuserve 7.0 aol mac os x products previously embedded internet explorer however exception betas gecko never used main microsoft windows aol client july 15 2003 aol laid remaining gecko developers mozilla foundation formed day became main steward gecko development today gecko developed employees mozilla corporation employees companies contribute mozilla project volunteers outset gecko designed support open internet standards standards gecko supports include gecko also partially supports svg 1.1 svg font color profile animation view cursor modules yet implemented filter text modules partially implemented extensibility module also implemented currently disabled order support web pages designed legacy versions netscape internet explorer gecko supports doctype switching documents modern doctype rendered standards compliance mode follows w3c standards strictly documents doctype older doctype rendered quirks mode emulates non-standard oddities netscape communicator 4.x however 4.x features layers supported gecko also limited support non-standard internet explorer features marquee element codice_1 property though pages explicitly testing codice_1 told supported gecko primarily used web browsers earliest netscape 6 mozilla suite later renamed seamonkey also used mozilla web browser derivatives firefox firefox mobile implementation internet explorer-clone part wine mozilla also uses thunderbird email-client web browsers using gecko include gnu icecat waterfox k-meleon lunascape portable firefox conkeror classilla tenfourfox products using gecko include nightingale instantbird google picture-organization software picasa linux gecko also used sugar olpc xo-1 computer gecko used complete implementation xul xml user interface language gecko currently defines xul specification products historically used gecko include pale moon currently using goanna songbird epiphany known gnome web gnome devhelp replaced gecko webkitgtk sunbird calendar web browsers including swiftfox flock galeon camino minimo beonex communicator kazehakase microb windows platforms gecko depends proprietary compilers thus foss distributions linux include gecko package used windows compatibility layer wine gecko 2.0 version number bumped 5.0 match firefox 5 kept sync major version number firefox thunderbird reflect fact longer separate component netscape era combination poor technical management decisions resulted gecko software bloat thus 2001 apple chose fork khtml gecko create webkit engine safari browser however 2008 mozilla addressed bloat problems resulting big performance improvements gecko october 2016 mozilla announced quantum ongoing project encompassing several software development efforts build next-generation web engine firefox users includes numerous improvements gecko taken experimental servo project firefox 57 also known firefox quantum first shipping november 2017 initial version major components quantum/servo projects enabled include increased performance css gpu rendering components additional components merged servo gecko incrementally future versions quantum mozilla project encompassing several software development efforts build next-generation web engine firefox users includes numerous improvements gecko largely incorporated experimental servo project quantum also includes refinements user interface interactions firefox 57 released november 2017 initial version servo component enabled mozilla dubs several planned future releases firefox quantum 2013 mozilla began experimental servo project engine designed scratch goals improving concurrency parallelism also reducing memory safety vulnerabilities important factor writing servo rust programming language also created mozilla designed generate compiled code better memory safety concurrency parallelism compiled c++ code april 2016 servo needed least several years development become full-featured browser engine thus decision start quantum project bring stable portions servo firefox quantum project composed several sub-projects
[ 513, 6657, 9736, 2579, 6171, 9757, 7713, 10791, 9770, 5677, 559, 4661, 3639, 10808, 3643, 2108, 9275, 64, 9281, 5707, 10834, 6231, 8281, 6747, 4189, 1632, 1642, 9834, 10860, 9841, 115, 9843, 637, 1664, 2182, 6791, 6797, 8854, 11418, 10910...
None
4,729
5
Simple_Protocol_for_Independent_Computing_Environments:simple protocol independent computing environments computing spice simple protocol independent computing environments remote-display system built virtual environments allows users view computing desktop environment – computer-server machine also anywhere internet – using wide variety machine architectures qumranet originally developed spice using closed-source codebase 2007 red hat inc acquired qumranet 2008 december 2009 released code open-source license made protocol open standard spice client connection remote desktop server consists multiple data channels run separate tcp unix socket connection data channel designated operate either clear-text tls modes allowing administrator tradeoff security level vs performance tls mode provides strong encryption traffic transmitted data channel addition encryption spice protocol allows choice authentication schemes original spice protocol defined ticket based authentication scheme using shared secret server would generate rsa public/private keypair send public key client client would encrypt ticket password public key send result back server would decrypt verify ticket current spice protocol also allows use sasl authentication protocol thus enabling support wide range admin configurable authentication mechanisms particular kerberos one server implementation exists several programmers developed new implementations spice client-side since open-sourcing spice spice protocol originated provide improved remote desktop capabilities fork kvm codebase
[ 10242, 771, 3847, 649, 9353, 9868, 6797, 1553, 3218, 9365, 10005, 11413, 5402, 5531, 3742, 2974, 10271, 9380, 2085, 9381, 3751, 3752, 10924, 7983, 562, 2996, 9909, 823, 10747, 10171, 10172, 3133, 3006, 4797, 5181, 5437, 7364, 2887, 8520, ...
None
4,730
3
Philips_VG-8020:philips vg-8020 vg 8020 philips third msx 1 computer vg8000 even printer port vg8010 computers version real keyboard chiclet keyboard like predecessors vg-8020 released 1984 featured zilog z80a microprocessor clocked 3.56 mhz 64kb ram 16kb vram two cartridge slots
[ 9006 ]
None
4,731
2
Chess_Titans:chess titans chess titans chess game 3d graphics developed oberon games included windows vista windows 7 home premium business/professional enterprise ultimate fully animated photorealistic interactive game ten difficulty levels played two participants one player computer game publicly introduced windows vista build 5219 another chess program known simply chess bundled microsoft entertainment pack 4 developed david norris former microsoft employee author chess engine ziggurat game fully animated designed windows aero glass-like view game features photorealistic board rotated 3d themes available chess pieces board showcases 3d capabilities vista game played either mouse keyboard gamepad controller windows also played windows media center using remote control provided tv tuner cards certain laptops well player turn chess titans displays last move made opponent player also click chess piece highlight valid moves piece features turned options dialog box chess titans ten difficulty levels selected options dialog box player also choose whether play black white playing computer first time player prompted choose initial difficulty level beginner level 2 intermediate level 5 advanced level 8 chess titans keeps record many games player drawn lost computer difficulty level two-player game chess board automatically turns 180 degrees opposite player move option turned chess titans saves two-player game scores
[ 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 10839, 603, 9819, 3170, 622, 9839, 4210, 7796, 1656, 6265, 7290, 10879, 8841, 6797, 2193, 9874, 10900, ...
Validation
4,732
4
Phorm:phorm phorm formerly known 121media digital technology company known contextual advertising software phorm incorporated delaware united states relocated singapore phorm corporation singapore ltd 2012 founded 2002 company originally distributed programs considered spyware made millions dollars revenue stopped distributing programs complaints groups united states canada announced talking several united kingdom internet service providers isps deliver targeted advertising based websites users visited phorm partnered isps oi telefonica brazil romtelecom romania ttnet turkey june 2012 phorm made unsuccessful attempt raise £20 million 20 stake chinese subsidiary company proposed advertising system called webwise behavioral targeting service similar nebuad used deep packet inspection examine traffic phorm said data collected would anonymous would used identify users service would include protection phishing fraudulent collection users personal information nonetheless world wide web creator tim berners-lee others spoke phorm tracking users browsing habits isp bt group criticised running secret trials service uk information commissioner office voiced legal concerns webwise said would legal opt-in service opt-out system european commission called uk protect web users privacy opened infringement proceeding country regard isps use phorm groups including amazon.com wikimedia foundation non-profit organization operates collaborative wiki projects requested opt-out websites scans system phorm changed opt-in policy according phorm ’ website company would collect data users explicitly opted services users provide separate consent web browsing device used phorm ceased trading 14 april 2016 previous incarnation 121media company made products described spyware register 121media distributed program called peopleonpage classified spyware f-secure peopleonpage application built around advertising engine called contextplus contextplus also distributed rootkit called apropos used tricks prevent user removing application sent information back central servers regarding user browsing habits center democracy technology u.s.-based advocacy group filed complaint u.s. federal trade commission november 2005 distribution considered spyware including contextplus stated investigated uncovered deceptive unfair behaviour complaint filed concert canadian internet policy public internet center group filing similar complaint integrated search technologies canadian authorities contextplus shut operations may 2006 stated longer able ensure highest standards quality customer care shutdown came several major lawsuits adware vendors launched september 2007 121media become known phorm admitted company history adware stated closed multimillion-dollar revenue stream peopleonpage toolbar citing consumers ’ identification adware spyware primary cause decision early 2008 phorm admitted editing article wikipedia—removing quotation guardian commercial executives describing opposition towards tracking system deleting passage explaining bt admitted misleading customers covert phorm trials 2007 changes quickly noticed reversed online encyclopedia editors phorm currently resides mortimer street london uk staffing levels around 35 trading phorm shares suspended london aim market 24 february 2016 pending clarification company financial position according phorm unable secure requisite equity funding ... advanced discussions certain shareholders parties regarding possible alternative financing ... guarantee discussions would result funds raised pending conclusion discussions company requested suspension shares trading aim company made loss 32.1 million 2007 loss 49.8 million 2008 loss 29.7 million 2009 2010 means better net loss 27.9 million end 2010 company lost 107 million perceivable revenue stream 2011 phorm reported losses 30.5 million conducted equity placing £33.6 million paid company debt 14 april 2016 phorm board directors announced london stock exchange company ceasing trade shareholders unlikely recover investments according rns number 2561y ftse 13 may 2016 changes ftse uk index series ftse aim all-share index effective start trading 18 may 2016 phorm worked major u.s. british isps—including bt group formerly british telecom virgin media talktalk time owned carphone warehouse —on behavioral targeting advertisement service monitor browsing habits serve relevant advertisements end user phorm say deals would given access surfing habits 70 british households broadband service uses deep packet inspection check content requested web pages compared nebuad front porch service would marketed end-users webwise 2009 bbc took legal advice trade mark webwise would work categorising user interests matching advertisers wish target type user browse 're able categorise internet actions said phorm coo virasb vahidi actually see entire internet company said data collected would completely anonymous phorm would never aware identity user browsed adds phorm advertising categories exclude sensitive terms widely drawn reveal identity user monitoring users browsing phorm even says able offer protection online fraud phishing phorm formerly maintained opt-out policy services however according spokesman phorm way opt-out works means contents websites visited still mirrored system computers users http applications used user computer need configured supplemented add ons opt since declared information commissioner office phorm would legal uk law opt-in service richard clayton cambridge university security researcher attended on-the-record meeting phorm published account advertising system implemented phorm system like many websites uses http cookies small pieces text store user settings company said initial web request redirected three times using http 307 responses within system inspect cookies determine user opted system sets unique phorm tracking identifier uid user collects already exists adds cookie forged appear come requested website analysis titled stealing phorm cookies clayton wrote phorm system stores tracking cookie website visited user pc contains identical copy user uid possible phorm system strips tracking cookies http requests forwarded across internet website server prevent uid sent websites using https would allow websites associate uid details website collects visitor phorm senior vice president technology marc burgess said collected information also includes timestamp burgess said enough information accurately target ad future used find b browsed 2008 phorm considered offering incentive addition phishing protection originally planned means convince end-users opt webwise system alternate incentives suggested toluna.com market research survey carried behalf phorm included phishing protection donation charity free technical support line one pound opted-in users monthly broadband subscriptions following decision wikimedia foundation amazon opt websites profiled phorm webwise system incentive websites remain opted phorm profiling system phorm launched webwise discover korean launch web publisher incentive announced press conference covent garden london 3 june 2009 survey polling firm populus revealed watching demonstration video 66 2,075 individuals polled claimed either like idea like lot website publishers invited upload web widget provide small frame display recommended web links based tracked interests phorm-tracked website visitors whose isp uses phorm deep packet inspection intercept profile web traffic would charge website phorm stand make money webwise discover however plans display targeted adverts future widget would deliver link recommendations user signed targeted advertising phorm-affiliated isp widget would invisible everyone else.. press launch phorm spokespersons admitted present single uk isp website yet signed webwise discover system although emphasised part current korea telecom webwise trials legal advice offered websites considering signing oix system susan singleton open rights group org raised questions phorm legality asked clarification service would work fipr argued phorm online advert system illegal uk nicholas bohm general counsel fipr said need parties consent interception order lawful extremely basic principle within legislation lightly ignored treated technicality open letter information commissioner published fipr web site conservative peer lord northesk questioned whether uk government taking action targeted advertising service offered phorm light questions legality data protection regulation investigatory powers acts 9 april 2008 information commissioner office ruled phorm would legal uk law opt-in service office stated closely monitor testing implementation phorm order ensure data protection laws observed uk home office indicated phorm proposed service legal users give explicit consent office became subject controversy emails phorm released emails showed company edited draft legal interpretation office official responded agree becomes position think clients prospective partners comforted liberal democrat spokeswoman home affairs baroness sue miller considered act collusion fact home office asks company worried actually falling outside laws whether draft interpretation law correct completely bizarre register reported may 2008 phorm logo strongly resembled unrelated uk company called phorm design quoted smaller company owner simon griffiths 've solicitors look say 'd go court phorm obviously big player lot clout 'm small design agency sheffield employs three people 21 september 2010 phorm webwise service also shared name bbc webwise monitoring phorm website using website change detection service alerted interested parties changes 21 september 2010 phorm website edited remove references word 'webwise phorm webwise product become 'phormdiscover office harmonization internal market ohim trade marks designs registration office european union website ctm-online database lists phorm application use 'webwise trade mark name british broadcasting corporation listed opponent grounds 'likelihood confusion city london-based legal firm bristows wrote ohim 22 september 2010 withdrawing bbc opposition saying british broadcasting corporation instructed us request withdrawal opposition b11538985 28 october 2010 bt removed webwise pages company website although 12 november 2010 pages finally confirmed removed forum contributors campaign group called nodpi.org virgin media removed phorm webwise faqs customer-news section european union communications commissioner viviane reding said commission concerned phorm breaching consumer privacy directives called uk government take action protect consumers privacy european commission wrote uk government 30 june 2008 set context eu interest controversy asked detailed questions ahead possible commission intervention required uk respond letter one month sent spokeswoman department business enterprise regulatory reform berr admitted 16 august uk met deadline 16 september berr refused register request release full text reply european commission released statement effect uk authorities consider phorm products capable operated lawful appropriate transparent fashion unsatisfied response european commission wrote uk 6 october martin selmayr spokesman reding information society media directorate-general said us matter finished quite contrary uk government responded november commission sent another letter government january 2009 third letter sent commission satisfied explanations implementation european law context phorm case selmayr quoted register saying european commission investigation regard phorm case still ongoing went say commission may proceed formal action uk authorities provide satisfactory response commission concerns 14 april european commission said opened infringement proceeding united kingdom regarding isps use phorm day response news item register regarding european commission preparations sue uk government phorm said technology fully compliant uk legislation relevant eu directives confirmed berr uk regulatory authorities note suggestion contrary commission statement today however berr denied confirmation responded freedom information foi request also made day january 2012 eu dropped case uk government initial reaction proposed service highlighted deep concerns regards individual privacy property rights data phorm defended technology face called misinformation bloggers claiming threatens users privacy security firms classify phorm targeting cookies adware kaspersky lab whose anti-virus engine licensed many security vendors said would detect cookie adware trend micro said high chance would add detection tracking cookies adware pc tools echoed trend concerns privacy security urging phorm apply opt-in approach specialist anti-spyware firm sunbelt software also expressed concerns saying phorm tracking cookies candidates detection anti-spyware software ross anderson professor security engineering cambridge university said message care privacy use bt virgin talk-talk internet provider added historically anonymising technology never worked even stressed still posed huge privacy issues phorm engaged number public relations advisers including freuds citigate dewe rogerson ex-house commons media adviser john stonborough attempt save reputation engaged audiences via moderated online webchats creator world wide web sir tim berners-lee criticised idea tracking browsing history saying mine ca n't want use something negotiate agree understand 'm getting return also said would change isp introduced phorm system director world wide web consortium berners-lee also published set personal design notes titled snooping explains views commercial use packet inspection references phorm simon davies privacy advocate founding member privacy international said behavioural advertising rather spooky concept many people separate role 80/20 thinking consultancy start-up engaged phorm look system said impressed effort put minimising collection personal information subsequently quoted saying privacy international endorse phorm though applaud number developments process system appear mitigate number core privacy problems profiling retention tracking ... wo n't pi support system works opt-out basis kent ertugrul later said made mistake suggested privacy international endorsed phorm confusion apologise endorsement fact simon davies md 80 20 also director privacy international ertugrul set website called stopphoulplay.com reaction phorm critics alexander hanff marcus williamson ertugrul called hanff serial agitator run campaigns phorm companies procter gamble says williamson trying disgrace ertugrul phorm serial letter writing hanff believes stopphoulplay website statements completely irrelevant campaign backfire ertugrul williamson laments phorm stooped personal smears launched 28 april 2009 stopphoulplay.com discussed petition uk prime minister downing street website originally launched web page claimed website managers 10 downing street recognised mistake allowing misleading petition appear site since provided assurances phorm permit happen day freedom information foi act used request confirmation claim phorm 29 april phorm removed quoted text website replaced nothing prime minister office replied foi request 28 may stating held information relation request concerning phorm claim day site launch bbc correspondent darren waters wrote battle sign ceasefire sides nowiki phorm anti-phorm campaigners /nowiki settling war attrition governments uk eu drawn crossfire site closed september 2009 redirects main phorm site initial denials bt group confirmed ran small scale trial one exchange prototype advertising platform 2007 trial involved tens thousands end users bt customers able opt trial—bt said developing improved non-cookie based opt-out phorm—but decision made post-trial approach register reported bt ran earlier secret trial 2006 intercepted profiled web browsing 18,000 broadband customers technical report states customers participated trial made aware profiling one aims validation affect experience 4 june 2008 copy 52-page report allegedly inside bt titled pagesense external technical validation uploaded wikileaks report angered many members public questions regarding involvement charity ads oxfam make trade fair sos children villages whether made aware ads used many feel highly illegal technical trials fipr nicholas bohm said trials online ad system carried bt involving 30,000 customers potentially illegal bt third trial phorm webwise system repeatedly slipped trial last approximately two weeks 10,000 subscribers originally due start march 2008 pushed april end may yet occur company facing legal action trials phorm carried without user consent 2 september 2008 investigating complaint made anti-phorm protestors city london police met bt representatives informally question secret phorm trials 25 september police announced formal investigation bt secret trials phorm 2006 2007 according alex hanff police said criminal intent behalf bt implied consent service going benefit customers bohm said police response 29 september 2008 announced bt support forum trial phorm webwise system would commence following day bt press officer adam liversage stated bt still working network-level opt-out offered trial opted-out traffic pass webwise system mirrored profiled final full roll-out webwise across bt national network necessarily depend completion work either open rights group urged bt customers participate bt webwise trials saying anti-fraud feature unlikely advantages features already built web browsers subscribers bt forums used beta forums criticise raise concerns bt implementation phorm bt responded statement according kent ertugrul bt would completed rollout software end 2009 wall street journal however reported july 2009 bt plans concentrating opportunities phorm share price fell 40 news 6 july 2009 bt former chief press officer adam liversage described thoughts using twitter year intensive personal-reputation-destroying pr trench warfare comes nothing ended comment phantastic october 2009 sergeant mike reed city london police answered freedom information foi request confirmed crime reference number 5253/08 response stated originally passing case papers crown prosecution service cps december 2008 police asked provide evidence cps october 2009 asked disclose date investigation reopened said instruction cps october 2009 sergeant reed response named officer charge d/s murray 25 february 2010 reported cps continued work potential criminal case bt secret trials phorm system prosecutors considered whether press criminal charges unnamed individuals part regulation investigatory powers act april 2011 cps decided prosecute would public interest stating neither phorm bt acted bad faith penalty imposed would nominal april 2012 reports said officer city london police taken lunch phorm police spokesperson quoted saying aware allegation formal complaint received force reviewing information available deciding best course action spokesperson also highlighted city london police involved investigation bt phorm decision investigate prompted cps advice advertisers initially expressed interest phorm include financial times guardian universal mccann myspace ivillage mgm omd virgin media unanimis guardian withdrawn targeted advertising deal phorm email reader advertising manager simon kilby stated true conversations phorm regarding services concluded time want part network decision small part conversations internally product sits values company response article published register 26 march 2008 phorm stated myspace joined oix publisher financial times decided participate phorm impending trial org jim killock said many businesses think commercial data relationships simply private customers decide might even believe data spied upon form industrial espionage david evans british computer society questioned whether act publishing website net giving consent advertisers make use site content monitor site interactions customers pete john created add called dephormation servers web users opt remain opted-out system however john ultimately recommends users switch phorm-equipped internet providers dephormation solution fig leaf privacy rely dephormation protect privacy security need find new isp april 2009 amazon.com announced would allow phorm scan domains wikimedia foundation also requested opt-out scans took necessary steps block wikimedia wikipedia domains processed phorm system 16th month july 2009 nationwide building society confirmed would prevent phorm scanning website order protect privacy customers metrofi american municipal wireless network provider linked phorm ceased operations 2008 three isps linked phorm changed clarified plans since first signing company response customer concerns talktalk said implementation would opt-in opposed bt opt-out n't opt traffic split avoid contact webwise phorm server july 2009 company confirmed would implement phorm charles dunstone boss parent company told times going phorm bt whole industry interested enough business news magazine new media age reported 23 april virgin media moved away phorm expected sign deal another company named audience science bt would meet advertising companies gain isp calls general market intelligence phorm nma called moves shift strategy two media companies day later magazine said companies relationships phorm actually remain unchanged although virgin media reported moved away phorm november 2010 uk-based isp still carry information phorm webwise system website addition phorm partners international isps oi telefónica brazil ttnet-türk telekom turkey romtelecom romania phorm announced beginning market trial south korea via london stock exchange regulatory news service rns 30 march 2009 subsequently announced via rns 21 may 2009 commenced trial 8 july 2009 phorm indicated trials proceeding expected notice 2009 interim report accounts published 14 september 2009 phorm stated nearing completion substantial market trial launched may kt largest isp south korea existence trial south korea publicised ohmynews 2 september 2009 9 september 2009 ohmynews announced trial shut 26 march 2010 phorm announced plans commercial deployment brazil may 2012 brazilian internet steering committee issued resolution recommending use phorm products internet service providers country citing privacy risks concerns phorm products would degrade quality internet services respect proposed partnership telemar known oi claim ig web portal 5 penetration market phorm clear r 400 million last year since launching ttnet subsidiary türk telecom group turkey 2012 phorm launched platform five additional isps accordingly global basis 20 million daily users phorm platform according rns number 3504c 16 january 2015 phorm moved remote cookie option whilst scaling back operations turkey phorm announced 3 october 2013 launched operationally china commenced nationwide opt-in process company announced commenced commercial operations china serving advertisements paid basis privacy concerns china hong kong growing significant developments privacy regulation could impact phorm operations mainland hong kong may 2012 mainland china passed new regulations implement measures protecting consumer privacy commercial exploitation privacy legislation arrived april 2013 publication two draft rules ministry industry information technology provisions protection personal information telecommunications provisions telecommunications internet users internet users provisions registration true identity information phone users provisions phone users along draft amendments 1993 law consumer rights laws emerging e-commerce china becomes increasingly significant part chinese economy new regulations include provisions regulating data collection smart devices discussed article published international association privacy professionals privacy tracker blog called making sense china new privacy laws hong kong office privacy commissioner personal data pcpd taken robust approach protection consumer privacy seek enforce provisions personal data privacy amendment ordinance 2012 amendment ordinance came force april 2013
[ 7809, 9537, 8807, 5133, 877, 124, 10417, 119, 10392, 3452, 7965, 7710, 9791 ]
None
4,733
4
Inter-protocol_exploitation:inter-protocol exploitation inter-protocol exploitation class security vulnerabilities takes advantage interactions two communication protocols example protocols used internet commonly discussed context hypertext transfer protocol http attack uses potential two different protocols meaningfully communicating commands data popularized 2007 publicly described research year general class attacks refers known since least 1994 see security considerations section rfc 1738 internet protocol implementations allow possibility encapsulating exploit code compromise remote program uses different protocol inter-protocol exploitation utilize inter-protocol communication establish preconditions launching inter-protocol exploit example process could negotiate initial authentication communication vulnerability password parsing inter-protocol exploitation one protocol attacks service running different protocol legacy problem specifications protocols take consideration attack type two protocols involved vulnerability termed carrier target carrier encapsulates commands and/or data target protocol used communication intended victim service inter-protocol communication successful carrier protocol encapsulate commands and/or data sufficiently meaningfully communicate target service two preconditions need met successful communication across protocols encapsulation error tolerance carrier protocol must encapsulate data commands manner target protocol understand highly likely resulting data stream induce parsing errors target protocol target protocol must sufficiently forgiving errors inter-protocol connection likely percentage communication invalid cause errors meet precondition target protocol implementation must continue processing despite errors one major points concern potential attack vector reach firewalls dmzs inter-protocol exploits transmitted http launched web browsers internal subnet important point web browser exploited conventional means javascript delivered http communicating irc protocol known examples vulnerability also demonstrated files constructed valid html code bmp image time
[ 5636, 8998, 3473, 3956, 5399, 4797 ]
None
4,734
3
User-mode_Linux:user-mode linux user-mode linux uml enables multiple virtual linux kernel-based operating systems known guests run application within normal linux system known host guest normal application running process user space approach provides user way running multiple virtual linux machines single piece hardware offering isolation generally without affecting host environment configuration stability numerous things become possible use uml one run network services uml environment remain totally sequestered main linux system uml environment runs administrators use uml set honeypots allow one test security one computers network uml serve test debug new software without adversely affecting host system uml also used teaching research providing realistic linux networked environment high degree safety uml environments host guest kernel versions n't need match entirely possible test bleeding edge version linux user-mode system running much older kernel uml also allows kernel debugging performed one machine kernel debugging tools kgdb require two machines connected null modem cable web hosting providers offer uml-powered virtual servers lower prices true dedicated servers customer root access appears system reality one physical computer shared many people libguestfs supported uml backend since version 1.24 alternative using qemu kvm uml guest application linux binary elf originally available patch kernel versions 2.2.x host kernel version 2.2.x supported easily thread mode i.e. non-skas3 linux 2.6.0 integrated main kernel source tree method running separate kernel address space skas require host kernel patching implemented improves performance security old traced thread approach processes running uml share address space host point view leads memory inside uml protected memory management unit unlike current uml using skas buggy malicious software inside uml running non-skas host could able read memory space uml processes even uml kernel memory user-mode linux generally considered lower performance competing technologies xen openvz future work adding support x86 virtualization uml may reduce disadvantage often cited strength xen competing technology support thread-local storage tls also supported latest uml kernels xen concentrates virtualizing whole machine thus systems running xen machine really virtual machines uml host machine virtualized way guest systems true virtual machines allows uml guest direct access host filesystems hardware common map host directory e.g /uml/root → uml originally designed x86 instruction set also ported others including ia-64 powerpc
[ 4616, 3082, 5139, 10780, 10785, 6180, 9256, 8242, 9266, 4161, 8772, 6213, 8268, 589, 593, 4695, 10851, 6244, 5222, 10856, 4207, 5244, 11391, 7812, 7821, 4238, 10382, 2195, 2711, 6808, 9882, 1694, 2723, 8364, 10933, 5815, 5822, 5824, 1736, ...
None
4,735
2
Bob_O'Rear:bob o'rear robert bob o'rear former employee microsoft among group eleven early microsoft employees posed iconic company photo taken albuquerque 1978 texan degrees mathematics physics left microsoft 1993 reportedly owns cattle ranch texas net worth reported 100 million o'rear born wellington texas brought perryton rural town 3,500 people texas panhandle grandparents sharecroppers cotton farm o'rear planned physical education teacher later ended graduating university texas el paso bachelor degree mathematics went graduate school university texas austin study mathematics astrophysics 1966 trw redondo beach hired o'rear work air force spy satellite programs also wrote programs optimized trajectory minuteman missiles cold war later 1960s went work nasa helped write program determined trajectory apollo command module reentered earth atmosphere nasa command center neil armstrong landed moon later 1970s o'rear friend trw days founded company called texametrics made automated machinery manufacturing polyurethane bottle caps o'rear worked program analyzed patterns correctly manufactured caps caused incorrectly manufactured parts ejected time o'rear worked hardware software helped later joined microsoft o'rear first joined microsoft 1977 became seventh employee went work company chief mathematician project manager learned programs put together also reworked math code success ms-dos ibm pc o'rear became director international sales marketing microsoft entered agreement seattle computer products acquire marketing rights 86-dos built work intel 8086 would work ibm pc intel 8088 since chips binary compatible work began soon first prototype ibm pc received thanksgiving 1980 o'rear assigned project lead sole programmer despite difficulties hardware software communication delays ibm o'rear produced pc dos v1.0 august 1981 boot sector pc dos v1.0 floppy disk even bears name instead 'microsoft inc text subsequent versions success ms-dos ibm branding pc dos made microsoft fortune 500 company o'rear retired microsoft 1993 o'rear started ranch texas panhandle grew brother o'rear provides financing business structure brother runs operates ranch spends time family pursues hobbies including golf racquetball skiing o'rear also director several boards local businesses invests real estate development retirement joined advisory council college natural sciences university texas el paso alma mater keeps working relationship university microsoft encouraging recruit students university
[ 6148, 2055, 8301, 9166, 8115, 9907, 2811 ]
None
4,736
1
Valid_time:valid time temporal databases valid time vt time period database fact valid modeled reality december 2011 iso/iec 9075 database language part 2 sql/foundation included clauses table definitions define application-time period tables valid-time tables valid time coined richard t. snodgrass doctoral student database table valid time often represented two extra table-columns startvt endvt time interval closed lower bound open upper bound example valid time time fact true real world example person table gets two extra fields valid-from valid-to specifying person address valid real world april 4 1975 john father proudly registered son birth official insert new entry database stating john lives smallville april 3rd notice although data inserted 4th database states information valid since 3rd official yet know john ever move better place database valid-to filled infinity ∞ resulting entry database december 27 1994 john reports new address bigtown living since august 26 1994 bigtown official change address current entry john doe database adds new one original entry person john doe smallville 3-apr-1975 ∞ updated removed since known john stopped living smallville august 26 1994 valid-to entry filled database contains two entries john doe john dies database updated current entry updated stating john live bigtown longer new entry added officials never report heaven new address database looks like
[ 2512, 4738 ]
Test
4,737
4
Installer.app:installer.app installer.app freeware software installer iphone created nullriver later maintained ripdev first released summer 2007 maintained summer 2009 installer allowed users install third-party applications iphone applications directory native applications kept users could install applications variety sources wi-fi umts provided software developers directly onto iphone without requiring computer users could browse lists applications inside installer find ones wanted install june 2009 ripdev dropped support installer favor developing different package manager installer named icy 2.0 firmware released framework changes present applications compiled iphone os 1.2 longer able run 2.0 therefore installer 3 n't available 2.0 vast majority users switched cydia time ripdev russian iphone development took installer project started developing installer 4.0 installer 4.0 finished added quickpwn software payload installer 4.0 gain much popularity installer 3.0 jailbreak users become accustomed using cydia may 2011 team developers called infini-dev recreated installer 4 could run ios 4 although main current repositories compatible cydia longer compatible installer ripdev put old installer repo back online since infini-dev released installer also repos like greek-iphone offer date packages installer slava karpenko announced project work installer 5 slava karpenko revealed infini dev project dropped infini-dev took moved project apptapp team name currently working installer 5 developers working project release date tbd although public beta released july 3 2019
[ 9732, 10470, 6537, 811, 5356, 5067, 7983, 7420, 4957 ]
Test
4,738
1
Transaction_time:transaction time temporal databases transaction time tt time fact stored database considered true december 2011 iso/iec 9075 database language part 2 sql/foundation included clauses table definitions define system-versioned tables transaction-time tables database table transaction interval often represented interval allowing system remove entries using two table-columns starttt endtt time interval closed lower bound open upper bound ending transaction time unknown may considered changed academic researchers rdbms represented changed largest timestamp supported keyword forever convention technically precise term coined richard t. snodgrass doctoral student
[ 2512, 4736 ]
Test
4,739
3
Xain'd_Sleena:xain 'd sleena main character xain galactic bounty-hunter must defeat evil forces oppress five different planets player select order play various planets 'official sequence play u.s. version game released 'solar warrior version goes set sequence instead choose planets planet played right horizontal vertical scrolling shooting enemies dodging natural hazards xain crouch double crouch prone jump double jump planets player need kill sub-boss resume certain enemies carry powerup changes default laser gun different weapon different weapons cycled powerups include laser-grenade gun 2-way gun spreadfire gun strong bullet gun respective damage directional firing capabilities end planet player goes battle boss defeated player plants bomb boss base ten seconds escape starship next half planet stage interlude stage player must battle waves enemy ships heading next planet three planets battle asteroid field giant mothership five planets liberated player play longer final stage gigantic metallic fortress facing bosses previously met five planets fighting bosses stage optional halfway stage player plants bomb fortress core 60 seconds reach exit hangar jump starship giving commodore 64 port score 499 points ace compared game firebird game crosswize.. games machine gave atari st commodore 64 zx spectrum ports scores 70 77 86 respectively
[ 1776, 9006 ]
Train
4,740
9
SOAP_with_Attachments_API_for_Java:soap attachments api java soap attachments api java saaj provides standard way send xml documents internet java platform saaj enables developers produce consume messages conforming soap 1.1 1.2 specifications soap attachments note used alternative jax-rpc jax-ws soap simple object access protocol created mohsen al-ghosein dave winer bob atkinson box 1998 help microsoft
[ 6688, 1128, 5677, 4688, 10486, 6328, 10877, 479 ]
Test
4,741
3
Macintosh_II:macintosh ii macintosh ii personal computer designed manufactured sold apple computer inc. march 1987 january 1990 first model macintosh ii family first macintosh support color display first introduced basic system 20 mb drive monitor cost 13-inch color monitor 8-bit display card price around price placed competition workstations silicon graphics sun microsystems hewlett-packard macintosh ii designed hardware engineers michael dhuey computer brian berkeley monitor industrial designer hartmut esslinger case eighteen months introduction macintosh ii updated powerful cpu sold macintosh iix early 1989 compact macintosh iicx introduced price similar original macintosh ii beginning 1990 sales stopped altogether motherboard upgrades turn macintosh ii iix macintosh iifx offered apple two common criticisms macintosh introduction 1984 closed architecture lack color rumors color macintosh began almost immediately macintosh ii project begun dhuey berkeley 1985 without knowledge apple co-founder macintosh division head steve jobs opposed features like expansion slots color basis former complicated user experience latter conform wysiwyg since color printers common instead wanted higher-resolution monochrome displays macintosh initially referred little big mac macintosh ii codenamed milwaukee dhuey hometown later went series new names including reno becks cabernet uzi paris jean-louis gassée apple products manager protected semi-clandestine project cancellation jobs fired apple september 1985 project could proceed openly macintosh ii introduced appleworld 1987 conference los angeles low-volume initial shipments starting two months later retailing us 5,498 macintosh ii first modular macintosh model called came horizontal desktop case like many ibm pc compatibles time previous macintosh computers used all-in-one design built-in black-and-white crt macintosh ii drive bays internal hard disk originally 40 mb 80 mb optional second floppy disk drive along macintosh se first macintosh computer use apple desktop bus adb introduced apple iigs keyboard mouse interface primary improvement macintosh ii color quickdraw rom color version graphics language heart machine among many innovations color quickdraw ability handle display size 8-bit color depth multiple monitors color quickdraw included macintosh ii rom relied new 68020 instructions earlier macintoshes could upgraded display color september 1988 shortly introduction macintosh iix apple increased list price macintosh ii 20 cpu macintosh ii built around motorola 68020 processor operating 16 mhz teamed motorola 68881 floating point unit machine shipped socket mmu apple hmmu chip vlsi vi475 chip installed implement virtual memory instead translated 24-bit addresses 32-bit addresses mac os would 32-bit clean system 7 memory standard memory 1 megabyte expandable 8 mb mac ii eight 30-pin simms memory installed groups four called bank bank b original macintosh ii pmmu default relied memory controller hardware map installed memory contiguous address space hardware restriction address space dedicated bank must larger bank b though memory controller designed support 16mb 30-pin simms 128mb ram original macintosh ii roms problems limiting amount ram installed 8mb macintosh iix roms also shipped fdhd upgrade fixed problem though still 32-bit memory manager boot 32-bit addressing mode mac os without assistance mode32 mode32 contained workaround allowed larger simms put bank b pmmu installed case roms boot think computer 8mb less ram mode32 reprograms memory controller dedicate address space bank allowing additional memory bank b accessed since makes physical address space discontiguous pmmu used remap address space contiguous block graphics macintosh ii includes graphics card supports true-color 16.7 million color palette available two configurations 4-bit 8-bit 4-bit model supports 16 colors 640×480 display 256 colors 8-bit video 512×384 display means vram 256 kb 8-bit model supports 256-color video 640×480 display means vram 512 kb size optional ram upgrade requiring 120ns dip chips 4-bit version supports 640×480 8-bit color video card include hardware acceleration drawing operations display apple offered choice two displays 12 black white unit expensive 13 high-resolution color display based sony trinitron technology one display could attached computer objects could easily dragged one screen next third-party displays quickly became available los angeles times reviewer called color spectacular operating system user interface remained black white even color monitors exception apple logo appeared rainbow color storage 5.25-inch 40 mb internal scsi hard disk optional second internal 800 kilobyte 3.5-inch floppy disk drive expansion six nubus slots available expansion least one used graphics card mac ii onboard graphics chipset os n't support headless booting possible connect many six displays macintosh ii filling nubus slots graphics cards another option expansion included mac286 included intel 80286 chip could used ms-dos compatibility original roms macintosh ii contained bug prevented system recognizing one megabyte memory address space nubus card every macintosh ii manufactured approximately november 1987 defect happened slot manager 32-bit clean apple offered well-publicized recall faulty roms released program test whether particular macintosh ii defect result rare find macintosh ii original roms accessories macintosh ii macintosh se first apple computers since apple sold without keyboard instead customer offered choice new adb apple keyboard apple extended keyboard separate purchase dealers could bundle third-party keyboard attempt upsell customer expensive higher-profit extended keyboard audio macintosh ii first macintosh chimes death accompany sad mac logo whenever serious hardware error occurred new extensions featured macintosh ii time a/rose sound manager macintosh ii offered three configurations systems included mouse single 800 kb 3.5-inch floppy disk drive 68551 pmmu available option
[ 8207, 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 4139, 7211, 1592, 8253, 576, 1090, 4180, 10838, 10840, 9312, 8806, 6258, 10357, 7286, 4220, 10365, 10878, 6783, 7299, 8842, 6283, 7824, 147, 7830, 6807, 4258, 7842, 7844, 3241, ...
Test
4,742
3
Bit_slicing:bit slicing bit slicing technique constructing processor modules processors smaller bit width purpose increasing word length theory make arbitrary n-bit cpu component modules processes one bit field slice operand grouped processing components would capability process chosen full word-length particular software design bit slicing less died due advent microprocessor recently used alus quantum computers used software technique e.g x86 cpus cryptography bit slice processors usually include arithmetic logic unit alu 1 2 4 8 16 bits control lines including carry overflow signals internal processor non-bitsliced cpu designs example two 4-bit alu chips could arranged side side control lines form 8-bit alu result need power two e.g three 1-bit make 3-bit alu thus 3-bit n-bit cpu 3-bit cpu higher odd-number bits n't manufactured sold volume four 4-bit alu chips could used build 16-bit alu would take eight chips build 32-bit word alu designer could add many slices required manipulate increasingly longer word lengths microsequencer control rom would used execute logic provide data control signals regulate function component alus known bit-slice microprocessor modules bit slicing although called time also used computers large scale integrated circuits lsi predecessor today vlsi very-large-scale integration circuits first bit-sliced machine edsac 2 built university cambridge mathematical laboratory 1956–1958 prior mid-1970s late 1980s debate much bus width necessary given computer system make function silicon chip technology parts much expensive today using multiple simpler thus less expensive alus seen way increase computing power cost effective manner 32-bit architecture microprocessors discussed time production univac 1100 series mainframes one oldest series originating 1950s 36-bit architecture 1100/60 introduced 1979 used nine motorola mc10800 4-bit alu chips implement needed word width using modern integrated circuits time 16-bit processors common expensive 8-bit processors z80 widely used nascent home computer market combining components produce bit slice products allowed engineers students create powerful complex computers reasonable cost using off-the-shelf components could custom-configured complexities creating new computer architecture greatly reduced details alu already specified debugged main advantage bit slicing made economically possible smaller processors use bipolar transistors switch much faster nmos cmos transistors allowed much higher clock rates speed needed example dsp functions matrix transformation xerox alto combination flexibility speed discrete cpus able deliver recent times term bit slicing re-coined matthew kwan refer technique using general purpose cpu implement multiple parallel simple virtual machines using general logic instructions perform single instruction multiple data simd operations technique also known simd within register swar initially reference eli biham 1997 paper fast new des implementation software achieved significant gains performance des using method simplify circuit structure reduce hardware cost quantum computers proposed run mips32 instruction set 50 ghz superconducting 4-bit bit-slice arithmetic logic unit alu 32-bit rapid single-flux-quantum microprocessors demonstrated
[ 7173, 11333, 8143, 1776, 4465, 10098, 499, 11604, 10485, 8474, 3070, 9599 ]
Validation
4,743
3
PowerPC_400:powerpc 400 powerpc 400 family line 32-bit embedded risc processor cores based powerpc power isa instruction set architectures cores designed fit inside specialized applications ranging system-on-a-chip soc microcontrollers network appliances application-specific integrated circuits asics field-programmable gate arrays fpgas set-top boxes storage devices supercomputers applied micro circuits corporation amcc bought assets concerning 400 family cores ibm april 2004 227 million market processors name ibm continues evolving cores supplying design foundry services around cores several cores also available licensing oems ibm synopsys introduced 1994 powerpc 403 one first powerpc processors first one targeted strictly embedded market compared powerpc processors era powerpc 601 powerpc 603 powerpc 604 low end lacking memory management unit mmu floating point unit fpu instance core offered custom chips pre packaged versions including versions mmu speeds ranging 20 80 mhz powerpc 403 used among appliances thin clients set-top boxes raid-controllers network switches printers first tivo used 54 mhz powerpc 403gcx amcc acquired design 403 ibm 2004 chosen market instead focusing 405 440 cores 403 popular also high performance costly applications 1996 ibm released bare bones powerpc core called powerpc 401 single issue three-stage pipeline mmu dma 2 kb instruction 1 kb data l1 caches design contained 85,000 transistors operated 100 mhz drawing 0.1 w less applications using 401 core range set-top boxes telecom switches printers fax machines powerpc 405 released 1998 designed price performance sensitive low-end embedded system-on-a-chip soc designs five-stage pipeline separate 16 kb instruction data l1 caches coreconnect bus auxiliary processing unit apu interface expandability supports clock rates exceeding 400 mhz 405 core adheres current power isa v.2.03 using book iii-e specification amcc ibm developing marketing processors using 405 cores ibm synopsys also offers fully synthesizable core ibm announced plans make specifications powerpc 405 core freely available academic research community powerpc-405-based applications include digital cameras modems set-top boxes ibm stb04xxx processors cellphones gps-devices printers fax machines network cards network switches storage devices service processors servers two 405 cores used xilinx virtex-ii pro virtex-4 fpgas 2004 hifn bought ibm powernp network processors uses 405 cores introduced 1999 powerpc 440 first powerpc core ibm include book e extension powerpc specification also included coreconnect bus technology designed interface parts inside powerpc based system-on-a-chip soc device high-performance core separate 32 kb instruction data l1 caches seven-stage out-of-order dual-issue pipeline supporting speeds 800 mhz l2 caches 256 kb core lacks floating point unit fpu associated four-stage fpu included using apu auxiliary processing unit interface 440 core adheres power isa v.2.03 using book iii-e specification xilinx currently incorporates one two cores depending member family virtex-5 fxt fpga amcc ibm developing marketing stand alone processors using 440 cores ibm synopsys also offers fully synthesized cores processing core blue gene/p supercomputer designed manufactured ibm similar powerpc 440 details disclosed introduced 2006 460 cores similar 440 reach 1.4 ghz developed multi-core applications mind 24 additional digital signal processing dsp instructions cores designed low-power high performance 464-h90 expected draw 0.53 w 1 ghz 460 core adheres power isa v.2.03 using book iii-e specification 470 embedded customizable core adhering power isa v2.05 book iii-e designed ibm together lsi implemented powerpc 476fp 2009 476fp core 32/32 kb l1 cache dual integer units simd capable double precision fpu handles dsp instructions emitting 1.6 w 1.6 ghz 45 nm fabrication process 9 stage order 5-issue pipeline handles speeds 2 ghz supports plb6 bus 1 mb l2 cache 16 cores smp configurations
[ 6914, 4868, 10501, 3846, 6663, 5642, 1548, 1933, 3472, 4881, 7065, 1563, 1309, 3493, 6949, 6311, 8102, 1321, 3886, 9391, 10543, 4017, 5297, 1461, 823, 8120, 6715, 9020, 1725, 10173, 1983, 6207, 1985, 8899, 10180, 11333, 3911, 1480, 336, 8...
Test
4,744
0
Linguatec:linguatec linguatec sprachtechnologien gmbh language technology provider specialized field machine translation speech synthesis speech recognition linguatec founded munich 1996 headquarters pasing linguatec european information society technologies prize three times website using online service voice reader web information read every language means text-to-speech function
[ 1890, 3533, 3323, 7164, 10557 ]
Test
4,745
2
Lynne_Jolitz:lynne jolitz lynne greer jolitz born june 30 1961 figure free software founded many startups silicon valley husband william lynne jolitz probably famous work pioneering open source operating systems 386bsd husband founded startup companies involve workstations companies internet multimedia lynne also noted author authority operating systems networking issues lynne internet news media commentator discussing events computer industry wrote frequently byte also holds patents internet technologies semiconductor memory innovations writes technical papers articles currently adviser coolclip network internet startup uses server-based video production engine lynne originally designed tested university california berkeley lynne appeared oracle e-business network presented geek week award years work high-speed networking operating systems design lynne also appeared dvorak ’ realcomputing discussing impact internet broadband received alumni award physics department berkeley work alumni outreach department also active women ’ entrepreneur technology networking groups mentoring girls science technology husband reside los gatos california children rebecca benjamin sarah
[ 7552, 5506, 1927, 10761, 2061, 9743, 8725, 5534, 1316, 684, 4908, 1839, 7983, 1718, 1080, 9151, 9153, 3651, 7748, 10436, 9927, 8395, 850, 6361, 9306, 10202, 3551, 607, 9320, 873, 9452, 633, 8316 ]
None
4,746
5
Signal_Protocol:signal protocol signal protocol formerly known textsecure protocol non-federated cryptographic protocol used provide end-to-end encryption voice calls video calls instant messaging conversations protocol developed open whisper systems 2013 first introduced open-source textsecure app later became signal several closed-source applications claim implemented protocol whatsapp said encrypt conversations billion people worldwide facebook messenger also say offer protocol optional secret conversations skype private conversations protocol combines double ratchet algorithm prekeys triple elliptic-curve diffie–hellman 3-dh handshake uses curve25519 aes-256 hmac-sha256 primitives signal protocol development started trevor perrin moxie marlinspike open whisper systems 2013 first version protocol textsecure v1 based off-the-record messaging otr 24 february 2014 open whisper systems introduced textsecure v2 migrated axolotl ratchet design axolotl ratchet based ephemeral key exchange introduced otr combines symmetric-key ratchet modeled silent circle instant messaging protocol scimp brought support asynchronous communication offline messages major new feature well better resilience distorted order messages simpler support conversations multiple participants axolotl ratchet named critically endangered aquatic salamander axolotl extraordinary self-healing capabilities developers refer algorithm self-healing automatically disables attacker accessing cleartext later messages compromised session key third version protocol textsecure v3 made changes cryptographic primitives wire protocol october 2014 researchers ruhr university bochum published analysis textsecure v3 among findings presented unknown key-share attack protocol general found secure march 2016 developers renamed protocol signal protocol also renamed axolotl ratchet double ratchet algorithm better differentiate ratchet full protocol used name axolotl referring full protocol signal protocol based textsecure v3 additional cryptographic changes october 2016 researchers uk university oxford australia queensland university technology canada mcmaster university published formal analysis protocol concluded protocol cryptographically sound protocol provides confidentiality integrity authentication participant consistency destination validation forward secrecy post-compromise security aka future secrecy causality preservation message unlinkability message repudiation participation repudiation asynchronicity provide anonymity preservation requires servers relaying messages storing public key material signal protocol also supports end-to-end encrypted group chats group chat protocol combination pairwise double ratchet multicast encryption addition properties provided one-to-one protocol group chat protocol provides speaker consistency out-of-order resilience dropped message resilience computational equality trust equality subgroup messaging well contractible expandable membership authentication users manually compare public key fingerprints outside channel makes possible users verify identities avoid man-in-the-middle attack implementation also choose employ trust first use mechanism order notify users correspondent key changes signal protocol prevent company retaining information users communicate therefore differences messaging service providers choose handle information signal privacy policy states recipients identifiers kept signal servers long necessary order transmit message june 2016 moxie marlinspike told intercept closest piece information metadata signal server stores last time user connected server precision information reduced day rather hour minute second october 2018 signal messenger announced implemented sealed sender feature signal reduces amount metadata signal servers access concealing sender identifier sender identity conveyed recipient message encrypted key server done automatically sender recipient contacts access signal profile users also enable option receive sealed sender messages non-contacts people access signal profile contemporaneous wiretap user device and/or signal servers may still reveal device ip address accessed signal server send receive messages certain times open whisper systems first introduced protocol textsecure app later merged encrypted voice calling application called redphone textsecure app renamed signal redphone used zrtp encrypt calls march 2017 signal transitioned new webrtc-based calling system also introduced ability make video calls signal new calling system uses signal protocol end-to-end encryption november 2014 open whisper systems announced partnership whatsapp provide end-to-end encryption incorporating signal protocol whatsapp client platform open whisper systems said already incorporated protocol latest whatsapp client android support clients group/media messages key verification would coming soon april 5 2016 whatsapp open whisper systems announced finished adding end-to-end encryption every form communication whatsapp users could verify keys february 2017 whatsapp announced new feature whatsapp status uses signal protocol secure contents september 2015 g data software launched new messaging app called secure chat used signal protocol g data discontinued service may 2018 september 2016 google launched new messaging app called allo featured optional incognito mode used signal protocol end-to-end encryption march 2019 google discontinued allo favor messages app android october 2016 facebook deployed optional mode called secret conversations facebook messenger provides end-to-end encryption using implementation signal protocol january 2018 open whisper systems microsoft announced addition signal protocol support optional skype mode called private conversations signal protocol influence cryptographic protocols may 2016 viber said encryption protocol custom implementation uses concepts signal protocol forsta developers said app uses custom implementation signal protocol double ratchet algorithm introduced part signal protocol also adopted protocols omemo xmpp extension protocol xep introduced conversations messaging app approved xmpp standards foundation xsf december 2016 xep-0384 matrix open communications protocol includes olm library provides optional end-to-end encryption room-by-room basis via double ratchet algorithm implementation developers wire said app uses custom implementation double ratchet algorithm signal messenger maintains following signal protocol libraries github
[ 2050, 10242, 4100, 1036, 3610, 10271, 3105, 2083, 9764, 5677, 8758, 9281, 7238, 10831, 8283, 10850, 10341, 9318, 7794, 5749, 8331, 11408, 11418, 3228, 10405, 4268, 7859, 2228, 6855, 2760, 1738, 3284, 728, 4318, 3812, 9451, 756, 2804, 7928, ...
Test
4,747
2
Finalizer:finalizer computer science finalizer finalize method special method performs finalization generally form cleanup finalizer executed object destruction prior object deallocated complementary initializer executed object creation following allocation finalizers strongly discouraged due difficulty proper use complexity add alternatives suggested instead primarily dispose pattern – see problems finalizers term finalizer primarily used object-oriented functional languages use garbage collection archetype smalltalk contrasted destructor method called finalization languages deterministic object lifetimes archetypically c++ generally exclusive – language either finalizers garbage collected destructors deterministic rare cases language may c++/cli case reference counting instead tracing garbage collection terminology varies technical usage finalizer may also used refer destructors also perform finalization subtler distinctions drawn – see terminology term final also used indicate class inherited unrelated terminology finalizer finalization versus destructor destruction varies authors sometimes unclear common usage destructor method called deterministically object destruction archetype c++ destructors finalizer called non-deterministically garbage collector archetype java codice_1 methods languages implement garbage collection via reference counting terminology varies languages objective-c perl using destructor languages python using finalizer per spec python garbage collected reference cpython implementation uses reference counting reflects fact reference counting results semi-deterministic object lifetime objects part cycle objects destroyed deterministically reference count drops zero objects part cycle destroyed non-deterministically part separate form garbage collection certain narrow technical usage constructor destructor language-level terms meaning methods defined class initializer finalizer implementation-level terms meaning methods called object creation destruction thus example original specification c language referred destructors even though c garbage-collected specification common language infrastructure cli implementation runtime environment common language runtime clr referred finalizers reflected c language committee notes read part c compiler compiles destructors ... probably instance finalizer terminology confusing thus recent versions c spec refer language-level method finalizers another language make terminology distinction d. although classes garbage collected cleanup functions called destructors finalization primarily used cleanup release memory resources deallocate memory allocated via manual memory management clear references reference counting used decrement reference counts release resources particularly resource acquisition initialization raii idiom unregister object amount finalization varies significantly languages extensive finalization c++ manual memory management reference counting deterministic object lifetimes often finalization java non-deterministic object lifetimes often implemented tracing garbage collector also possible little explicit user-specified finalization significant implicit finalization performed compiler interpreter runtime common case automatic reference counting cpython reference implementation python automatic reference counting apple implementation objective-c automatically break references finalization finalizer include arbitrary code particularly complex use automatically return object object pool memory deallocation finalization common languages like c++ manual memory management standard also occurs managed languages memory allocated outside managed heap externally language java occurs java native interface jni codice_2 objects new i/o nio latter cause problems due garbage collector able track external resources collected aggressively enough cause out-of-memory errors due exhausting unmanaged memory – avoided treating native memory resource using dispose pattern discussed finalizers generally much less necessary much less used destructors much less necessary garbage collection automates memory management much less used generally executed deterministically – may called timely manner even execution environment predicted – thus cleanup must done deterministic way must instead done method frequently manually via dispose pattern notably java python guarantee finalizers ever called thus relied cleanup due lack programmer control execution usually recommended avoid finalizers trivial operations particular operations often performed destructors usually appropriate finalizers common anti-pattern write finalizers destructors unnecessary ineffectual due differences finalizers destructors particularly common among c++ programmers destructors heavily used idiomatic c++ following resource acquisition initialization raii idiom programming languages use finalizers include c++/cli c clean go java python syntax varies significantly language java finalizer method called codice_1 overrides codice_4 method python finalizer method called codice_5 perl finalizer method called codice_6 c finalizer called destructor earlier versions standard method whose name class name codice_7 prefixed codice_8 – syntax c++ destructor methods originally called destructors analogy c++ despite different behavior renamed finalizers due confusion caused c++/cli destructors finalizers destructor method whose name class name codice_7 prefixed codice_8 c++ finalizer method whose name class name codice_11 prefixed codice_12 go finalizers applied single pointer calling codice_13 function standard library finalizer called object garbage collected – object become garbage unreachable memory deallocated finalization occurs non-deterministically discretion garbage collector might never occur contrasts destructors called deterministically soon object longer use always called except case uncontrolled program termination finalizers frequently instance methods due needing object-specific operations garbage collector must also account possibility object resurrection commonly done first executing finalizers checking whether objects resurrected aborting destruction additional check potentially expensive – simple implementation re-checks garbage even single object finalizer – thus slows complicates garbage collection reason objects finalizers may collected less frequently objects without finalizers certain cycles exacerbating problems caused relying prompt finalization resource leaks object resurrected question whether finalizer called next destroyed – unlike destructors finalizers potentially called multiple times finalizers called resurrected objects objects may repeatedly resurrect indestructible occurs cpython implementation python prior python 3.4 clr languages c avoid many languages including java objective-c least recent apple implementations python python 3.4 objects finalized requires tracking object finalized yet cases notably clr languages like c finalization tracked separately objects objects repeatedly registered deregistered finalization finalizers cause significant number problems thus strongly discouraged number authorities problems include finalizers may fail run due object remaining reachable beyond expected garbage either due programming errors due unexpected reachability example python catches exception exception caught interactive mode keeps reference stack frame exception raised keeps objects referenced stack frame alive finalizers superclass also slow garbage collection subclass finalizer potentially refer fields subclass thus field garbage collected following cycle finalizer run avoided using composition inheritance common anti-pattern use finalizers release resources analogy resource acquisition initialization raii idiom c++ acquire resource initializer constructor release finalizer destructor work number reasons basically finalizers may never called even called may called timely manner – thus using finalizers release resources generally cause resource leaks finalizers called prescribed order resources often need released specific order frequently opposite order acquired also finalizers called discretion garbage collector often called managed memory pressure little managed memory available regardless resource pressure – scarce resources held garbage plenty managed memory available garbage collection may occur thus reclaiming resources thus instead using finalizers automatic resource management garbage-collected languages one instead must manually manage resources generally using dispose pattern case resources may still acquired initializer called explicitly object instantiation released dispose method dispose method may called explicitly implicitly language constructs c codice_14 java codice_15-with-resources python codice_16 however certain cases dispose pattern finalizers used releasing resources primarily found clr languages c finalization used backup disposal resource acquired acquiring object queued finalization resource released object destruction even resource released manual disposal languages deterministic object lifetimes notably c++ resource management frequently done tying resource possession lifetime object lifetime acquiring resources initialization releasing finalization known resource acquisition initialization raii ensures resource possession class invariant resources released promptly object destroyed however languages non-deterministic object lifetimes – include major languages garbage collection c java python – work finalization may timely may happen thus resources may released long time even causing resource leaks languages resources instead generally managed manually via dispose pattern resources may still acquired initialization released calling codice_17 method nevertheless using finalization releasing resources languages common anti-pattern forgetting call codice_17 still cause resource leak cases techniques combined using explicit dispose method also releasing still-held resources finalization backup commonly found c implemented registering object finalization whenever resource acquired suppressing finalization whenever resource released user-specified finalizers allowed possible finalization cause object resurrection finalizers run arbitrary code may create references live objects objects destroyed languages without garbage collection severe bug causes dangling references memory safety violations languages garbage collection prevented garbage collector commonly adding another step garbage collection running user-specified finalizers check resurrection complicates slows garbage collection object resurrection means object may destroyed pathological cases object always resurrect finalization making indestructible prevent languages like java python python 3.4 finalize objects finalize resurrected objects concretely done tracking object finalized object-by-object basis objective-c also tracks finalization least recent apple versions similar reasons treating resurrection bug different approach used .net framework notably c visual basic .net finalization tracked queue rather object case user-specified finalizer provided default object finalized queued finalization creation dequeued finalized changed via calling codice_19 module finalization prevented calling codice_20 dequeues object reactivated calling codice_21 enqueues object particularly used using finalization resource management supplement dispose pattern implementing object pool finalization formally complementary initialization – initialization occurs start lifetime finalization end – differs significantly practice variables objects initialized primarily assign values general objects finalized general need clear values – memory simply deallocated reclaimed operating system beyond assigning initial values initialization primarily used acquire resources register object service like event handler actions symmetric release unregister actions symmetrically handled finalizer done raii however many languages notably garbage collection object lifetime asymmetric object creation happens deterministically explicit point code object destruction happens non-deterministically unspecified environment discretion garbage collector asymmetry means finalization effectively used complement initialization happen timely manner specified order specified environment symmetry partially restored also disposing object explicit point case disposal destruction happen point object may disposed still alive state weakens class invariants complicates use variables generally initialized start lifetime finalized end lifetime – though variable object value object may finalized cases variables also finalized gcc extensions allow finalization variables reflected naming finalization codice_22 construct fulfill similar purposes performing final action generally cleaning something else finished differ occur – codice_22 clause executed program execution leaves body associated codice_15 clause – occurs stack unwind thus stack pending codice_22 clauses order – finalization occurs object destroyed happens depending memory management method general simply set objects awaiting finalization – often heap – need happen specific order however cases coincide c++ object destruction deterministic behavior codice_22 clause produced local variable object value whose scope block corresponds body codice_15 clause – object finalized destructed execution exits scope exactly codice_22 clause reason c++ codice_22 construct – difference finalization defined class definition destructor method rather call site codice_22 clause conversely case codice_22 clause coroutine like python generator coroutine may never terminate – ever yielding – thus ordinary execution codice_22 clause never executed one interprets instances coroutine objects codice_22 clause considered finalizer object thus executed instance garbage collected python terminology definition coroutine generator function instance generator iterator thus codice_22 clause generator function becomes finalizer generator iterators instantiated function notion finalization separate step object destruction dates analogy earlier distinction initialization object construction literature prior point used destruction process distinguishing finalization deallocation programming languages dating period like c++ perl use term destruction terms finalize finalization also used influential book design patterns 1994 introduction java 1995 contained codice_1 methods popularized term associated garbage collection languages point generally make distinction use term finalization particularly context garbage collection
[ 2304, 9482, 5008, 9490, 11539, 1435, 541, 3871, 10783, 1954, 5165, 814, 5677, 1715, 3512, 572, 2625, 1474, 1736, 4424, 5961, 716, 6221, 5840, 5074, 86, 8545, 10470, 2152, 3562, 7403, 8554, 3573, 3577, 634, 8573, 7039 ]
Test
4,748
9
John_Bridges_(software_developer):john bridges software developer john bridges co-author computer program pcpaint primary developer program grasp microtex industries doug wolfgram also sole author glpro aftergrasp article entitled differential image compression published february 1991 issue dr. dobb journal 1980 bridges started programming career nyu institute reconstructive plastic surgery summer intern working sophisticated programmable vector graphics systems wrote editing tools also updated debugged software used early 3d x-ray scanning research 1981-85 bridges wrote ram disk drivers utilities cracking software task switching software memory test diagnostics abacus maker large memory cards apple ii 1982 started working classroom consortia media inc. educational software company developing writing apple ibm graphics libraries tools software tenure created drawing program called superdraw ccm wrote core graphics code would later become pcpaint well develop grasp gl library format 1984 bridges developed first version pcpaint doug wolfgram mouse systems pcpaint first ibm pc-based mouse driven gui paint program company purchased exclusive rights pcpaint john continued development 1990 1985 bridges pcpaint code doug slideshow program morphed new program grasp grasp first multimedia animation program ibm pc created grasp gl library format grasp originally released shareware doug company microtex industries however version 2.0 sold commercially paul mace software doug sold shares pcpaint grasp bridges 1990 bridges work grasp continued 1994 terminated contract paul mace software bridges work grasp included several toolsets add-ons pictor paint artools hrfe high res flic enhancement pc speaker sound code caused paul mace software threatened lawsuit realsound use frequency modulation upon realsound held patent stripped-down version grasp 4.0 also included copies philip shaddock multimedia creations hands-on workshop exploring animation sound 1987 bridges released vidspeed freeware program tests speed graphics cards measuring throughput writing constant pixel data video memory bus graphics modes vidspeed well received community recommended least two books patrick killelea web performance tuning stephen j. bigelow bigelow computer repair toolkit though bigelow expresses concern support updates 1986-87 bridges authored project ibm multimedia lab played back full color video 1/4 size window new ibm model 30 8 mhz 8086 cpu new mcga 320x200 256-color video mode play full color video early date dos history smoothly one slowest low-end ibm ps/2 models sold ibm applied patent algorithms developed though filed name project manager ibm algorithms later published article bridges entitled differential image compression first appeared dr. dobb journal february 1991 later reprinted magazine july 2001 along james h. sylvester 1993 article differential compression algorithms adapts bridges algorithms generalized data graphics ibm project came imagetools 1987 collection high color 15bit 24bit 32bit vga/ega image conversion scaling tools sold metacreations corp./harvard systems corp hsc software 1988 bridges authored freeware image viewer program called picem image viewers time commercial picem also allowed user adjust images brightness contrast save image viewed formats including bsave graphics image format picem became popular enough microsoft offered tech help using conjunction quickbasic also 1988 bridges released vgakit vgakit svga programming kit freeware vgakit open source library accessing extended graphics modes dos standardized vesa vbe arrived used several open closed source projects developer univbe program extended video cards bios become compatible new vesa vbe said bridges provided information without univbe would never gotten started whole pc graphics community deeply debt author michael abrash 1997 book graphics programming black book says little ddj dr. dobb journal columns published mode x although bridges widely distributed code number undocumented 256-color resolutions ’ like acknowledge influence code mode set routine presented chapter 47 codes abrash refers mode x 360x480 256-color mode codes bridges included vgakit worked vga svgas abrash ddj articles published circa 1991 compiled gpbb grasp 3.5 released included bridges newest version pcpaint pictor paint version 4.0 included bridges artools collection image manipulation tools included early morphing utility tracked points source destination images creating in-between frames 1995 bridges created glpro ims newest incarnation bridges ideas behind grasp updated windows 2000 glpro became property gmedia plc closed 2001 bridges stopped glpro work time stripped version glpro included conrad r. brandt book glpro foundations 2000 2002 bridges started work new program aftergrasp designed backwards compatible glpro work still continuing project pictor pic image format image file format developed bridges pcpaint also native file format grasp glpro first widely accepted dos imaging standard
[ 3323, 6797, 9166 ]
None
4,749
4
Christine_O'Keefe:christine o'keefe christine margaret o'keefe australian mathematician computer scientist whose research included work finite geometry information security data privacy researcher csiro lead author 2017 report office australian information commissioner best practices de-identification personally identifying data o'keefe bachelor degree university adelaide initially intending study medicine earning first-class honours mathematics 1982 returned adelaide doctoral study 1985 completed ph.d. 1988 dissertation concerning formula_1-spreads formula_2 supervised rey casse lecturer research fellow university western australia 1999 2001 returned university adelaide adelaide worked lecturer senior lecturer queen elizabeth ii fellow senior research fellow research interests shifted finite geometry information security effect shift moved 2000 adelaide csiro csiro founded information security privacy group 2002 became head health informatics group 2004 became theme leader health data information 2006 strategic operations director preventative health national research 2008 studied mba australian national university finishing 2008 became director population health research network centre professor health sciences curtin university 2009 2010 returning csiro science leader privacy confidentiality csiro department mathematics informatics statistics o'keefe fellow institute combinatorics applications since 1991 1996 o'keefe hall medal institute combinatorics applications work finite geometry australian mathematical society medal 2000 first woman win medal year became fellow australian mathematical society although medal citation primarily discussed o'keefe work finite geometry discovery new hyperovals included paragraph research using geometry secret sharing precursor later work information security
[ 4232, 5373, 1783 ]
None
4,750
2
Job_control_(Unix):job control unix unix unix-like operating systems job control refers control jobs shell especially interactively job shell representation process group basic job control features suspending resuming terminating processes job/process group advanced features performed sending signals job job control particular interest unix due multiprocessing distinguished job control generally frequently applied sequential execution batch processing using unix unix-like operating systems via terminal terminal emulator user initially single process running login shell tasks directory listing editing files etc easily accomplished letting program take control terminal returning control shell program exits – formally attaching standard input standard output shell reads writes terminal catching signals sent keyboard like termination signal resulting pressing however sometimes user wish carry task using terminal another purpose task running receiving input terminal said running background single task receiving input terminal foreground job control facility developed make possible allowing user start processes background send already running processes background bring background processes foreground suspend terminate processes concept job maps shell concept single shell command operating system concept possibly many processes command entails multi-process tasks come processes may create additional child processes single shell command may consist pipeline multiple communicating processes example command select lines containing text title sort alphabetically display result pager creates least three processes one one one job control allows shell control related processes one entity user issues appropriate key combination usually entire group processes gets suspended jobs managed operating system single process group job shell internal representation group defined posix job referred handle called job control job id simply used shell builtins refer job job ids begin codice_1 character codice_2 identifies job n codice_3 identifies current job job ids specified posix informal usage number may referred job number job id bash documentation refers -prefixed job id jobspec job control job ids typically used interactive use simplify referring process groups scripting pgids used instead precise robust indeed job control disabled default bash scripts job control first implemented c shell jim kulp iiasa austria making use features 4.1bsd kernel korn shell developed bell labs adopted later incorporated svr4 version bourne shell exists modern unix shells posix standard specifies two commands resuming suspended jobs background foreground respectively modeled korn shell job control commands typically shell keeps list jobs job table recall job corresponds process group consists members pipeline descendants codice_4 command list background jobs existing job table along job number job state stopped running session ends user logs exits shell terminates session leader process shell process sends sighup jobs waits process groups end terminating codice_5 command used remove jobs job table session ends child process groups sent sighup shell wait terminate thus become orphan processes may terminated operating system though often used processes adopted init kernel sets parent process init continue executing daemons alternatives prevent jobs terminated include nohup using terminal multiplexer job running foreground stopped typing suspend character ctrl-z sends terminal stop signal sigtstp process group default sigtstp causes processes receiving stop control returned shell however process register signal handler ignore sigtstp process also paused stop signal sigstop caught ignored job running foreground interrupted typing interruption character ctrl-c sends interrupt signal sigint defaults terminating process though overridden stopped job resumed background job codice_6 builtin foreground job codice_7 either case shell redirects i/o appropriately sends sigcont signal process causes operating system resume execution bash program started background job appending ampersand codice_8 command line output directed terminal potentially interleaved programs output read terminal input background process attempts read write controlling terminal sent sigttin input sigttou output signal signals stop process default may also handled ways shells often override default stop action sigttou background processes deliver output controlling terminal default bash-compatible shells codice_9 builtin codice_10 signal jobs job id well process group id – sending signal job sends whole process group jobs specified job id killed prefixing codice_1 kill send signal job however intent rid system processes signals sigkill sigterm default probably applicable
[ 515, 9733, 9735, 5256, 521, 6281, 6664, 8975, 11663, 4369, 7188, 5397, 2198, 6812, 7196, 671, 4001, 6138, 1316, 2599, 7847, 8236, 4398, 7983, 11442, 8499, 4277, 1336, 8504, 5435, 7356, 451, 1987, 965, 2245, 3526, 8517, 9542, 5706, 3659, ...
None
4,751
9
Refined_Printing_Command_Stream:refined printing command stream refined printing command stream also known rpcs vector-based printing/duplicating control protocol designed communication microsoft windows pc clients several lines ricoh copiers drivers provided ricoh install chosen copier behave printer device size-efficiency protocol comparable pcl6 ricoh offers rpcs based drivers windows mac os extent linux drivers linux provided japanese website instead aficio called ipsio
[ 10784, 5384, 6830, 5617, 8763 ]
None
4,752
4
Copyright_alternatives:copyright alternatives various copyright alternatives alternative compensation systems acs proposed ways allow widespread reproduction digital copyrighted works still paying authors copyright owners works article discusses proposals involve form government intervention models street performer protocol voluntary collective licenses could arguably called alternative compensation systems although different generally less effective solving free rider problem impetus proposals come widespread use peer-to-peer file sharing networks authors argue acs simply practical response situation acs advocates go holding p2p file sharing fact greatly beneficial tax levy funded systems actually desirable tools paying artists sales coupled drm copy prevention technologies artistic freedom voucher afv proposal argues current copyright system providing state enforced monopoly leads enormous inefficiencies creates substantial enforcement problems afv proposed system individuals would allowed contribute refundable tax credit approximately 100 creative worker contribution would act voucher used support artistic creative work recipients afv contribution would turn required register government similar fashion religious charitable institutions tax-exempt status sole purpose registration would prevent fraud would evaluation quality work produced alongside registration artists would also ineligible copyright protection set period time 5 years example work contributed public domain allowed freely reproduced afv would affect creative workers ability receive funds via live performances proponents claim system could create 20 billion annually pay artists far greater currently flows copyrighted material 100 per adult voucher 500,000 writers musicians singers actors creative workers could paid 40,000 year baker also states realistic assume savings reduced expenditures copyrighted work would vastly exceed cost afv majority savings would come individuals deciding use afv supported work place copyrighted work well lower advertising costs afv material would public domain copyright enforcement demand would also decrease afv material increased assumptions made low end direct costs public copyrighted material would reduced around 20 percent high end way 60 percent time also likely savings would increase due lesser costs system brighter prospects 2010 article critical afv proposal graphic designer mark stanley writes like school vouchers flat tax pretenders afv assumes necessity state intervention tries bend liberty around strictures freedom ’ forgiving manipulation systematic restructuring copyright laws proposed afv far put practice concept paying artists donations tested success 2006 musician jeff rosenstock founded quote unquote records advertised first donation-based record label artists label make music available download free invite listeners make small donation want donations ticket sales live shows quote unquote records successfully recording music expanding number bands label past twelve years proposals included targeted levies internet connections blank cds digital media players etc many goods levied various countries existing private copying schemes income taxation optional payments users terms economic theory consumer opt regimes different universal ones depending scheme administered differences might large example default option isp subscribers pay acs surcharge could avoided filing signed commitment make unauthorised downloads p2p networks effects might quite similar scheme however unsuitable business owners maintain free internet connections incentive customers would responsibility business owner monitor customer internet use various proposals made base distribution royalties measures consumer downloading usage voting computer security issues addressed collecting data considerable privacy verifiability obstacles similar encountered internet voting may soluble hardware assistance currently available ordinary pcs practical way deploy acs short term would collect statistical samples much smaller population actual distribution royalties would likely carried copyright collecting society alternative compensation systems two significant advantages digital copyright impose artificial scarcity copyright works everyone download many songs ebooks films want economic terns acs eliminate deadweight loss copyright monopolies also avoid high technological social costs digital copyright enforcement two greatest drawbacks acses excess burden taxation collected need decide tax/levy rates use system although methods contingent valuation may help little question canada private copying levy unforeseen result temporarily creating acs kinds p2p downloading bmg v. doe dictum suggested also apply uploading dictum criticised appeal france december 2005 dadvsi amendments passed senate would created acs called global license amendments removed bill finally became law 2009 german social democratic party added proposal acs variant called cultural flat-rate party platform
[ 2864, 11659, 743 ]
Train
4,753
4
Swatting:swatting swatting criminal harassment tactic deceiving emergency service via means hoaxing emergency services dispatcher sending police emergency service response team another person address triggered false reporting serious law enforcement emergency bomb threat murder hostage situation alleged incident also triggered false report mental health emergency reporting person allegedly suicidal homicidal may may armed united states maximum prison sentence handed court march 2019 swatter 20 years jail fatal 2017 swatting violation term derives law enforcement unit swat special weapons tactics specialized type police unit many countries carrying military-style equipment door breaching weapons submachine guns automatic rifles sniper rifles threat may result evacuations schools businesses advocates called swatting described terrorism due use intimidate create risk injury death making false reports emergency services criminal offense many countries punishable fines imprisonment causes tax dollars wasted city county responding false report serious law enforcement emergency california swatters bear full cost response lead fines 10,000 bomb threats concern police 1970s public buildings airports evacuated response hoax calls designed cause mass panic public disruption delay exams educational institutions recent decades hoax callers sometimes make use techniques disguise identity country origin swatting origins prank calls emergency services years callers used increasingly sophisticated techniques direct response units particular types particular attempts swat teams dispatched particular locations spawned term swatting term used fbi early 2008 also entered oxford dictionaries online 2015 caller id spoofing social engineering tty prank calls phone phreaking techniques may variously combined swatting perpetrators 911 systems including computer telephony systems human operators tricked calls placed cities hundreds miles away location purported call even countries caller typically places 911 call using spoofed phone number hide fraudulent caller real location goal tricking emergency authorities responding swat team fabricated emergency swatting linked action doxing obtaining broadcasting often via internet address details individual intent harass endanger united states swatting prosecuted federal criminal statutes 2011 california state senator ted lieu authored bill increase penalties swatting family became victim swatting bill proposed dozen police officers along firefighters paramedics surrounded family home 2015 new jersey state assemblyman paul d. moriarty announced bill increase sentences hoax emergency calls targeted hoax bill proposed prison sentences ten years fines 150,000 2015 bipartisan bill congress sponsored katherine clark patrick meehan made swatting federal crime increased penalties congresswoman clark wrote op-ed hill saying 2.5 million cases cyber stalking 2010 2013 resulted 10 cases prosecuted although source provided revenge bill anonymous caller fraudulently called police rep. clark house january 31 2016 brazil swatting prosecuted criminal code following articles january 15 2015 sentinel oklahoma washita county dispatchers received 911 calls someone identified dallas horton told dispatchers placed bomb local preschool washita county sheriff deputies sentinel police chief louis ross made forced entry horton residence ross wearing bulletproof vest shot several times horton investigation revealed calls originate home led oklahoma state bureau investigation agents believe horton unaware law enforcement officers making entry james edward holly confessed investigators made calls two nonfunctioning phones angry horton ross shot multiple times chest arm injured treated injuries released local hospital december 28 2017 wichita police officer shot man named andrew finch kansas home swatting incident andrew finch later died hospital based series screenshotted twitter posts wichita eagle suggests finch unintended victim swatting two players team got heated argument 1.50 usd bet december 29 2017 lapd arrested 25-year-old serial-swatter tyler raj barriss known online swautistic xbox live goredtutor36 connection incident 2018 barriss indicted federal grand jury along two others involved incident according u.s. attorney stephen mcallister false hoax charge carries maximum punishment life federal prison charges carry sentences 20 years march 29 2019 barriss sentenced 20 years imprisonment 2009 blind phreaker matthew weigman caught help verizon fraud-investigator named billy smith weigman sentenced 11 years federal prison pleaded guilty charges including involvement swatting conspiracy attempting retaliate witness 2012 cnn interviewed political commentator erick erickson discuss incident victim swatting caller 911 gave erickson address claimed incident prompted florida 24th congressional district representative sandy adams push justice department investigation 2013 number u.s. celebrities became victims swatting including sean combs past swatting incidents homes ashton kutcher tom cruise chris brown miley cyrus iggy azalea jason derulo snoop dogg justin bieber clint eastwood 2013 network fraudsters involved carding doxing public officials using stolen credit reports targeted computer security expert brian krebs malicious police reports mir islam leader group also used swatting hoaxes prosecutor stephen p. heymann congressman mike rogers girl cyberstalking turned romantic proposals islam convicted doxing swatting 50 public figures including michelle obama robert mueller john brennan well krebs sentenced two years prison ukrainian computer hacker sergey vovnenko convicted trafficking stolen credit cards well planning purchase heroin ship brian krebs swatting sentenced 15 months prison italy 41 months prison new jersey may 2014 curtis gervais ottawa ontario arrested made thirty fraudulent emergency calls across north america leading sixty charges including uttering death threats conveying false information intent alarm public mischief mischief property gervais sentenced nine months home detention ontario court justice mitch hoffman noted hoax calls resulted evacuations schools homes shopping center caused thousands people lives put turmoil terrorized also called massive waste public resources significant cost emergency services therefore taxpayer august 27 2014 youtube user jordan mathewson known online kootra live streamed game twitch viewer called 911 claiming shooting building hostages swat team raided office mathewson gaming company creatures llc operating mathewson thrown ground searched officers searched room events broadcast live internet law enforcement blocked camera lens mathewson desk videos swatting went viral gaining four million views youtube reported news programs world september 11 2014 bukkit programmer wesley wolvereness wolfe victim swatting incident unidentified skype caller told police wolfe shot parents killing spree wolfe believed targeted retaliation issuing dmca takedown craftbukkit bukkit repository november 6 2014 home unnamed executive bungie developer halo destiny franchises raided local police call purported someone inside house said hostage situation residence caller demanded ransom 20,000 claimed planted explosives yard 45 minutes police determined call originated computer residence stated perpetrator hoax could face fine one year jail apprehended december 5 2014 police coquitlam british columbia arrested teenager using pseudonym 'obnoxious committed least 40 attempted successful acts swatting several countries teenager historically targeted mostly young female gamers ignored friend requests league legends twitter used social engineering techniques skype tracking tools obtain address details victims companies including cox communications voip calling mask real location went far live stream swatting calls youth pleaded guilty 23 crimes new york times article case criticized twitch failing block user associates site january 3 2015 twenty portland oregon police officers sent former home grace lynn transgender woman stated culmination months online harassment gamergate supporters withdrew support movement swatter coming serbia claimed affiliated gamergate lynn said alerted incident proactively checked online harassment daily defused situation contacting police may 2015 zachary lee morgenstern 19 cypress texas arrested made number hoax bomb threats swatting calls minnesota ohio massachusetts including two schools marshall minnesota police obtained ip address twitter google morgenstern pleaded guilty several federal crimes december 2015 sentenced 41 months prison august 2015 founder website mumsnet target swatting resulted deployment london metropolitan police service armed response unit attending home address hoax concurrent denial-of-service attack mumsnet website threats swatting attack january 31 2016 around 10pm u.s. representative katherine clark swatted anonymous caller claimed active shooter home melrose police responded home left determining call hoax rep. clark sponsored bill called 'interstate swatting hoax act 2015 aimed increasing penalties swatting well making swatting federal crime incident said sympathetic people victims swatting sunday night fully understands like stated swatting really cause double april 28 2017 twitch user paul denino pseudonym ice poseidon live streaming boarding american airlines flight plane landed law enforcement showed airport apron removed denino one person plane anonymous caller claimed denino bomb october 16 2017 bitcoin engineer jameson lopp neighborhood locked law enforcement responding reported hostage situation anonymous caller claimed shot killed one person holding others hostage ransom house rigged c4 lopp later wrote first person account ordeal offered bounty information leading arrest conviction perpetrator may 16 2018 popular streamer former professional overwatch player felix xqc lengyel home raided police handcuffed mid-stream california apartment lengyel later revealed three guns pointed overwatch league analyst brennon hook stated raid due noise complaint neighbor lengyel asserted act swatting june 5 2018 police called parkland florida home stoneman douglas high school shooting survivor gun-control activist david hogg caller claimed hostage situation prompting emergency response included swat team hogg home time washington d.c. family receive robert f. kennedy human rights award one organizers march lives winning 3 million top prize fortnite world cup july 2019 16-year-old kyle bugha giersdorf swatted august 2019 stream local swat team armed arrival however situation diffused one officers recognized giersdorf championship recognized call prank october 2018 seattle police department spd launched opt-in registry aimed people fear might become victims swatting celebrities live streamers using registry people provide cautionary information spd inform officers responding potential swatting attempts targeted victim address security reporter brian krebs recommends police departments take extra care responding calls received non-emergency numbers text-to-speech services tty since methods often employed out-of-area swatters connect regional 911 center
[ 8805, 2409, 9550, 82, 8950, 2558, 9055 ]
None
4,754
7
LeanIX:leanix leanix name stands lean information exchange software vendor provides tools services areas enterprise architecture application portfolio management small medium large enterprises company headquarters bonn subsidiary us office boston leanix mentioned gartner magic quadrant enterprise architecture tools 2015 leanix founded jörg beyer andré christ 2012 prior founding leanix jörg beyer andré christ worked various management positions i.e cio deutsche post first 3 years company bootstrapped grew without external funding thanks first product leanix first released october 2012 february 2015 capnamic ventures iris capital invested usd 2.5 mio eur 2.2 mio series financing round 2018 jörg g. beyer retired managing director andré christ stays sole ceo leanix raised 30 million december 2018 round led insight venture partners since founding company focusses exclusively providing software product leanix used customers web-based information platform store information applications architecture company company reports leanix employed media insurance logistics energy manufacturing e-commerce enterprises anywhere 100 100,000 employees customers include axel springer se haworth inc. helvetia insurance kühne nagel ruag rwe zalando one major use case market leading publishing company germany axel springer describes usage leanix part digital transformation organization building bi-modal architecture support traditional fast another use case zalando uses leanix central platform enterprise architecture environment information many microservices gathered automatically injected leanix platform using open rest api product available software service cloud september 2015 company received data privacy certificate leanix global network partners order provide specialised support areas integrations consulting company partnership program place train partners give access knowledge resources certified partners include example enzyme consulting based spain berlin based company signavio among one first out-of-the box integrations product business process management besides integrations tools like jira confluence leanix partnership onelogin single-sign via saml customers build integrations using open source sdks java php python c leanix mentioned gartner magic quadrant enterprise architecture tools 2015 out-of-the-box affordable cloud-based ea tool especially suitable midsize smaller organizations companies different industries written testimonials leanix gartner peer insights mentioning leanix great portfolio management tool apm features 2015 leanix awarded 2nd place innovation award digital transformation
[ 4194 ]
None
4,755
4
Vulnerability_management:vulnerability management vulnerability management cyclical practice identifying classifying prioritizing remediating mitigating software vulnerabilities vulnerability management integral computer security network security must confused vulnerability assessment vulnerabilities discovered vulnerability scanner analyzes computer system search known vulnerabilities open ports insecure software configurations susceptibility malware infections may also identified consulting public sources nvd subscribing commercial vulnerability alerting service symantec deepsight vulnerability datafeed accenture vulnerability intelligence service unknown vulnerabilities zero-day may found fuzz testing identify certain kinds vulnerabilities buffer overflow relevant test cases analysis facilitated test automation addition antivirus software capable heuristic analysis may discover undocumented malware finds software behaving suspiciously attempting overwrite system file correcting vulnerabilities may variously involve installation patch change network security policy reconfiguration software educating users social engineering
[ 3969, 5636, 10385, 4117, 3094, 5404, 8094, 2084, 2213, 939, 11567, 7601, 1474, 5327, 1232, 4689, 4435, 4309, 2262, 1369, 7515, 3552, 612, 3944, 1907, 4471, 2558 ]
None
4,756
4
Moralityware:moralityware moralityware subset malware infects pc intention imposing morality upon user example blocking pornographic websites first cited example appeared eweek example cited trojan deemed yusufali-a sophos said monitor internet explorer title bars content potentially relating pornography upon triggering internet explorer window minimized window take place quote koran translated several languages time trojan display exit button trap mouse cursor within window button attempted clicked displaying message oh 'm cage trojan require computer logged minimum return control mouse remains unclear whether trojan designed joke truly moral guardian regardless anti-virus makers blocking software virus definitions additionally remains seen whether indicates trend malware simply new term one-time occurrence
[ 7515, 10756, 9055 ]
Test
4,757
4
Poor_man's_copyright:poor man copyright poor man copyright method using registered dating postal service notary public highly trusted source date intellectual property thereby helping establish material one possession since particular time concept based notion event intellectual property misused third party poor-man copyright would least establish legally recognized date possession proof third party may possess countries central copyright registration authority difficult author prove work created united kingdom patent office says ... copy could deposited bank solicitor alternatively creator could send copy special delivery post gives clear date stamp envelope leaving envelope unopened return number private companies operate unofficial registers would sensible check carefully paying choosing route important note prove work original created ... provision us copyright law regarding type protection poor man copyright therefore substitute registration according section 101 u.s copyright act 1976 17 u.s.c 408 registration work copyright office prerequisite copyright protection furthermore eric goldman noted absence cases actually giving value poor man copyright
[]
Test
4,758
3
La_Abadía_del_Crimen:la abadía del crimen la abadía del crimen abbey crime computer video game programmed 1987 paco menéndez graphics made juan delcán game originally conceived version umberto eco book name rose however paco menéndez opera soft received reply eco order secure rights name game released la abadía del crimen abbey crime fact original working title novel name rose game videoadventure 3d isometric graphics franciscan friar william occam william baskerville book young novice adso discover perpetrator series murders medieval italian abbey player controls movement friar fra william mistakenly described monk user manual player also possibility control movement novice adso within screen fra william key controlling novice pressed follows fra william time game features characters representing monks abbey behave according programmed artificial intelligence move throughout mapping abbey show series dialogs shown written text moved along lower part screen extensive mapping abbey represented large series screens 3d isometric graphics series objects collected order successfully complete game action occurs seven days subdivided different canonical hours time day current hour indicated bottom left screen game starts abbot welcoming fra william explaining monk disappeared also explains fra william obligated obey orders abbot rules monastery attend religious services meals stay cell night research crimes pursued game novice adso remind players attend offices meals players follow forget way church refectory players disobey orders late services etc. obsequium level indicated bottom right-hand-side screen drop obsequium latin subservience obedience obsequium level drops zero abbot tolerate disrespect longer players leave abbey would result game actions missing prayer office altogether caught wandering around night result immediate expulsion end game game originally developed amstrad cpc 6128 8 bit platform ported systems zx spectrum msx pc amstrad cpc 464 version different 6128 original since several rooms decoration removed fit game 64k 464 spectrum version 128 platform music played game corresponds minuet g major sonata flute bwv 1033 bach crystal palace gwendal original pc version also featured ave maria schubert short chorus recording played speaker player went church form copy protection pc version illegal copy game created church area instead ave maria voice crying pirata pirata pirata several times heard instead game crash game programmed making capacities 8-bit computers taking high level care details plot mapping graphics artificial intelligence characters sound etc made game regarded one best video games made 8-bit computers spite singular qualities expressed positive initial reviews game modest commercial success never officially released outside spain country came achieve cult following game also considered one perfect ten games spectrum 128 according retro gamer
[ 10284, 6797, 9006, 10480, 6129, 499, 10931, 8700, 4758, 823, 5820 ]
Test
4,759
3
Beamrider:beamrider beamrider fixed shooter designed intellivision david rolfe published activision 1983 game ported atari 2600 slightly reduced feature set atari 5200 atari 8-bit family colecovision commodore 64 zx spectrum msx platforms beamrider takes place earth atmosphere large alien shield called restrictor shield surrounds earth player objective clear shield 99 sectors alien craft piloting beamrider ship beamrider equipped short-range laser lariat limited supply torpedoes player given three start sector clear sector fifteen enemy ships must destroyed sentinel ship appear destroyed using torpedo remain bonus points enemy ships destroyed torpedoes must simply dodged occasionally sector yellow rejuvenators extra lives appear picked extra ship shot transform ship-damaging debris activision offered special beamrider patches players could get sector 14 40,000 points sent screenshot accomplishment deseret news 1984 gave colecovision version beamrider three stars describing basically slide-and-shoot space game reviewer commodore described commodore 64 version game really good wholesome arcade zapping game
[ 4361, 10931, 9006 ]
Test
4,760
4
Aladdin_Knowledge_Systems:aladdin knowledge systems aladdin knowledge systems formerly company produced software digital rights management internet security company acquired safenet inc 2009 corporate headquarters located belcamp md aladdin knowledge systems founded 1985 jacob yanki margalit 23 years old soon joined brother dany margalit took responsibility product development age 18 time completing mathematics computer science degree tel aviv university early years company developed two product lines artificial intelligence package dropped early hardware product prevent unauthorized software copying similar digital rights management yanki raised 10,000 initial capital company digital rights management product became success 1993 generated sales 4,000,000 year company initial public offering nasdaq raising 7,900,000 2004 company shares also listed tel aviv stock exchange 2007 company annual revenues reached 105 million mid-2008 vector capital attempting purchase aladdin vector initially offered 14.50 per share aladdin founder margalit refused offer arguing company worth aladdin shareholders agreed merger february 2009 11.50 per share cash march 2009 vector capital acquired aladdin officially merged safenet aladdin hasp product line digital rights management drm suite protection licensing software 40 global market share used 30,000 software publishers used across many platforms windows linux mac hasp stands hardware software piracy company first product evolved complete digital rights management suite includes software option back office management application recent years also software service capability late 1990s company started diversifying began offering internet security network security products offering two product lines etoken portable device two-factor authentication pasdigital identity management mainly deployed usb token esafe line integrated network security content filtering products protecting networks cracked pirated internet-borne software used adobe macromedia 30-days product trials
[ 3521, 3941, 1994, 939, 8330, 11248, 6993, 9745, 467, 10801, 9817, 7327 ]
Test
4,761
7
Cloud28+:cloud28+ cloud28+ worldwide cloud computing services marketplace federation cloud computing organizations developed sponsored hewlett packard enterprise hpe december 2016 world biggest aggregator cloud computing services federation originally launched europe march 2015 aim accelerating cloud adoption europe opened members worldwide november 2016 point around 330 member companies offered around 1,300 infrastructure-as-a-service iaas platform-as-a-service paas software-as-a-service saas services cloud28+ launched hpe event frankfurt germany march 2015 development since april 2014 purpose creating single catalogue european cloud computing services hp trying figure grow ecosystem cloud suppliers europe mapping services providers isvs resellers according hp executive xavier poisson gouyou beauchamps 6 june 2017 poisson cloud leadership award 2017 datacloud europe judges citing growth cloud28+ making selection microsoft joined cloud28+ technology partner july 2017 pledging collaborate hpe create new on-boarding programme designed bring independent software vendors isvs marketplace february 2018 mphasis partnered hpe cloud28+ specific solutions services launch cloud28+ required services catalog built hpe helion version openstack open-source cloud software platform may 2016 support extended include microsoft azure vmware docker technologies service hub also extended app center automates installation docker-based applications
[ 4194, 1638, 6153, 1935, 467, 2910 ]
Validation
4,762
4
University_Toolkit:university toolkit university toolkit software package developed mpaa university system administrators track log types much traffic goes network internet provided university toolkit available free online developer ubuntu operating system toolkit based contacted mpaa requested taken citing gpl violations stating gpl software must source code released gpl well mpaa released source code university toolkit despite supposedly based entirely open-source software specifically snort ntop
[ 9142, 3486 ]
None
4,763
6
Large-file_support:large-file support large-file support lfs term frequently applied ability create files larger either 2 4 gib 32-bit filesystems traditionally many operating systems underlying file system implementations used 32-bit integers represent file sizes positions consequently file could larger 2 − 1 bytes 4 gib − 1 many implementations problem exacerbated treating sizes signed numbers lowered limit 2 − 1 bytes 2 gib − 1 files large 32-bit operating systems handle came known large files limit quite acceptable time hard disks smaller general increase storage capacity combined increased server desktop file usage especially database multimedia files led intense pressure os vendors remove limitation 1996 multiple vendors responded forming industry initiative known large file summit obvious backronym lfs summit tasked define standardized way switch 64-bit numbers represent file sizes merely ensuring sizes treated unsigned numbers would increase limit 2 gib−1 4 gib−1 would stopgap measure given explosive growth data storage nevertheless windows 95b dos 7.10 introduced api extension notably extended file open call access files full 4 gib−1 bytes possible fat16b fat32 volumes applications aware extension continue use traditional file open call thereby still limited maximum 2 gib−1 bytes backward compatibility switch caused deployment issues required design modifications consequences still seen
[ 1501, 2432, 3744, 9665, 9762, 5413, 11418, 10763, 6797, 1775, 2193, 2197, 2901, 3834, 2045 ]
None
4,764
2
Commodore_DOS:commodore dos commodore dos also known cbm dos disk operating system used commodore 8-bit computers unlike doses loaded disk computer ram executed cbm dos executed internally drive dos resides rom chips inside drive run one dedicated mos 6502 family cpus thus data transfer commodore 8-bit computers disk drives closely resembles local area network connection typical disk/host transfers least seven distinctly numbered versions commodore dos known exist following list gives version numbers related disk drives unless otherwise noted drives 5¼-inch format lp code designates low profile drives drives whose model number starts 15 connect via commodore unique cbm-488 serial talk/listen protocols others use parallel ieee-488 version 2.6 far commonly used known dos version due use 1541 part c64 systems revised firmware 1571 fixed relative file bug also identified v3.0 thus possible tell two versions apart version number alone 1541 commodore floppy disk contain 144 files flat namespace subdirectories directory stored reserved track 18 located halfway hub edge 35-track single-sided disk file name may 16 bytes length theoretically unique using direct access methods directory structure possible rename file another—although accessing files may difficult impossible files identical names usually serve purpose except inform visually manage files one popular trick used example final cartridge iii add files named codice_1 type codice_2 directory files could rearranged around lines form groups many game developers warez group members demoscene hackers used clever custom directory entries well file names may contain shifted space character codice_3 directory listing viewed basic portion file name beyond codice_3 character appear separated first part file name quotation mark causing basic consider part full file name feature used create directory entries appear directory listing example user moves cursor beginning line types word codice_5 file size presses basic interprets causing program loaded memory anything colon secondary address executed since computer ignores command load alternatively user could press program automatically null byte embedded file name interrupt listing loading basic three null bytes makes difficult list basic many machine language programmers would experiment null bytes attempt make harder basic programmers access code tamper basic directory accessed non-executable pseudo-basic program case dual drive followed codice_6 first line line number 0 1 indicating drive number showing reverse video name id disk shorthand code dos version created codes vary far dos versions use incompatible disk formats 2a used 5.25-inch dos versions 3d the-3.5 inch 1581 lines size file disk blocks pseudo line number followed file name quotes three-letter type code last line shows number unallocated blocks disk pseudo line number followed words blocks free commodore 64 entering flood screen garbage instead loading directory basic ram drive assigns directory load address 0401 1025 equivalent start basic commodore pet corresponds default screen memory c64 starting second character first line screen viewing directory command overwrites basic program memory dos wedge various third-party cartridges extenders epyx fastload action replay final cartridge iii allow viewing disk directory using special commands load directory screen memory without destroying current basic program versions commodore basic include codice_7 codice_8 command performs function following file types supported presence asterisk codice_19 prepended file type directory listing example codice_20 indicates file properly closed writing drive commanded close file opened writing associated buffer flushed disk block availability map bam updated accurately reflect blocks used program crash problem user removing disk file open results orphan file also referred poison splat file buffers flushed bam accurately reflect disk usage putting disk risk corruption poison file generally accessed opened modify mode attempt use dos codice_21 command delete file may cause filesystem corruption crosslinking practical method removing one files opening file modify mode fixing validating disk see dos codice_22 command latter rebuilds bam removes poison file references directory infamous save-with-replace bug could result creation splat files codice_23 special type written on-disk directory entry files deleted files shown normal directory listing data blocks directory entries reused files subsequently created utility programs allow un-deletion files data blocks directory entries yet overwritten files codice_24 commonly used insert banners comment sections directory listing file types codice_25 example codice_26 locked deleted—they opened reading however commodore dos command explicitly set clear status many third-party utilities written allow done utilities generally read directory using direct-access commands perform necessary modifications raw data write changes back disk accessing files primarily issue host computer kernal rom computer contains necessary primitive routines needed access files basic rom contains higher level abstraction file access using basic syntax components concern dos file name parsing secondary address section give overview necessary basic commands sake completeness opening file commodore disk unit entails processing number parameters vaguely analogous file opening procedures environments since dos actually running drive controller file opening sequence must pass enough information drive assure unambiguous interpretation typical statement basic write sequential file would follows parameters following codice_27 verb follows files also loaded saved codice_5 codice_34 commands file name specifiers also used example saves basic program codice_12 program file saves basic program sequential file secondary address n't specified specified 0 e.g file saved/loaded basic memory area c64 starts default 0801 secondary address specified non-zero value e.g program loaded starting address specified file prg header first two bytes file —this form command common loading machine code programs load relocation first introduced vic-20 machine could start basic ram several different locations depending memory expansion installed older commodore pet series support relocation would effect file would loaded memory region saved load relocation happens host exception said secondary address used device-internally since pet relocate files basic programs written later commodore machines must modified using sector editor change header bytes also possible use pet built-in machine language monitor change link address basic program loading command load first program disk starting file-specified memory location one popular load commands platforms method start majority commercial software example note fact wildcard expansion pick first catalog name file disk accessed name last-used file kept memory subsequent commands load file rather first however always load first file disk directories disks two-drive units accessed codice_36 codice_37 access directory actual files one drive happen named codice_38 partial directories loaded adding colon template example would load partial directory shows files whose name starts letter k type prg partial directories still contain initial disk name line final blocks free line commodore dos also offers save-with-replace command allows file saved existing file without need first codice_39 existing file done prepending codice_40 symbol file name codice_27 codice_34 operation instance years rumors spread beginning 4040 drive bug command implementation first denied commentators prizes offered prove existence bug early 1985 compute magazine advised readers avoid using command year various authors independently published articles proving save-with-replace bug real including methods could triggered affected devices included single-drive 1541 dual-drive 4040 8050 8250 exhibit issue commentators suggested bug could avoided always explicitly specifying codice_29 drive number saving though later shown disk operations without drive number sufficient lead bug bug stemmed fact affected dos implementations modified versions dos contained earlier commodore pet dual drives 8050 created phantom drive codice_44 single-drive systems resulting allocation unnecessary buffer conditions since save-with-replace command used five drive buffers method phantom buffer allocated meet specifications resulted scrambled data written disk conditions september 1986 philip a. slaymaker published article describing great detail cause bug providing patches 1541 drive roms readers eprom burner could produce patched roms could swapped drive commodore made aware slaymaker findings never issued official update original 1541 roms fix bug revision 5 1571 roms also roms 1541-c 1541-ii drives although supported commodore known 1541-ii firmware 1541-c also used original 1541 drive using eproms fix bug drive well previously noted commodore dos accessed via command channel using syntax like used access files issuing commands dos retrieving status error messages generated response commands accomplished opening file device using 15 secondary address example retrieve display device status one could code example codice_45 hold error number zero error exists codice_46 terse text description error codice_47 represent disk track error occurred codice_31 sector track codice_47 error refers error exists equivalent returned four variables note codice_50 run mode verb also programs issue many disk commands customary open file device command channel start program close program finished commodore basic versions 4.0 later provide pseudo-variable referred codice_51 may used retrieve drive status lieu code reserved variable available earlier versions basic command channel must manually read demonstrated note immediately power-on reset dos revision returned example 1541 return error code 73 common drive models may used determine drive reset power-on state also command seeking relative type files codice_52 several block-level direct-access commands codice_53 codice_54 codice_55 block management codice_56 codice_57 drive memory manipulation execution program code drive processor codice_58 codice_59 codice_60 codice_61 user-definable functions codice_62 codice_63 commands theoretically user-definable functions rededicated accessing new functionality dos versions 1.0
[ 9477, 10257, 6675, 6167, 9756, 6813, 7969, 5293, 8494, 823, 6843, 9549, 477, 11494, 2665, 5359, 1776, 7281, 2933 ]
Train
4,765
4
Navidad_virus:navidad virus w32.navidad mass-mailing worm program virus discovered december 2000 designed spread email clients microsoft outlook masquerading electronic christmas card infected computers identified blue eye icons appear windows system tray users move mouse cursor eye icons presented variety different messages including one states emmanuel-god us may god bless u.and ash lk lj
[ 2041, 7515, 6797 ]
Test
4,766
3
Golden_Basket:golden basket golden basket 1990 computer basketball game developed published opera soft opera sports label zx spectrum amstrad cpc msx ms-dos game features five-a-side basketball match showing lateral view
[ 9166, 9006 ]
Test
4,767
3
Socket_AM3+:socket am3+ am3+ modification am3 socket released mid-2011 designed cpus use amd bulldozer microarchitecture retains compatibility am3 processors vishera line amd cpus also use socket am3+ am3+ socket specification contains noteworthy design changes am3 predecessor 942 pin count am3+ increase one compared am3 socket layout am3+ socket larger pin socket diameter 0.51 mm compared 0.45 mm am3 socket faster serial link 3400 khz cpu power controller compared 400 khz am3+ socket offers improved power regulation power quality specifications including increased maximum current support 145 versus 110 also redesigned cpu cooler retention harness allowing slightly better airflow cpu cooling retaining cooler backward compatibility manufacturers brought am3+ support am3 motherboards via simple bios upgrade mechanical compatibility confirmed possible am3+ cpus fit am3 boards provided supply enough peak current another issue use sideband temperature sensor interface reading temperature cpu therefore cpu pwm fan headers may run full speed also certain power-saving features may work due lack support rapid vcore switching am3+ cpus technically pin-compatible am2 am2+ boards work due lack ddr2 controller cpu 4 holes fastening heatsink motherboard placed rectangle lateral lengths 48 mm 96 mm amd sockets socket am2 socket am2+ socket am3 socket am3+ socket fm2 cooling solutions therefore interchangeable
[ 3586, 9475, 3588, 8452, 3464, 4872, 5645, 398, 7058, 10260, 4246, 7963, 2463, 7712, 9122, 1322, 2094, 11183, 1329, 3892, 8629, 9400, 6978, 11331, 9157, 3783, 7247, 9551, 10833, 7122, 9427, 7132, 2525, 1501, 4451, 5859, 1515, 1260, 7788, 7...
Test
4,768
5
VoiceXML:voicexml voicexml vxml digital document standard specifying interactive media voice dialogs humans computers used developing audio voice response applications banking systems automated customer service portals voicexml applications developed deployed manner analogous web browser interprets visually renders hypertext markup language html receives web server voicexml documents interpreted voice browser common deployment architectures users interact voice browsers via public switched telephone network pstn voicexml document format based extensible markup language xml standard developed world wide web consortium w3c voicexml applications commonly used many industries segments commerce applications include order inquiry package tracking driving directions emergency notification wake-up flight tracking voice access email customer relationship management prescription refilling audio news magazines voice dialing real-estate information national directory assistance applications voicexml tags instruct voice browser provide speech synthesis automatic speech recognition dialog management audio playback following example voicexml document interpreted voicexml interpreter output hello world synthesized speech typically http used transport protocol fetching voicexml pages applications may use static voicexml pages others rely dynamic voicexml page generation using application server like tomcat weblogic iis websphere historically voicexml platform vendors implemented standard different ways added proprietary features voicexml 2.0 standard adopted w3c recommendation 16 march 2004 clarified areas difference voicexml forum industry group promoting use standard provides conformance testing process certifies vendors implementations conformant corporation ibm lucent motorola formed voicexml forum march 1999 order develop standard markup language specifying voice dialogs september 1999 forum released voicexml 0.9 member comment march 2000 published voicexml 1.0 soon afterwards forum turned control standard w3c w3c produced several intermediate versions voicexml 2.0 reached final recommendation stage march 2004 voicexml 2.1 added relatively small set additional features voicexml 2.0 based feedback implementations 2.0 standard backward compatible voicexml 2.0 reached w3c recommendation status june 2007 voicexml 3.0 next major release voicexml new major features includes new xml statechart description language called scxml w3c speech interface framework also defines standards closely associated voicexml speech recognition grammar specification srgs used tell speech recognizer sentence patterns expect hear patterns called grammars speech recognizer determines likely sentence heard needs extract semantic meaning sentence return voicexml interpreter semantic interpretation specified via semantic interpretation speech recognition sisr standard sisr used inside srgs specify semantic results associated grammars i.e. set ecmascript assignments create semantic structure returned speech recognizer speech synthesis markup language ssml used decorate textual prompts information best render synthetic speech example speech synthesizer voice use speak louder softer pronunciation lexicon specification pls used define words pronounced generated pronunciation information meant used speech recognizers speech synthesizers voice browsing applications call control extensible markup language ccxml complementary w3c standard ccxml interpreter used voicexml platforms handle initial call setup caller voice browser provide telephony services like call transfer disconnect voice browser ccxml also used non-voicexml contexts media server applications often necessary several call legs interact example multi-party conference deficiencies identified voicexml application companies designed specific scripting languages deal environment media server markup language msml convedia solution media server control markup language mscml snowshore solution snowshore owned dialogic convedia owned radisys languages also contain 'hooks external scripts like voicexml run call legs ivr functionality required ietf working group called mediactrl media control working successor scripting systems hoped progress open widely adopted standard
[ 11650, 8070, 7943, 5907, 8854, 2590, 7455, 10910, 10791, 6838, 10557, 11004, 3533, 1363, 214, 4439, 8923, 479, 225, 6629, 4461, 10611, 4213, 502, 6775, 2296, 10486, 3323, 124 ]
Test
4,769
9
Simon_Peyton_Jones:simon peyton jones simon peyton jones born 18 january 1958 british computer scientist researches implementation applications functional programming languages particularly lazy functional programming peyton jones graduated trinity college cambridge 1980 went complete cambridge diploma computer science peyton jones worked industry two years serving lecturer university college london 1990 1998 professor university glasgow since 1998 worked researcher microsoft research cambridge england major contributor design haskell programming language lead developer glasgow haskell compiler ghc also co-creator programming language designed intermediate program representation language-specific front-end compiler general-purpose back-end code generator optimiser c -- used ghc also major contributor 1999 book cybernauts awake explored ethical spiritual implications internet peyton jones chairs computing school cas group organisation aims promote teaching computer science school following efforts 2019 appointed chair newly founded uk national centre computing education 2004 inducted fellow association computing machinery contributions functional programming languages 2011 received membership academia europaea 2011 simon marlow awarded sigplan programming languages software award work ghc received honorary doctorate university glasgow 2013 honorary doctorate university kent 2017 elected fellow royal society frs 2016 distinguished fellow british computer society dfbcs 2017
[ 3876, 1382, 1768, 4392, 6536, 8491, 2381, 3823, 1783, 9914, 2682, 219, 5885 ]
None
4,770
9
Very_high-level_programming_language:high-level programming language high-level programming language vhll programming language high level abstraction used primarily professional programmer productivity tool high-level programming languages usually domain-specific languages limited specific application purpose type task often scripting languages especially extension languages controlling specific environment reason high-level programming languages often referred goal-oriented programming languages term vhll used 1990s today often called high-level programming languages used scripting perl python ruby visual basic
[ 9345, 2691, 8582, 6919, 9224, 5395, 5651, 5527, 9626, 3613, 9245, 5680, 9780, 1591, 4410, 191, 4035, 10819, 8262, 9926, 4042, 847, 5585, 5845, 477, 8671, 7395, 4838, 11497, 8554, 9330, 9331, 2556, 7421 ]
None
4,771
2
Windows_Management_Instrumentation:windows management instrumentation windows management instrumentation wmi consists set extensions windows driver model provides operating system interface instrumented components provide information notification wmi microsoft implementation web-based enterprise management wbem common information model cim standards distributed management task force dmtf wmi allows scripting languages vbscript windows powershell manage microsoft windows personal computers servers locally remotely wmi comes preinstalled windows 2000 newer microsoft oses available download windows nt windows 95 windows 98 microsoft also provides command-line interface wmi called windows management instrumentation command-line wmic purpose wmi define proprietary set environment-independent specifications allow management information shared management applications wmi prescribes enterprise management standards related technologies windows work existing management standards desktop management interface dmi snmp wmi complements standards providing uniform model model represents managed environment management data source accessed common way wmi abstracts manageable entities cim collection providers development provider implies several steps major steps summarized follows since release first wmi implementation windows nt 4.0 sp4 era out-of-band download microsoft consistently added wmi providers windows many customers interpreted growth numbers providers sign wmi become microsoft ubiquitous management layer windows even microsoft never made commitment explicit constant increasing exposure management data wmi windows people systems management field started develop scripts automation procedures based wmi beyond scripting needs leading management-software packages mom sccm ads hp openview windows hpov bmc software ca inc. wmi-enabled capable consuming providing wmi information various user interfaces enables administrators operators capable scripting programming top wmi enjoy benefits wmi without even learning however want wmi scriptable gives opportunity consume wmi information scripts wmi-aware enterprise-management software someone willing develop one many wmi providers wmi offers many features box important advantages wmi tools also useful design development phases tools .net framework managementclass class represents common information model cim management class wmi class win32_logicaldisk case disk drive win32_process running program like notepad.exe example shows msndis_80211_servicesetidentifier wmi class used find ssid wi-fi network system currently connected language c msndis_80211_servicesetidentifier wmi class supported windows xp windows server 2003 wmi extensions wdm provide kernel-level instrumentation publishing information configuring device settings supplying event notification device drivers allowing administrators set data security wmi provider known wdm provider extensions part wdm architecture however broad utility used types drivers well scsi ndis wmi driver extensions service monitors drivers event trace providers configured publish wmi event trace information instrumented hardware data provided way drivers instrumented wmi extensions wdm wmi extensions wdm provide set windows device driver interfaces instrumenting data within driver models native windows oems ihvs easily extend instrumented data set add value hardware/software solution wmi driver extensions however supported windows vista later operating systems
[ 9216, 9728, 10243, 11270, 2568, 5643, 4624, 10769, 6674, 1043, 9234, 6168, 537, 8729, 540, 3102, 1055, 9762, 2083, 8227, 8740, 1577, 10281, 4143, 9263, 9780, 1077, 2101, 1079, 8246, 11316, 10812, 3133, 3648, 10310, 1098, 7754, 10828, 4173, ...
None
4,772
4
DenyHosts:denyhosts denyhosts log-based intrusion-prevention security tool ssh servers written python intended prevent brute-force attacks ssh servers monitoring invalid login attempts authentication log blocking originating ip addresses denyhosts developed phil schwartz also developer kodos python regular expression debugger denyhosts checks end authentication log recent failed login attempts records information originating ip addresses compares number invalid attempts user-specified threshold many invalid attempts assumes dictionary attack occurring prevents ip address making attempts adding codice_1 server denyhosts 2.0 support centralized synchronization repeat offenders blocked many computers site denyhosts.net gathers statistics computers running software denyhosts restricted connections using ipv4 work ipv6 denyhosts may run manually daemon cron job july 2007 register reported may july year compromised computers oracle uk listed among ten worst offenders launching brute force ssh attacks internet according public denyhosts listings investigation oracle able refute suggestions computers compromised daniel b. cid wrote paper showing denyhosts well similar programs fail2ban blockhosts vulnerable remote log injection attack technique similar sql injection specially crafted user name used trigger block site chosen attacker fixed version 2.6 since development original author phil schwartz release version 2.6 december 2006 claimed version 2.7 november 2008 actual downloadable package available development first continued february 2012 matt ruffalo github repository independent separate fork started almost-identically named denyhost sourceforge project site release different version 2.7 may 2014 version 2.9 new sourceforge project merged earlier github repository newer versions available via means software runs centralized synchronization server denyhosts versions 2.0 use never released independent synchronization server software developed jan-pascal van best since june 2015 general references
[ 5470, 899, 2884, 3717, 7556, 7557, 10341, 8554, 7983, 11407, 11221, 823, 186, 6363, 5469, 4349, 2558 ]
Validation
4,773
3
ARM_Cortex-M:arm cortex-m arm cortex-m group 32-bit risc arm processor cores licensed arm holdings intended microcontroller use shipped tens billions devices cores consist cortex-m0 cortex-m0+ cortex-m1 cortex-m3 cortex-m4 cortex-m7 cortex-m23 cortex-m33 cortex-m35p cortex-m4 m7 m33 m35p cores fpu silicon option included silicon cores known cortex-mx fpu cortex-mxf x core number arm cortex-m family arm microprocessor cores designed use microcontrollers asics assps fpgas socs cortex-m cores commonly used dedicated microcontroller chips also hidden inside soc chips power management controllers i/o controllers system controllers touch screen controllers smart battery controllers sensors controllers though 8-bit microcontrollers popular past cortex-m slowly chipping away 8-bit market prices low-end cortex-m chips moved downward cortex-m become popular replacements 8-bit chips applications benefit 32-bit math operations replacing older legacy arm cores arm7 arm9 arm holdings neither manufactures sells cpu devices based designs rather licenses processor architecture interested parties arm offers variety licensing terms varying cost deliverables licensees arm provides integratable hardware description arm core well complete software development toolset right sell manufactured silicon containing arm cpu integrated device manufacturers idm receive arm processor ip synthesizable rtl written verilog form ability perform architectural level optimizations extensions allows manufacturer achieve custom design goals higher clock speed low power consumption instruction set extensions including floating point optimizations size debug support etc determine components included particular arm cpu chip consult manufacturer datasheet related documentation silicon options cortex-m cores additional silicon options cortex-m0 m0+ m1 implement armv6-m architecture cortex-m3 implements armv7-m architecture cortex-m4 cortex-m7 implements armv7e-m architecture architectures binary instruction upward compatible armv6-m armv7-m armv7e-m. binary instructions available cortex-m0 cortex-m0+ cortex-m1 execute without modification cortex-m3 cortex-m4 cortex-m7 binary instructions available cortex-m3 execute without modification cortex-m4 cortex-m7 cortex-m33 cortex-m35p thumb-1 thumb-2 instruction sets supported cortex-m architectures legacy 32-bit arm instruction set n't supported six cortex-m cores implement common subset instructions consists thumb-1 thumb-2 including 32-bit result multiply cortex-m0 cortex-m0+ cortex-m1 cortex-m23 designed create smallest silicon die thus fewest instructions cortex-m family cortex-m0 m0+ m1 include thumb-1 instructions except new instructions cbz cbnz added armv7-m architecture cortex-m0 m0+ m1 include minor subset thumb-2 instructions bl dmb dsb isb mrs msr cortex-m3 m4 m7 m33 m35p base thumb-1 thumb-2 instructions cortex-m3 adds three thumb-1 instructions thumb-2 instructions hardware integer divide saturation arithmetic instructions cortex-m4 adds dsp instructions optional single-precision floating-point unit vfpv4-sp cortex-m7 adds optional double-precision fpu vfpv5 cortex-m23 m33 add trustzone instructions arm architecture arm cortex-m series removed features older legacy cores capabilities 32-bit arm instruction set duplicated many ways thumb-1 thumb-2 instruction sets arm features n't similar feature 16-bit thumb-1 instruction set evolved time since first released legacy arm7t cores armv4t architecture new thumb-1 instructions added legacy armv5 armv6 armv6t2 architectures released 16-bit thumb-1 instructions removed cortex-m cores cortex-m0 core optimized small silicon die size use lowest price chips key features cortex-m0 core silicon options following microcontrollers based cortex-m0 core following chips cortex-m0 secondary core cortex-m0+ optimized superset cortex-m0 cortex-m0+ complete instruction set compatibility cortex-m0 thus allowing use compiler debug tools cortex-m0+ pipeline reduced 3 2 stages lowers power usage addition debug features existing cortex-m0 silicon option added cortex-m0+ called micro trace buffer mtb provides simple instruction trace buffer cortex-m0+ also received cortex-m3 cortex-m4 features added silicon options memory protection unit mpu vector table relocation key features cortex-m0+ core silicon options following microcontrollers based cortex-m0+ core following chips cortex-m0+ secondary core smallest arm microcontrollers cortex-m0+ type 2014 smallest 1.6 mm 2 mm kinetis kl03 21 june 2018 world smallest computer computer device announced based arm cortex-m0+ including ram wireless transmitters receivers based photovoltaics university michigan researchers 2018 symposia vlsi technology circuits paper 0.04mm3 16nw wireless batteryless sensor system integrated cortex-m0+ processor optical communication cellular temperature measurement device 1/10th size ibm previously claimed world-record-sized computer months back march 2018 smaller grain salt cortex-m1 optimized core especially designed loaded fpga chips key features cortex-m1 core silicon options following vendors support cortex-m1 soft-cores fpga chips key features cortex-m3 core silicon options following microcontrollers based cortex-m3 core following chips cortex-m3 secondary core following fpgas include cortex-m3 core following vendors support cortex-m3 soft-cores fpga chips conceptually cortex-m4 cortex-m3 plus dsp instructions optional floating-point unit fpu core fpu known cortex-m4f key features cortex-m4 core silicon options following microcontrollers based cortex-m4 core following microcontrollers based cortex-m4f m4 fpu core following chips either cortex-m4 m4f secondary core cortex-m7 high-performance core almost double power efficiency older cortex-m4 features 6-stage superscalar pipeline branch prediction optional floating-point unit capable single-precision optionally double-precision operations instruction data buses enlarged 64-bit wide previous 32-bit buses core contains fpu known cortex-m7f otherwise cortex-m7 key features cortex-m7 core silicon options following microcontrollers based cortex-m7 core cortex-m23 core announced october 2016 based newer armv8-m architecture previously announced november 2015 conceptually cortex-m23 similar cortex-m0+ plus integer divide instructions trustzone security features also 2-stage instruction pipeline key features cortex-m23 core silicon options following microcontrollers based cortex-m23 core cortex-m33 core announced october 2016 based newer armv8-m architecture previously announced november 2015 conceptually cortex-m33 similar cross cortex-m4 cortex-m23 also 3-stage instruction pipeline key features cortex-m33 core silicon options following microcontrollers based cortex-m33 core cortex-m35p core announced may 2018 conceptually cortex-m33 core new instruction cache plus new tamper-resistant hardware concepts borrowed arm securcore family configurable parity ecc features limited public information currently available cortex-m35p technical reference manual released 2019 following microcontrollers based cortex-m35p core documentation arm chips extensive past 8-bit microcontroller documentation would typically fit single document microcontrollers evolved everything required support documentation package arm chips typically consists collection documents ic manufacturer well cpu core vendor arm holdings typical top-down documentation tree ic manufacturers additional documents evaluation board user manuals application notes getting started guides software library documents errata see external links section links official arm documents
[ 7170, 11267, 10767, 8720, 11282, 9235, 11289, 1057, 38, 8231, 4139, 2097, 11314, 8250, 6716, 8253, 6207, 7745, 7234, 7235, 7747, 11333, 2635, 8268, 3159, 7774, 99, 7269, 1126, 8812, 11374, 7281, 10361, 1660, 638, 11395, 644, 8842, 7820, 1...
Validation
4,774
9
Planner_(programming_language):planner programming language planner often seen publications planner although acronym programming language designed carl hewitt mit first published 1969 first subsets micro-planner pico-planner implemented essentially whole language implemented popler julian davies university edinburgh pop-2 programming language derivations qa4 conniver qlisp ether see scientific community metaphor important tools artificial intelligence research 1970s influenced commercial developments kee art two major paradigms constructing semantic software systems procedural logical procedural paradigm epitomized lisp mccarthy et al 1962 featured recursive procedures operated list structures logical paradigm epitomized uniform proof procedure resolution theorem provers robinson 1965 according logical paradigm “ cheating ” incorporate procedural knowledge green 1969 planner invented purposes procedural embedding knowledge hewitt 1971 rejection resolution uniform proof procedure paradigm robinson 1965 planner kind hybrid procedural logical paradigms combined programmability logical reasoning planner featured procedural interpretation logical sentences implication form p implies q procedurally interpreted following ways using pattern-directed invocation respect development planner influenced natural deductive logical systems especially one frederic fitch 1952 subset called micro-planner implemented gerry sussman eugene charniak terry winograd sussman charniak winograd 1971 used winograd natural-language understanding program shrdlu eugene charniak story understanding work thorne mccarty work legal reasoning projects generated great deal excitement field ai also generated controversy proposed alternative logic approach one mainstay paradigms ai sri international jeff rulifson jan derksen richard waldinger developed qa4 built constructs planner introduced context mechanism provide modularity expressions database earl sacerdoti rene reboh developed qlisp extension qa4 embedded interlisp providing planner-like reasoning embedded procedural language developed rich programming environment qlisp used richard waldinger karl levitt program verification earl sacerdoti planning execution monitoring jean-claude latombe computer-aided design richard fikes deductive retrieval steven coles early expert system guided use econometric model computers expensive single slow processor memories small comparison today planner adopted efficiency expedients including following gerry sussman eugene charniak seymour papert terry winograd visited university edinburgh 1971 spreading news micro-planner shrdlu casting doubt resolution uniform proof procedure approach mainstay edinburgh logicists university edinburgh bruce anderson implemented subset micro-planner called pico-planner anderson 1972 julian davies 1973 implemented essentially planner according donald mackenzie pat hayes recalled impact visit papert edinburgh become heart artificial intelligence logicland according papert mit colleague carl hewitt papert eloquently voiced critique resolution approach dominant edinburgh …and least one person upped sticks left papert mackenzie 2001 p 82 developments generated tension among logicists edinburgh tensions exacerbated uk science research council commissioned sir james lighthill write report ai research situation uk resulting report nowiki /nowiki lighthill 1973 mccarthy 1973 highly critical although shrdlu favorably mentioned pat hayes visited stanford learned planner returned edinburgh tried influence friend bob kowalski take planner account joint work automated theorem proving resolution theorem-proving demoted hot topic relic misguided past bob kowalski doggedly stuck faith potential resolution theorem proving carefully studied planner. ” according bruynooghe pereira siekmann van emden 2004 kowalski 1988 states recall trying convince hewitt planner similar sl-resolution planner invented purposes procedural embedding knowledge rejection resolution uniform proof procedure paradigm colmerauer roussel recalled reaction learning planner following way attending ijcai convention september ‘ 71 jean trudel met robert kowalski heard lecture terry winograd natural language processing fact use unified formalism left us puzzled time learned existence carl hewitt ’ programming language planner hewitt 1969 lack formalization language ignorance lisp fact absolutely devoted logic meant work little influence later research nowiki /nowiki colmerauer roussel 1996 fall 1972 philippe roussel implemented language called prolog abbreviation programmation en logique – french programming logic prolog programs generically following form special case backward-chaining planner prolog duplicated following aspects micro-planner prolog also duplicated following capabilities micro-planner pragmatically useful computers era saved space time use unique name assumption negation failure became questionable attention turned open systems hewitt de jong 1983 hewitt 1985 hewitt inman 1991 following capabilities micro-planner omitted prolog prolog include negation part raises implementation issues consider example negation included following prolog program program would unable prove p even though follows rules mathematical logic illustration fact prolog like planner intended programming language prove many logical consequences follow declarative reading programs work prolog valuable much simpler planner however need arose greater expressive power language prolog began include many capabilities planner left original version prolog
[ 10083, 8421, 6502, 8262, 9288, 5361, 10547, 3446, 9975, 4025, 1147, 4799 ]
None
4,775
2
Portage_(software):portage software portage package management system originally created used gentoo linux also chrome os sabayon funtoo linux among others portage based concept ports collections gentoo sometimes referred meta-distribution due extreme flexibility portage makes operating-system-independent gentoo/alt project concerned using portage manage operating systems bsds macos solaris notable implementations gentoo/freebsd project ongoing effort called package manager specification project pms standardise document behaviour portage allowing ebuild tree gentoo system packages used alternative package managers paludis pkgcore goal specify exact set features behaviour package managers ebuilds serving authoritative reference portage portage similar bsd-style package management known ports originally designed freebsd ports mind portage written python programming language main utility defines gentoo although system known portage consists two main parts ebuild system emerge ebuild system takes care actual work building installing packages emerge provides interface ebuild managing ebuild repository resolving dependencies similar issues two therefore roughly relation rpm yum dpkg apt gtk+-based gui porthole available working portage also himerge gui stands haskell interface emerge portage characterized main function compiling source code packages user wishes install allows customization compiler target-application options fit system specifications user wishes functionalities related system management include allowing parallel package-version installation tracking cross-package dependencies managing database installed packages providing local ebuild repository synchronizing local portage tree remote repositories functionalities related individual package installation include specifying compilation settings target machine choosing package components portage distinguishes three levels stability ebuilds stable e.g. software works intended known security issues time release keyword masked mainly packages sufficiently tested target system architecture considered stable hard masked broken insecure packages emerge command-line tool heart portage command customizable many options modifiers emerge tool important utility accessing features portage command line program calculates manages dependencies executes ebuilds maintains local portage tree database installed packages compilation settings used ebuilds changed cflags environment variable based specifications individual computer user desire optimization emerge utility executes ebuilds sandbox environment way system protected software executed ebuild resulting binaries merged successful build sandboxed install emerge installs dependencies affected use flag-settings decide optional features included installing upgrading application emerge command also used download install precompiled binary files portage system offers use use flags allows users indicate software features would like include exclude building packages example use flag include dvd support available packages compiled flag enabled use flags affect dependencies required generally affecting optional features built given program compiled example packages use configure script use flag codice_1 would translate codice_2 specification use flags usual way configure programs gentoo use flags may set manually via user-friendly tools 'ufed use flag editor lists flags along description list available use flags available gentoo website use flag index gentoo default use binary packages package management systems like pacman employing instead format known ebuild whereas rpm binaries precompiled binaries ebuilds shell scripts variables functions contain description software instructions obtain configure compile install closely akin powerful .spec files distributed srpms 19,000 ebuilds available majority distributed gentoo mirrors new updated ebuilds obtained synchronizing local ebuild repository mirrors done executing command codice_3 historically gentoo provided pre-compiled binary packages many common programs especially lengthy compile mozilla firefox openoffice.org still installed emerge appending -bin package name instead install binary version gentoo binary packaging format .tbz2 file tar bzip2 compression additional metadata feature enables building binary packages one system using portage codice_4 codice_5 followed quick installation identical systems portage codice_6 codice_7 see portage features gentoo linux handbook information masking gentoo determines packages suitable system ebuilds designed different architectures experimental software usually masked manner prevents stable system installing without user intervention packages generally require testing often work fine said keyword masked i.e available systems accept_keywords make.conf entry starting character codice_8 codice_9 codice_10 codice_11 standard way unmask individual keyword masked package adding file full package name keyword codice_12 users make subdirectories well allowing custom organization example masked package multiple masked dependencies user could make directory name original masked package put mask files package dependencies directory scheme replaces older scheme codice_13 text file list packages known problems considered mature enough candidates stable hard masked one various package.mask files /usr/portage/profiles entries generally accompanied comment developers explaining reason mask
[ 10760, 7181, 8213, 6680, 9245, 5155, 5670, 7722, 5677, 3131, 3649, 10817, 3667, 6227, 9324, 6257, 1138, 2168, 7293, 9342, 6797, 10387, 10900, 10394, 7847, 6828, 9902, 9908, 5819, 190, 4302, 2259, 6361, 8413, 741, 10469, 231, 2281, 4841, 2...
Test
4,776
1
Database_seeding:database seeding database seeding initial seeding database data seeding database process initial set data provided database installed especially useful want populate database data want develop future often automated process executed upon initial setup application data dummy data necessary data initial administrator account \migrations\configuration.cs appbundle/datafixtures/orm/customer.yml version 1 hautelook/alicebundle app/database/seeds/users.php
[ 3821 ]
Test
4,777
9
Lua_(programming_language):lua programming language lua meaning moon lightweight high-level multi-paradigm programming language designed primarily embedded use applications lua cross-platform since interpreter compiled bytecode written ansi c lua relatively simple c api embed applications lua originally designed 1993 language extending software applications meet increasing demand customization time provided basic facilities procedural programming languages complicated domain-specific features included rather included mechanisms extending language allowing programmers implement features lua intended general embeddable extension language designers lua focused improving speed portability extensibility ease-of-use development lua created 1993 roberto ierusalimschy luiz henrique de figueiredo waldemar celes members computer graphics technology group tecgraf pontifical catholic university rio de janeiro brazil 1977 1992 brazil policy strong trade barriers called market reserve computer hardware software atmosphere tecgraf clients could afford either politically financially buy customized software abroad reasons led tecgraf implement basic tools needed scratch lua predecessors data-description/configuration languages sol simple object language del data-entry language independently developed tecgraf 1992–1993 add flexibility two different projects interactive graphical programs engineering applications petrobras company lack flow-control structures sol del petrobras felt growing need add full programming power evolution lua language authors wrote lua 1.0 designed way object constructors slightly different current light flexible style incorporated data-description syntax sol hence name lua sol also portuguese word sun lua word moon lua syntax control structures mostly borrowed modula codice_1 codice_2 codice_3/codice_4 also taken influence clu multiple assignments multiple returns function calls simpler alternative reference parameters explicit pointers c++ neat idea allowing local variable declared need snobol awk associative arrays article published dr. dobb journal lua creators also state lisp scheme single ubiquitous data-structure mechanism list major influence decision develop table primary data structure lua lua semantics increasingly influenced scheme time especially introduction anonymous functions full lexical scoping several features added new lua versions versions lua prior version 5.0 released license similar bsd license version 5.0 onwards lua licensed mit license permissive free software licences almost identical lua commonly described multi-paradigm language providing small set general features extended fit different problem types lua contain explicit support inheritance allows implemented metatables similarly lua allows programmers implement namespaces classes related features using single table implementation first-class functions allow employment many techniques functional programming full lexical scoping allows fine-grained information hiding enforce principle least privilege general lua strives provide simple flexible meta-features extended needed rather supply feature-set specific one programming paradigm result base language light—the full reference interpreter 247 kb compiled—and easily adaptable broad range applications lua dynamically typed language intended use extension scripting language compact enough fit variety host platforms supports small number atomic data structures boolean values numbers double-precision floating point 64-bit integers default strings typical data structures arrays sets lists records represented using lua single native data structure table essentially heterogeneous associative array lua implements small set advanced features first-class functions garbage collection closures proper tail calls coercion automatic conversion string number values run time coroutines cooperative multitasking dynamic module loading classic hello world program written follows print hello world print 'hello world comment lua starts double-hyphen runs end line similar ada eiffel haskell sql vhdl multi-line strings comments adorned double square brackets factorial function implemented function example function factorial n end lua four types loops codice_2 loop codice_3 loop similar codice_7 loop numeric codice_8 loop generic codice_8 loop -- condition true condition end repeat condition first last delta -- delta may negative allowing loop count end generic codice_8 loop key value pairs _g end would iterate table codice_11 using standard iterator function codice_12 returns codice_13 also nested loop loop inside another loop local grid row ipairs grid end lua treatment functions first-class values shown following example print function behavior modified end future calls codice_14 routed new function lua lexical scoping old print function accessible new modified print lua also supports closures demonstrated function addto x end fourplus addto 4 print fourplus 3 -- prints 7 -- also achieved calling function following way print addto 4 3 -- calling returned function 'addto 4 argument 3 directly new closure variable codice_15 created every time codice_16 called new anonymous function returned always access codice_15 parameter closure managed lua garbage collector like object tables important data structures design built-in composite data type lua foundation user-created types conceptually similar associative arrays php dictionaries python hashes ruby perl table collection key data pairs data referenced key words hashed heterogeneous associative array tables created using codice_18 constructor syntax tables always passed reference see call sharing key index value except codice_13 nan including functions table often used structure record using strings keys use common lua features special syntax accessing fields using table store related functions act namespace tables automatically assigned numerical key enabling used array data type first automatic index 1 rather 0 many programming languages though explicit index 0 allowed numeric key codice_20 distinct string key codice_21 length table codice_22 defined integer index codice_23 codice_24 codice_13 codice_26 codice_13 moreover codice_28 codice_13 codice_23 zero regular array non-nil values 1 given codice_23 length exactly codice_23 index last value array holes nil values non-nil values codice_33 indices directly precedes codice_13 value may consider nil value end array table array objects using hash map emulate array normally slower using actual array however lua tables optimized use arrays help avoid issue extensible semantics key feature lua metatable concept allows lua tables customized powerful ways following example demonstrates infinite table codice_23 codice_36 give codice_23-th fibonacci number using dynamic programming memoization fibs 1 1 -- initial values fibs 1 fibs 2 setmetatable fibs although lua built-in concept classes object-oriented programming achieved using two language features first-class functions tables placing functions related data table object formed inheritance single multiple implemented using metatable mechanism telling object look nonexistent methods fields parent object concept class techniques rather prototypes used similar self javascript new objects created either factory method constructs new objects scratch cloning existing object lua provides syntactic sugar facilitate object orientation declare member functions inside prototype table one use equivalent calling class methods also makes use colon equivalent creating basic vector object vector.__index vector function vector new x z -- constructor end function vector magnitude -- another method end local vec vector new 0 1 0 -- create vector print vec magnitude -- call method output 1 print vec.x -- access member variable output 0 lua programs interpreted directly textual lua file compiled bytecode run lua virtual machine compilation process typically invisible user performed run-time done offline order increase loading performance reduce memory footprint host environment leaving compiler lua bytecode also produced executed within lua using codice_38 function string library codice_39 functions lua version 5.3.4 implemented approximately 24,000 lines c code like cpus unlike virtual machines stack-based lua vm register-based therefore closely resembles actual hardware design register architecture avoids excessive copying values reduces total number instructions per function virtual machine lua 5 one first register-based pure vms wide use perl's parrot android dalvik two well-known register-based vms example bytecode listing factorial function defined shown codice_40 5.1 compiler lua intended embedded applications provides c api purpose api divided two parts lua core lua auxiliary library lua api design eliminates need manual reference management c code unlike python api api like language minimalistic advanced functionality provided auxiliary library consists largely preprocessor macros assist complex table operations lua c api stack based lua provides functions push pop simple c data types integers floats etc stack well functions manipulating tables stack lua stack somewhat different traditional stack stack indexed directly example negative indices indicate offsets top stack example −1 top recently pushed value positive indices indicate offsets bottom oldest value marshalling data c lua functions also done using stack call lua function arguments pushed onto stack codice_41 used call actual function writing c function directly called lua arguments read stack example calling lua function c int main void running example gives c api also provides special tables located various pseudo-indices lua stack codice_42 prior lua 5.2 globals table codice_11 within lua main namespace also registry located codice_44 c programs store lua values later retrieval possible write extension modules using lua api extension modules shared objects used extend functionality interpreter providing native facilities lua scripts lua side module appears namespace table holding functions variables lua scripts may load extension modules using codice_45 like modules written lua growing collection modules known rocks available package management system called luarocks spirit cpan rubygems python eggs prewritten lua bindings exist popular programming languages including scripting languages c++ number template-based approaches automatic binding generators video game development lua widely used scripting language game programmers perhaps due perceived easiness embed fast execution short learning curve 2003 poll conducted gamedev.net showed lua popular scripting language game programming 12 january 2012 lua announced winner front line award 2011 magazine game developer category programming tools large number non-game applications also use lua extensibility luatex implementation tex type-setting language redis key-value database nginx web server scribunto extension lua available scripting language mediawiki software powers wikipedia wikis among uses allowing integration data wikidata articles powering
[ 515, 3076, 10761, 2576, 6160, 8720, 1556, 9245, 546, 8739, 2603, 5677, 50, 2098, 5684, 9780, 1591, 9783, 2105, 2617, 6718, 11326, 8771, 10819, 8262, 6731, 1101, 10317, 9808, 595, 84, 6228, 4182, 10835, 7256, 7769, 2138, 4186, 10841, 11357...
Test
4,778
5
Financial_Information_eXchange:financial information exchange financial information exchange fix protocol electronic communications protocol initiated 1992 international real-time exchange information related securities transactions markets trillions dollars traded annually nasdaq alone financial service entities investing heavily optimizing electronic trading platforms employing direct market access dma increase speed financial markets managing delivery trading applications keeping latency low increasingly requires understanding fix protocol fix protocol specification originally authored 1992 robert bob lamoureux chris morstatt enable electronic communication equity trading data fidelity investments salomon brothers fix initially addressed information broker-dealers institutional clients time information communicated verbally telephone fidelity realized information broker-dealers could routed wrong trader simply lost parties hung phones wanted communications replaced machine-readable data could shared among traders analyzed acted stored example broker-dealers call indication interest ioi buy sell block stock fix initiative created new messages ioi according fix trading community fix become de facto messaging standard pre-trade trade communication global equity markets expanding post-trade space support straight-through processing well continuing expand foreign exchange fixed income derivatives markets fix trading community non-profit industry-driven standards body mission address business regulatory issues impacting multi-asset trading across global financial markets increased use standards including fix protocol messaging language delivering operational efficiency increased transparency reduced costs risk market participants fix widely used sell side institutions well buy side brokers/dealers financial markets among users mutual funds investment banks brokers stock exchanges ecns see fix trading community organization extensive list major fix users fix become standard electronic protocol pre-trade communications trade execution although mainly used equity transactions front office area bond derivatives fx-transactions also possible one could say whereas swift standard back office messaging fix standard front office messaging however today membership fix protocol ltd. extending fix block trade allocation phases trading process every market virtually every asset class originally fix standard monolithic including application layer semantics message encoding session layer single technical specification remained monolithic fix version 4.2 thereafter message encodings session layer specifications began split separate documents ultimately fix evolved family related technical standards message encoding called presentation layer open systems interconnection model osi model responsible wire format messages original fix message encoding known tagvalue encoding field consists unique numeric tag value tag identifies field semantically therefore messages self-describing tagvalue encoding character-based using ascii codes message fields delimited using ascii 01 start header character composed header body trailer fix.4.4 header contained three fields 8 codice_1 9 codice_2 35 codice_3 tags fixt.1.1 fix.5.0 header contains five mandatory fields one optional field 8 codice_1 9 codice_2 35 codice_3 49 codice_7 56 codice_8 1128 codice_9 present must 6th position content body message specified tag 35 codice_3 message type defined header last field message tag 10 fix message checksum always expressed three-digit number e.g codice_11 header+body+trailer fix content example fix message execution report pipe character used represent soh character fixmessage body length 9 correct checksum 10 checked using source available quickfix open-source fix implementation fix messages formed number fields field tag value pairing separated next field delimiter soh 0x01 tag integer indicates meaning field value array bytes hold specific meaning particular tag e.g tag 48 securityid string identifies security tag 22 idsource integer indicates identifier class used values may plain text encoded pure binary case value preceded length field fix protocol defines meanings tags leaves range tags reserved private use consenting parties fix protocol also defines sets fields make particular message within set fields mandatory others optional ordering fields within message generally unimportant however repeating groups preceded count encrypted fields preceded length message broken three distinct sections head body tail fields must remain within correct section within section position may important fields act delimiters stop one message running next final field fix message tag 10 checksum two main groups messages—admin application admin messages handle basics fix session allow session started terminated recovery missed messages application messages deal sending receiving trade-related information order request information current state subsequent execution order body length character count starting tag 35 included way tag 10 excluded soh delimiters count body length. br example soh replaced by'| br body length 65. br soh delimiter end tag=value belongs tag checksum fix message always last field message composed three characters tag 10 given summing ascii value characters message except checksum field performing modulo 256 resulting summation example message summation ascii values including soh character value 1 ascii table results 4158 performing modulo operation gives value 62 since checksum composed three characters 062 used fixml xml schema fix messages semantically equivalent tagvalue encoded messages takes advantage xml parser technology fixml commonly used back-office clearing applications rather trading simple binary encoding defines wire format using primitive data types native computing systems message encoding decoding therefore much lower latency character-based protocols since translation needed put data format computers use aside latency advantages performance deterministic sbe messages constrained templates fixed-length data elements preferred another consequence fields generally fixed position message filters routers need crack entire message access key fields sbe developed fix high performance working group support high performance trading tagvalue encoding deemed longer fit-for-purpose since character based rather binary variable-length fields messages result non-deterministic performance unlike tagvalue fixml sbe message self-describing data sent wire minimal header identify template controls message metadata describes message layout exchanged out-of-band peers fix trading community publishes xml schema sbe message schemas message schema may contain number message templates template describes fields constitute message additionally schema provides listing simple composite data types may reused number fields fix trading community also developed standard mappings fix message protocols including session layer responsible message exchange including checkpoint recovery mechanisms original fix session protocol name since part monolithic specification covering application layer semantics message encoding well however starting fix version 5.0 session layer split independent specification introduction fixt fixt largely original unnamed session layer version 4.x offered one significant innovation -- provided mechanism mix fix application layer versions common session version current fixt version 1.1 theoretically fixt transport independent however usually employed transmission control protocol tcp fixt point-to-point protocol guarantees message delivery directions messages sent direction carry message sequence number message header communication fault peer may request retransmission missed messages message delivery supported even event disconnection later reestablishment session implement session establishment guaranteed delivery fixt classic fix 4.x define session message types fixp developed fix high performance working group meet needs high performance trading primary need low latency message encoding decoding control message delivery guarantees provide low latency binary message encodings supported session layer application messages actual wire format abstracted fixp specification users may select fix encoding choice long peers agree protocol use early development used simple binary encoding fixp covers point-to-point multicast use cases common primitives point-to-point session established peers negotiate delivery guarantees among following choices delivery guarantees may asymmetrical example trader may enter orders idempotent flow executions returned recoverable flow fast moving markets delay inherent retransmission often undesirable resulting missed opportunities bad trades diagram fix messaging looks buyside/customer sellside/supplier latest version fix protocol implements transport independence permitting multiple versions application messages carried single version transport independent fix session fixt.1.1 higher transport independence also paves way transport protocols message queues web services used instead traditional fix tcp fix supports algorithmic trading use fix algorithmic trading definition language fixatdl fix protocol limited released fast protocol stands fix adapted streaming fast binary protocol used mostly sending multicast market data via udp connections many companies offer fix testing products services
[ 4778, 10020, 10924, 10486 ]
Test
4,779
9
Common_Lisp_Music:common lisp music clm originally acronym common lisp music music synthesis signal processing package music v family created bill schottstaedt runs number various lisp implementations part snd audio editor using scheme ruby forth also realtime implementation snd-rt developed kjetil s. matheussen software used digitally stretch beethoven 9th symphony create leif inge 9 beet stretch
[ 4865, 2438, 4606, 9865, 2062, 9877, 4122, 1448, 9128, 8883, 6969, 6201, 7867, 3904, 8258, 8771, 4550, 11083, 8908, 1613, 9299, 1365, 2392, 7896, 6493, 7267, 10083, 3176, 2667, 9210, 7550 ]
Test
4,780
2
Mark_Adler:mark adler mark adler born april 3 1959 american software engineer best known work field data compression author adler-32 checksum function co-author zlib compression library gzip contributed info-zip participated developing portable network graphics png image format adler also spirit cruise mission manager mars exploration rover mission adler born miami florida raised child david bertha adler adler earned bachelor science mathematics master science electrical engineering degrees university florida 1981 1985 respectively 1990 adler earned ph.d. physics california institute technology doctorate adler worked hughes aircraft space communications group working diverse projects including analysis effects x-ray bursts satellite cables development new error-correcting codes designing automobile anti-theft key digital image video compression research wavelets mpeg-2 1992 1995 adler lead mission engineer cassini–huygens mission afterwards became mars exploration program architect jet propulsion laboratory jpl 1996 1998 meant adler responsible planning mars exploration missions 2001 well handling inter-project engineering issues missions flight development time 1999 early 2000 adler mission systems manager chief engineer mars sample return project launch three missions 2003 2005 bring martian samples back earth 2008 project canceled failure mars polar lander adler initiated led three-and-a-half-week study concept later selected mars exploration rover mer mission 2003 served deputy mission system manager acting project engineer deputy assembly test launch operations manager landing site selection engineer spirit mission manager adler currently project chief low density supersonic decelerator adler instrument-rated private pilot certified scuba diver amateur theater actor lives diana st. james la cañada california two children joshua zachary st. james works california institute technology acts directs theatrical performances together co-author jean-loup gailly adler received 2009 usenix software tools user group stug award contributions floss algorithms data compression
[ 3296, 7366, 4561, 2804, 8671 ]
None
4,781
1
List_of_in-memory_databases:list in-memory databases article list in-memory database system software
[ 10883, 6277, 5640, 6920, 7946, 11017, 3219, 7315, 11030, 9893, 8871, 5546, 1579, 8619, 6831, 9263, 7347, 949, 6709, 5051, 573, 6850, 11203, 10565, 10693, 8269, 7767, 5209, 5210, 1636, 3045, 10340, 9320, 4604, 2045, 9471 ]
Test
4,782
9
Spacecraft_command_language:spacecraft command language spacecraft command language satellite control language spacecraft control language systems test operation language stol satellite test operation language etc computer command language commanding spacecraft mission systems ultimately languages used command remote spacecraft telecommands also used development verification onboard systems prototype engineering model flight hardware software ground systems prior launch spacecraft command languages typically written format similar human languages contrast telecommand protocols usually binary formats although may displayed hexadecimal broken labelled fields command displays spacecraft command languages scl plexil executed spacecraft onboard executive nasa gsfc systems test operation language stol functional requirements language description 1978 illustrates concept systems test operation language stol provides means user communication payloads applications programs ground system elements systems operation language enables operator user communicate command computer system system interprets high level language directive user performs indicated action executing program printing snapshot sending payload command using stol payload test operations personnel may relieved repetitive tasks ensuring recurring fixed sequences operations always performed exactly order guaranteeing repeatability test procedures project operations control center pocc operations original language acronym stol applied gsfc systems test operation language designed 1970s nasa goddard space flight center provide standardized language functionality previously represented least three satellite operation language efforts gsfc various stols created locations mission-specific site-specific names proliferated extent jargon interpreter program prototyped one gsfc convert english statements limited set mstol directives plans stol dialects.. languages later developed offered private companies part satellite control software suites following examples show natural language cstol commands lower-level spacecraft commands translated particular spacecraft first two examples show two different cstol commands translated spacecraft command indicating spacecraft command takes different values argument last example cstol command translated another cstol command would translated spacecraft command still-human-readable textual format command uplinked as-is spacecraft ability read text format otherwise command translated packed binary representation ground prior uplink
[ 9926, 7308, 8046, 5680, 3221 ]
Test
4,783
9
Symbolic_data_analysis:symbolic data analysis symbolic data analysis sda extension standard data analysis symbolic data tables used input symbolic objects made output result data units called symbolic since complex standard ones contain values categories also include internal variation structure sda based four spaces space individuals space concepts space descriptions space symbolic objects space descriptions models individuals space symbolic objects models concepts
[]
Test
4,784
4
Security_of_automated_teller_machines:security automated teller machines automated teller machines atms first introduced 1939 2015 3 million units installed worldwide number atm units increase machines prone hacker attacks fraud robberies security breaches past main purpose atms deliver cash form bank notes debit corresponding bank account however atms becoming complicated serve numerous functions thus becoming high priority target robbers hackers modern atms implemented high-security protection measures work complex systems networks perform transactions data processed atms usually encrypted hackers employ discreet hacking devices hack accounts withdraw account balance alternative unskilled robbers threaten bank patrons weapon loot withdrawn money account main article atm fraud atm vandals either physically tamper atm obtain cash employ credit card skimming methods acquire control user credit card account credit card fraud done inserting discreet skimming devices keypad credit card reader alternative way credit card fraud identify pin directly devices cameras concealed near keypad validation on-line pin occurs terminal question connected central database pin supplied customer always compared recorded reference pin financial institutions however one disadvantage malfunction network renders atm unusable fixed off-line pin validation atm connected central database condition off-line pin validation atm able compare customer entered pin pin reference terminal must able perform cryptographic operations must required encryption keys disposal offline validation scheme extremely slow inefficient offline pin validation obsolete atms connected central server protected wireless networks three pin procedures operation high security interchange transaction supplied pin encrypted entry terminal step secret cryptographic key used addition transaction elements encrypted pin transmitted acquirer system encrypted pin routed acquirer system hardware security module within pin decrypted cryptographic key used interchange decrypted key immediately reencrypted routed issuer system normal communications channels lastly routed pin decrypted issuer security module validated basis techniques on-line local pin validation different transaction methods used shared atms regards encipherment pin message authentication among called zone encryption method trusted authority appointed operate behalf group banks could interchange messages atm payment approvals successful communication banks atms incorporation cryptographic module usually called security module critical component maintaining proper connections banks machines security module designed tamper resistant security module performs plethora functions among pin verification pin translation interchange key management message authentication use pin interchanges causing concerns security pin translated security module format used interchange moreover security module generate protect maintaining keys associated user network personal verification process begins user supply personal verification information information include pin provided customer information recorded bank account cases storage cryptographic key bank card called personal key pk personal identification processes done authentication parameter ap capable operating two ways first option ap time invariant second option ap time variant case ip based time variant information transaction request message case ap used message authentication code mac use message authentication made recourse find stale bogus messages might routed communication path detection modified messages fraudulent traverse non-secure communication systems cases ap serves two purposes security breaches electronic funds transfer systems done without delimiting components electronic funds transfer systems three components communication links computers terminals atms first communication links prone attacks data exposed passive means direct means device inserted retrieve data second component computer security different techniques used acquire access computer accessing via remote terminal peripheral devices card reader hacker gained unauthorized access system programs data manipulated altered hacker terminal security significant component cases cipher keys reside terminals absence physical security abuser may probe key substitutes value
[ 2932 ]
Test
4,785
4
Video_door-phone:video door-phone video door-phone also known video door entry video intercom stand-alone intercom system used manage calls made entrance building residential complex detached family home workplace etc access controlled audiovisual communication inside outside main feature video door entry enables person indoors identify visitor wish engage conversation and/or open door allow access person calling video door entry consists outside indoor elements outdoor panel outside electronic lock release indoor monitor outdoor panel street panel installed beside entrance door gateway incorporates different elements ready use climate conditions one several pushbuttons make call usually one per home apartment micro camera adapted night vision capture image caller microphone pick voice speaker reproduce voice occupant indoors video door entry panel may include push buttons call homes offices camera capture street scene video entry monitor allows occupant see called talk visitor open door installed indoors monitor consists screen showing image person calling microphone earpiece conversation pushbutton trigger door lock release communication set full duplex electric door release device installed door lock operated inside building lift latch clear way visitor several variations basic format addition outdoor panels one pushbutton per apartment possible find others numeric keypad case designed large residential installations homes identified codes others built-in cardholders panels even small screens guide user facilitate entry people disabilities video entry monitors earpiece similar telephone handset others hands-free examples monitors memories store image every time someone calls door touchscreen video entry systems video door phone classified two possible classification 1 security layers level 1 security – security layer added vdp system community entrance layer given guard directly verify entry visitor community systems community level b level 2 security also known lobby security – get access lobby apartment case visitor dial number flat flat owner allows access visitor lobby entrance c. level 3 security case visitor communicates outdoor camera front house door villa gate 2 technologies classification a. standalone – standalone vdp device used villas individual home owners types technology standalone vdp – i. analog vdp – analog display camera ii.connected digital vdp – digital lcd display digital camera usually image capture video capturing ability bell pressed case normally additional camera integration also allowed iii wireless video door bell vdb camera units gets connected interned router allows communication ones mobile tablet top communicate visitor b. multi-apartment- solution mass housing scenario i. analog multi-apartment systems – analog vdp providing 3 tier security ii ip vdp multi-apartment system – ip vdp 3 tier security integration bms building management system security systems like intrusion cctv building security cases even home automation visitor presses one outdoor panel pushbuttons built-in camera connected image captured outdoors appears monitor screen connection takes place automatically need activate equipment one essential elements video door entry point person inside building open door wish begin conversation usually secret heard users facility equipment also disconnects automatically set time elapsed video entry system whole runs low voltage energy building ’ trunk many terminals currently market ready accept extensions making monitor small automatic function control centre user view one several additional cameras installed access points trigger light switches open second door etc video door entry systems commonly found integrated different access control systems means elements installed outdoor panel allow certain previously authorised users access premises common means proximity cards fingerprint readers keypad secret numbers even bluetooth triggered mobile phone different equipment sets currently found market make use accessible people different disabilities thinking visually impaired outdoor panel may include information braille alongside pushbuttons voice synthesiser also added indicates door opened people hearing impairment outdoor panel may include screen icons signalling communication status user calling someone speaking indoors opening door also type user mind monitor may fitted inductive loop element interacts conventional hearing aids facilitate conversation outside without presence noticed users kit also includes visual audio call alerts
[]
Test