node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
4,786 | 9 | Andy_Gavin:andy gavin andrew scott andy gavin born june 11 1970 american video game programmer designer entrepreneur novelist video game industry known co-founding video game company naughty dog childhood friend jason rubin 1986 games crash bandicoot jak daxter released critical acclaim sophistication naughty dog technology often credited gavin background lisp mit artificial intelligence laboratory gavin earned bachelor science degree neurobiological science haverford college gavin studied ph.d. massachusetts institute technology carried research jet propulsion laboratory mars rover vision project advisor rod brooks still student gavin learned computer programming language lisp influences m.i.t work lead develop number custom programming languages improved quality graphics controls sounds artificial intelligence naughty dog video games gavin rubin sold first video game math jam 1985 1989 sold keef thief electronic arts early '90s fighting game way warrior led multi-title deal universal interactive studios auspices universal deal produced multi-million selling crash bandicoot series 1994 1999 later segued critically acclaimed jak daxter series games end 2000 rubin gavin sold naughty dog sony computer entertainment america scea created 14 naughty dog games including math jam 1985 ski crazed 1986 dream zone 1987 keef thief 1989 rings power 1991 way warrior 1994 crash bandicoot 1996 1997 1998 crash team racing 1999 2001 jak ii 2003 jak 3 2004 2005 together games sold 35 million units generated 1 billion revenue naughty dog gavin developed two lisp dialects use game development gool game object oriented lisp successor goal game oriented assembly lisp represented departure mainstream terms language choice featured innovations design shortly leaving naughty dog 2004 gavin co-founded new internet startup called flektor former business partner jason rubin former hbo executive jason r. kay may 2007 company sold fox interactive media division news corp. fox described company next-generation web site provides users suite web-based tools transform photos videos dynamic slideshows postcards live interactive presentations video mash-ups october 2007 flektor partnered sister company myspace mtv provide instant audience feedback via polls interactive myspace mtv presidential dialogues series then-presidential candidate senator barack obama gavin left fox interactive media 2008 2009 announced return video game business naughty dog co-founder jason rubin formed new social game startup called monkey gods working new version snood along casual word game called monkwerks recent years gavin turned novel writing first novel dark historical fantasy darkening dream published december 2011 second novel untimed involves time travel released december 19 2012 | [
11488,
4516,
6502,
8937,
10316
] | None |
4,787 | 4 | David_Wang_(hacker):david wang hacker david wang jail break developer mobile phone hacker apple phone hacking competition hacked iphone use android apps platform | [
9732,
4957
] | Test |
4,788 | 3 | Schools_Interoperability_Framework:schools interoperability framework schools interoperability framework systems interoperability framework uk sif data-sharing open specification academic institutions kindergarten workforce specification used primarily united states canada uk australia new zealand however increasingly implemented india elsewhere specification comprises two parts xml specification modeling educational data specific educational locale north america australia uk service-oriented architecture soa based direct brokered restful-models sharing data institutions international shared locales sif product industry initiative enables diverse applications interact share data sif estimated used 48 us states 6 countries supporting five million students specification started maintained specification body schools interoperability framework association renamed access learning community a4l 2015 traditionally standalone applications used public school districts limitation data isolation difficult access share data often results redundant data entry data integrity problems inefficient incomplete reporting cases student information appear multiple places may identical example decision makers may working incomplete inaccurate information many district site technology coordinators also experience increase technical support problems maintaining numerous proprietary systems sif created solve issues schools interoperability framework sif began initiative chiefly championed initially microsoft create blueprint educational software interoperability data access designed initiative drawing upon strengths leading vendors k-12 market enable schools professionals build manage upgrade systems endorsed close 20 leading k-12 vendors student information library transportation food service applications first pilot sites began summer 1999 first sif-based products began show 2000 beginning clear approach would become national standard united states sif edi vying position 2000 sif began taking lead 2002 2000 national school boards association held panel discussion annual meeting topic sif 2007 united kingdom becta championed adoption sif national standard schools data interchange 2008 announced uk standard become known systems interoperability framework reflects intention uk develop sif used organizations beyond schools sif specification supported a4l community a4l members collaborate variety technical solutions standards include limited schools interoperability framework members include districts states vendors non-profits various government agencies sif pains challenges come soa specification data model building specifications via consensus everyone always happy sometimes end product n't perfect also given moving parts modeling entire k12 enterprise specification many points possible failure particular sif record-level automated system moving standardized data one source another heterogeneous environment out-of-the-box interoperability ease use implementation part 12-18 month focus 2007 2009 sif 2.x relied using broker called zone integration server zis manage communication applications sif 3.x sif 2.8+ allows brokered direct communication applications rather application vendor try set separate connection every application sif defined set rules definitions share data within sif zone — environment logical grouping applications software application agents communicate central communication point zones managed enterprise data broker sometimes called zone integration server zis single zis manage multiple zones however current infrastructure specification supports restful connections directly applications and/or utilizing brokered environment data travels applications series standardized messages queries events written xml json sent using internet protocols sif specification defines events choreography allows data move back forth applications direct sif allow one application communicate directly another via simple rest calls put post get delete resources ideal simple environments two maybe three players complex choreographies necessary easier implement brokered environment two- three-node situations sif agents pieces software exist either internal application installed next sif agents function extensions application serve intermediary software application sif zone brokered environments broker keeps track agents registered environment zones manages transactions agents enabling provide data respond requests broker controls access routing security within system standardization behavior agents broker means sif add standard functionality zone simply adding sif-enabled applications time vertical interoperability situation sif agents different levels organization communicate using sif zone vertical interoperability involves data collection multiple agents upward publishing information multiple agents downward example state-level data warehouse may listen changes district-level data warehouses update database accordingly state entity may wish publish teacher certification data districts three pieces sif specification deal directly vertical interoperability student locator object vertical reporting object data warehouse object good example would century consultants sis agent working pearson slf agent sending student data state agency getting student testing identifiers return sif designed rest soap namespaces web service standards mature today result robust soa vetted current soap specifications use soap ws standards 2.0 sif web services specification began process joining two worlds 3.0 infrastructure specification completes transformation soa specification using modern tools 2.0 web services specification allows generalized xml messaging structures typically found enterprise messaging systems use concept enterprise service bus web service standards also designed support secure public interfaces xml appliances make setup configuration easier sif 2.0 web services specification allows use web services communicate zone 3.0 infrastructure allows data payload moved across designed around restful design patterns allows brokered direct exchanges restful manner utilizing either xml json payloads starting sif 3.0 sif specification relies entirely-unless impossible practical- common education data standards ceds controlled vocabulary element definition allows transport ceds wire compatible ceds-compliant data sets similar standard liss supports vendor integration 'within school site overcomes limitations school elected use zone integration server requirement sif 3.x implementations liss lightweight interoperability standard schools connects primarily smaller 'local modules timetabling roll call reporting others main admin system given school site liss works either across web via local network simpler format sifa also working closely postsecondary electronic standards council pesc scorm standards organizations august 2013 sif association announced release sif implementation specification 3.0 sif implementation specification north america 3.0 made globally utilized reference infrastructure north america data model focusing supporting common education data standards ceds initiative new 3.0 infrastructure allows transport various data models including global sif communities well data numerous “ alphabet soup ” data initiatives populating education landscape essence – education utilize “ one wire one plug ” – never-ending proprietary api ’ “ one ” connections specification fully supports restful web services soap-based protocols australian 3.4 data model specification came fall 2016 well 3.1.2 release global sif infrastructure version 2.8 specification last 2.x version sif sif implementations united states abroad 2.x deployments a4l community released new version sif specification called unity use best objects 3.x specification foundation 2.8 specification able run either 3.x infrastructure 2.x infrastructure boon thousands districts many states using sif 2 infrastructure allows clean migration path utilizing modern restful architectures desired sif 3.2 release includes sif xpress roster sif xpress student record exchange sre result work done various members association vendors agencies regional centers easily adopted easier implement sub-set specification handles roster basic uses cases access learning community recently started taking strong leadership education privacy space globally association created supports organization called student data privacy consortium sdpc working closely national australian privacy efforts | [
545,
10020,
4107,
10486,
479
] | Test |
4,789 | 4 | Foremost_(software):foremost software foremost forensic data recovery program linux used recover files using headers footers data structures process known file carving although written law enforcement use freely available used general data recovery tool foremost created march 2001 duplicate functionality dos program carvthis use linux platform foremost originally written special agents kris kendall jesse kornblum u.s. air force office special investigations 2005 program modified nick mikus research associate naval postgraduate school center information systems security studies research part master thesis modifications included improvements foremost accuracy extraction rates foremost designed ignore type underlying filesystem directly read copy portions drive computer memory takes portions one segment time using process known file carving searches memory file header type matches ones found foremost configuration file match found writes header data following file stopping either footer found file size limit reached foremost used command-line interface graphical user interface option available able recover specific filetypes including jpg gif png bmp avi exe mpg wav riff wmv mov pdf ole doc zip rar htm cpp configuration file usually found /usr/local/etc/foremost.conf used define additional file types foremost used recover data image files directly hard drives use ext3 ntfs fat filesystems foremost also used via computer recover data iphones | [
9732,
2437,
2193,
5010,
4500,
8469,
2199,
3099,
7968,
6177,
5284,
11182,
7983,
10290,
823,
8635,
2494,
830,
7369,
6475,
10189,
4049,
4834,
5475,
7525,
9319,
7160,
11642,
2045
] | None |
4,790 | 2 | DNALinux:dnalinux dnalinux linux distribution bioinformatics software included live cd based slax includes programs like blast emboss dnalinux made genes digitales quilmes national university argentina | [
4611,
3079,
3089,
4113,
8209,
8727,
543,
11297,
7204,
9253,
11305,
56,
3129,
4153,
59,
8248,
9276,
4673,
3654,
5190,
3147,
2125,
1107,
1110,
89,
5721,
4192,
3685,
10860,
5742,
2671,
11388,
1150,
2692,
8837,
9353,
9873,
11410,
8857,
10394,... | None |
4,791 | 9 | Proof_assistant:proof assistant computer science mathematical logic proof assistant interactive theorem prover software tool assist development formal proofs human-machine collaboration involves sort interactive proof editor interface human guide search proofs details stored steps provided computer theorem prover museum initiative conserve sources theorem prover systems future analysis since important cultural/scientific artefacts sources many systems mentioned popular front-end proof assistants emacs-based proof general developed university edinburgh coq includes coqide based ocaml/gtk isabelle includes isabelle/jedit based jedit isabelle/scala infrastructure document-oriented proof processing | [
4612,
3209,
2062,
7185,
11026,
11028,
8088,
11034,
5663,
5920,
3876,
5796,
4268,
6188,
2618,
4670,
8511,
5064,
11083,
5715,
3926,
5079,
9816,
4955,
8924,
10460,
4446,
6239,
4455,
883,
5365,
3705,
1019
] | None |
4,792 | 9 | Simulation_software:simulation software simulation software based process modeling real phenomenon set mathematical formulas essentially program allows user observe operation simulation without actually performing operation simulation software used widely design equipment final product close design specs possible without expensive process modification simulation software real-time response often used gaming also important industrial applications penalty improper operation costly airplane pilots nuclear power plant operators chemical plant operators amock actual control panel connected real-time simulation physical response giving valuable training experience without fear disastrous outcome advanced computer programs simulate power system behavior weather conditions electronic circuits chemical reactions mechatronics heat pumps feedback control systems atomic reactions even complex biological processes theory phenomena reduced mathematical data equations simulated computer simulation difficult natural phenomena subject almost infinite number influences one tricks developing useful simulations determine important factors affect goals simulation addition imitating processes see behave different conditions simulations also used test new theories creating theory causal relationships theorist codify relationships form computer program program behaves way real process good chance proposed relationships correct general simulation packages fall two categories discrete event continuous simulation discrete event simulations used model statistical events customers arriving queues bank properly correlating arrival probabilities observed behavior model determine optimal queue count keep queue wait times specified level continuous simulators used model wide variety physical phenomena like ballistic trajectories human respiration electric motor response radio frequency data communication steam turbine power generation etc simulations used initial system design optimize component selection controller gains well model based design systems generate embedded control code real-time operation continuous simulation used operator training off-line controller tuning four main renowned simulation approaches event-scheduling method activity scanning process- interaction three-phase approach comparison following noted event-scheduling method simpler two phases cs bs allow program run faster since scanning condition nal events advantages also tells us something disadvantages method since two phase events mixed bs cs method parsimony means hard enhance pidd,1998 activity scanning approach also simpler three-phase method since calendar support parsimonious modeling however approach much slower three-phase since treats activities treated conditional hand executive two phases usually approach confused three-phase method pidd 1998 process- interaction “ share two common advantages first avoid programs slow run second avoid need think possible logical consequences event ” pidd 1998 yet pidd 1998 claims approach suffers deadlock problem approach attractive novice modelers although schriber et al 2003 says “ process interaction understood elite group individuals beyond reach ordinary programmers ” fact schriber et al 2003 .adds “ .multi- threaded applications talked computer science classes rarely used broader community ” indicates implementation process-interaction difficult implement obvious contradiction previous quote due mix process interaction approach transaction-flow approach see complete idea origins transaction-flow best stated schriber et al 2003 primordial soup gordon simulator arose gordon ’ transaction flow world-view cleverly disguised form process interaction put process interaction approach within grasp ordinary users gordon one great packaging jobs time devised set building blocks could put together build flowchart graphically depicted operation system modeling paradigm flow elements system readily visible focus whole approach three-phase approach allows “ simulate parallelism whilst avoiding deadlock ” pidd cassel 1998 yet three-phase scan schedule bound activities scans conditional activities slow yet many forgo time spent return solving deadlock problem fact three-phase used distributed systems whether talking operating systems databases etc different names among three-phase commit see tanenbaum steen 2002 electronics simulation software utilizes mathematical models replicate behaviour actual electronic device circuit essentially computer program converts computer fully functioning electronics laboratory electronics simulators integrate schematic editor spice simulator onscreen waveforms make “ what-if ” scenarios easy instant simulating circuit ’ behaviour actually building greatly improves efficiency provides insights behavior stability electronics circuit designs simulators use spice engine simulates analog digital mixed circuits exceptional power accuracy also typically contain extensive model device libraries simulators typically printed circuit board pcb export capabilities essential design testing circuits primary application electronic circuit simulation strictly analog electronics circuit simulators include analog event-driven digital simulation capabilities known mixed-mode simulators means simulation may contain components analog event driven digital sampled-data combination entire mixed signal analysis driven one integrated schematic digital models mixed-mode simulators provide accurate specification propagation time rise/fall time delays event driven algorithm provided mixed-mode simulators general purpose supports non-digital types data example elements use real integer values simulate dsp functions sampled data filters event driven algorithm faster standard spice matrix solution simulation time greatly reduced circuits use event driven models place analog models mixed-mode simulation handled three levels primitive digital elements use timing models built-in 12 16 state digital logic simulator b subcircuit models use actual transistor topology integrated circuit finally c in-line boolean logic expressions exact representations used mainly analysis transmission line signal integrity problems close inspection ic ’ i/o characteristics needed boolean logic expressions delay-less functions used provide efficient logic signal processing analog environment two modeling techniques use spice solve problem third method digital primitives use mixed mode capability methods merits target applications fact many simulations particularly use a/d technology call combination three approaches one approach alone sufficient order properly understand operation programmable logic controller plc necessary spend considerable time programming testing debugging plc programs plc systems inherently expensive down-time often costly addition plc programmed incorrectly result lost productivity dangerous conditions plc simulation software valuable tool understanding learning plcs keep knowledge refreshed date plc simulation provides users ability write edit debug programs written using tag-based format many popular plcs use tags powerful method programming plcs also complex plc simulation integrates tag-based ladder logic programs 3d interactive animations enhance user ’ learning experience interactive animations include traffic lights batch processing bottling lines using plc simulation plc programmers freedom try what-if scenarios changing ladder logic instructions programs re-running simulation see changes affect plc operation performance type testing often feasible using hardwired operating plcs control processes often worth hundreds thousands – millions dollars sheet metal forming simulation software utilizes mathematical models replicate behavior actual metal sheet manufacturing process essentially computer program converts computer fully functioning metal manufacturing prediction unit sheet metal forming simulation prevents metal factories defects production lines reduces testing expensive mistakes improving efficiency metal forming process metal casting simulation currently performed finite element method simulation software designed defect-prediction tool foundry engineer order correct and/or improve his/her casting process even prototype trials produced idea use information analyze predict results simple effective manner simulate different processes software would normally following specifications interaction different network entities defined various communication protocols network simulation software simulates behavior networks protocol level network protocol simulation software used develop test scenarios understand network behavior certain protocol messages compliance new protocol stack implementation protocol stack testing simulators based telecommunications protocol architecture specifications developed international standards body itu-t ieee output protocol simulation software detailed packet traces events logs etc understanding computers made many components component many different attributes different manufacturer accordingly computer performance evaluation another application simulation would paramount significance particularly since experimenting possible scenarios nearly impossible commercial simulation packages caught fact two packages offered application namely anylogic 5.0 visual simulation environment | [
8162,
10085,
2410,
7819,
749,
5881,
8278,
1721
] | Test |
4,793 | 4 | DomainKeys_Identified_Mail:domainkeys identified mail domainkeys identified mail dkim email authentication method designed detect forged sender addresses emails email spoofing technique often used phishing email spam dkim allows receiver check email claimed come specific domain indeed authorized owner domain achieves affixing digital signature linked domain name outgoing email message recipient system verify looking sender public key published dns valid signature also guarantees parts email possibly including attachments modified since signature affixed usually dkim signatures visible end-users affixed verified infrastructure rather message authors recipients dkim internet standard defined rfc 6376 dated september 2011 updates rfc 8301 rfc 8463 need email validated identification arises forged addresses content otherwise easily created widely used spam phishing email-based fraud example fraudster may send message claiming sender example.com goal convincing recipient accept read email difficult recipients establish whether trust message system administrators also deal complaints malicious email appears originated systems dkim provides ability sign message allows signer author organization communicate emails considers legitimate directly prevent disclose abusive behavior dkim also provides process verifying signed message verifying modules typically act behalf receiver organization possibly hop independent simple mail transfer protocol smtp routing aspects operates rfc 5322 message—the transported mail header body—not smtp envelope defined rfc 5321 hence dkim signatures survives basic relaying across multiple mtas signing organization direct handler message author submission site intermediary along transit path indirect handler independent service providing assistance direct handler signing modules insert one codice_1 header fields possibly behalf author organization originating service provider specification allows signers choose header fields sign codice_2 field must always signed resulting header field consists list codice_3 parts example tags used relevant ones b actual digital signature contents headers body mail message bh body hash signing domain selector header body contribute signature first message body hashed always beginning possibly truncated given length may zero second selected header fields hashed order given h. repeated field names matched bottom header upward order codice_4 fields inserted header non-existing field matches empty string adding field name break signature codice_1 field signature created bh equal computed body hash b equal empty string implicitly added second hash albeit name must appear h — refers another preexisting signature hashes text canonicalized according relevant c algorithms result encryption signer private key encoding using base64 b. algorithms fields body length meant chosen assure unambiguous message identification still allowing signatures survive unavoidable changes going occur transit data integrity implied receiving smtp server wanting verify uses domain name selector perform dns lookup example given example signature tag gives author domain verified example.net tag selector brisbane string _domainkey fixed part specification gives txt resource record looked codice_6 data returned query record also list tag-value pairs includes domain public key along key usage tokens flags example receiver use public key value p tag validate signature hash value header field check hash value mail message headers body received two values match cryptographically proves mail signed indicated domain tampered transit signature verification failure force rejection message instead precise reasons authenticity message could proven made available downstream upstream processes methods may include sending back fbl message adding authentication-results header field message described rfc 7001 although domainkeys covered yahoo licensed patent claims dual license scheme domainkeys patent license agreement v1.2 gnu general public license v2.0 version essence dkim spf provide different measures email authenticity dmarc provides ability organisation publish policy specify mechanism dkim spf employed sending email domain check field presented end users receiver deal failures reporting mechanism actions performed policies primary advantage system e-mail recipients allowing signing domain reliably identify stream legitimate email thereby allowing domain-based blacklists whitelists effective also likely make certain kinds phishing attacks easier detect incentives mail senders sign outgoing e-mail dkim method labeling message filter identify spam however widespread use dkim prevent spammers forging source address messages technique commonly employ today spammers forced show correct source domain filtering techniques work effectively particular source domain feed reputation system better identify spam conversely dkim make easier identify mail known spam need filtered receiving system whitelist known good sending domains either locally maintained third party certifiers skip filtering signed mail domains perhaps filter remaining mail aggressively dkim useful anti-phishing technology mailers heavily phished domains sign mail show genuine recipients take absence valid signature mail domains indication mail probably forged best way determine set domains merit degree scrutiny remains open question dkim used optional feature called adsp lets authors sign mail self-identify demoted historic status november 2013 instead dmarc used purpose allows domains self-publish techniques including spf dkim employ makes easier receiver make informed decision whether certain mail spam example using dmarc ebay paypal publish policies mail authenticated requesting receiving system gmail reject implemented using dns records added rfc 5322 header field dkim compatible existing e-mail infrastructure particular transparent existing e-mail systems lack dkim support design approach also compatible related services s/mime openpgp content-protection standards dkim compatible dnssec standard spf dkim requires cryptographic checksums generated message sent mail server results computational overhead otherwise required e-mail delivery additional computational overhead hallmark digital postmarks making sending bulk spam computationally expensive facet dkim may look similar hashcash except receiver side verification negligible amount work typical hashcash algorithm would require far work dkim non-repudiation feature prevents senders spammers credibly denying sent email proven useful news media sources wikileaks able leverage dkim body signatures prove leaked emails genuine tampered definitively repudiating claims hillary clinton 2016 us presidential election running mate tim kaine dnc chair donna brazile rfc identifies number potential attack vectors dkim signatures encompass message envelope holds return-path message recipients since dkim attempt protect mis-addressing affect utility number concerns raised refuted 2013 time standardization concern cryptographic solution would message replay abuse bypasses techniques currently limit level abuse larger domains replay inferred using per-message public keys tracking dns queries keys filtering high number queries due e-mail sent large mailing lists malicious queries bad actors comparison different methods also addressing problem see e-mail authentication mentioned authentication abuse prevention evil email user reputable domain compose bad message dkim-signed sent domain mailbox retrieve file obtain signed copy message use l tag signatures makes doctoring messages even easier signed copy forwarded million recipients example botnet without control email provider signed message block offending user stop diffusion already-signed messages validity signatures messages limited always including expiration time tag signatures revoking public key periodically upon notification incident effectiveness scenario hardly limited filtering outgoing mail implies ability detect message might potentially useful spammers dkim currently features two canonicalization algorithms simple relaxed neither mime-aware mail servers legitimately convert different character set often document x-mime-autoconverted header fields addition servers certain circumstances rewrite mime structure thereby altering preamble epilogue entity boundaries breaks dkim signatures plain text messages written us-ascii provided mime header fields signed enjoy robustness end-to-end integrity requires opendkim project organized data collection involving 21 mail servers millions messages 92.3 observed signatures successfully verified success rate drops slightly 90.5 mailing list traffic considered problems might exacerbated filtering relaying software makes changes message without specific precaution implemented sender footer addition operated mailing lists many central antivirus solutions break dkim signature possible mitigation sign designated number bytes message body indicated l tag dkim-signature header anything added beyond specified length message body taken account calculating dkim signature wo n't work mime messages another workaround whitelist known forwarders e.g. spf yet another workaround proposed forwarders verify signature modify email re-sign message sender header however solution risk forwarded third party signed messages received smtp receivers supporting rfc 5617 adsp protocol thus practice receiving server still whitelist known message streams october 2012 wired reported mathematician zach harris detected demonstrated email source spoofing vulnerability short dkim keys codice_7 corporate domain well several high-profile domains stated authentication 384-bit keys factored little 24 hours laptop 512-bit keys 72 hours cloud computing resources harris found many organizations sign email short keys factored notified organizations vulnerability states 768-bit keys could factored access large amounts computing power suggests dkim signing use key lengths greater 1,024 wired stated harris reported google confirmed began using new longer keys soon disclosure according rfc 6376 receiving party must able validate signatures keys ranging 512 bits 2048 bits thus usage keys shorter 512 bits might incompatible shall avoided rfc 6376 also states signers must use keys least 1024 bits long-lived keys though long-livingness specified dkim resulted 2004 merging two similar efforts enhanced domainkeys yahoo identified internet mail cisco merged specification basis series ietf standards-track specifications support documents eventually resulted std 76 currently rfc 6376 identified internet mail proposed cisco signature-based mail authentication standard domainkeys designed yahoo verify dns domain e-mail sender message integrity aspects domainkeys along parts identified internet mail combined create domainkeys identified mail dkim trendsetting providers implementing dkim include yahoo gmail aol fastmail mail organizations carry dkim signature discussions dkim signatures passing indirect mail flows formally dmarc working group took place right first adoptions new protocol wreaked havoc regular mailing list use however none proposed dkim changes passed instead mailing list software changed 2017 another working group launched dkim crypto update dcrup specific restriction review signing techniques rfc 8301 issued january 2018 bans sha-1 updates key sizes 512-2048 1024-4096 rfc 8463 issued september 2018 adds elliptic curve algorithm existing rsa added key type codice_8 adequately strong featuring short public keys easily publishable dns original domainkeys designed mark delany yahoo enhanced comments many others since 2004 specified historic rfc 4870 superseded standards track rfc 4871 domainkeys identified mail dkim signatures published may 2007 number clarifications conceptualizations collected thereafter specified rfc 5672 august 2009 form corrections existing specification september 2011 rfc 6376 merged updated latter two documents preserving substance dkim protocol public key compatibility earlier domainkeys also possible dkim initially produced informal industry consortium submitted enhancement standardization ietf dkim working group chaired barry leiba stephen farrell eric allman sendmail jon callas pgp corporation mark delany miles libbey yahoo jim fenton michael thomas cisco systems attributed primary authors source code development one common library led opendkim project following recent protocol additions licensing new bsd license | [
5249,
10242,
517,
5254,
3847,
649,
8202,
8332,
9868,
1297,
3218,
4883,
8337,
9365,
10005,
11413,
5402,
5531,
3742,
8735,
10271,
7075,
9380,
2085,
2213,
3751,
3752,
9381,
10924,
5421,
4272,
562,
2354,
2996,
3508,
182,
6834,
9909,
10167,
10... | Validation |
4,794 | 1 | Asia-Pacific_Trade_Agreements_Database:asia-pacific trade agreements database asia-pacific trade investment agreements database aptiad resource researchers policymakers area international trade investment online database allows searches two ways one relates agreements users search agreements members key terms types scopes agreements status another possibility search publications relevant regional integration trade agreements easier use database users download glossary related terms website trade agreements database component aptiad designed give researchers policymakers overview easy access regional bilateral trade agreements entered negotiation countries asia pacific region june 2008 136 agreements including agreements notified wto official information readily available also agreements negotiation least first formal negotiation round interactive trade indicators component aptiad designed help policymakers calculate commonly used indicators related trade performance national economies and/or trade agreements interactive trade indicator database enables select indicators e.g export/import value export/import growth export/import share trade share trade intensity country region product year export flows downloaded un comtrade using world integrated trade solution wits last 10 years present 1998-2007 selected developed developing countries asia-pacific region asia-pacific trade agreements database aptiad product trade investment division united nations economic social commission asia pacific | [] | Train |
4,795 | 8 | Parlay_X:parlay x parlay x set standard web service apis telephone network fixed mobile defunct replaced oneapi current valid standard gsm association telecom third party api enables software developers use capabilities underlying network apis deliberately high level abstractions designed simple use application developer example invoke single web service request get location mobile device initiate telephone call parlay x web services defined jointly etsi parlay group third generation partnership project 3gpp oma done maintenance specifications 3gpp release 8 apis defined using web service technology interfaces defined using wsdl 1.1 conform web services interoperability ws-i basic profile apis published set specifications general parlay x provides abstraction functionality exposed complex functionally richer parlay apis etsi provide set informative normative parlay x parlay mapping documents parlay x services rolled number telecom operators including bt korea telecom t-com mobilekom sprint | [
10020,
8981,
8070
] | Test |
4,796 | 3 | NMS-8250:nms-8250 philips nms-8250 nms short new media systems professional msx 2 home computer high end market two built floppy disk drives pizza box configuration machine fact manufactured sanyo basically mpc-25fs different color featured professional video output possibilities scart better picture quality detachable keyboard | [
5128,
780,
9006,
2383,
1776
] | Test |
4,797 | 5 | Hypertext_Transfer_Protocol:hypertext transfer protocol hypertext transfer protocol http application protocol distributed collaborative hypermedia information systems http foundation data communication world wide web hypertext documents include hyperlinks resources user easily access example mouse click tapping screen web browser development http initiated tim berners-lee cern 1989 development early http requests comments rfcs coordinated effort internet engineering task force ietf world wide web consortium w3c work later moving ietf http/1.1 first documented 1997 specification obsoleted 1999 likewise replaced family rfcs 2014 http/2 efficient expression http semantics wire published 2015 supported major web servers browsers transport layer security tls using application-layer protocol negotiation alpn extension tls 1.2 newer required.. http/3 proposed successor http/2 using udp instead tcp underlying transport protocol like http/2 obsolete previous major versions protocol http functions request–response protocol client–server computing model web browser example may client application running computer hosting website may server client submits http request message server server provides resources html files content performs functions behalf client returns response message client response contains completion status information request may also contain requested content message body web browser example user agent ua types user agent include indexing software used search providers web crawlers voice browsers mobile apps software accesses consumes displays web content http designed permit intermediate network elements improve enable communications clients servers high-traffic websites often benefit web cache servers deliver content behalf upstream servers improve response time web browsers cache previously accessed web resources reuse possible reduce network traffic http proxy servers private network boundaries facilitate communication clients without globally routable address relaying messages external servers http application layer protocol designed within framework internet protocol suite definition presumes underlying reliable transport layer protocol transmission control protocol tcp commonly used however http adapted use unreliable protocols user datagram protocol udp example httpu simple service discovery protocol ssdp http resources identified located network uniform resource locators urls using uniform resource identifiers uri schemes http https example including optional components codice_1 uris encoded hyperlinks html documents form interlinked hypertext documents http/1.1 revision original http http/1.0 http/1.0 separate connection server made every resource request http/1.1 reuse connection multiple times download images scripts stylesheets etc page delivered http/1.1 communications therefore experience less latency establishment tcp connections presents considerable overhead term hypertext coined ted nelson 1965 xanadu project turn inspired vannevar bush 1930s vision microfilm-based information retrieval management memex system described 1945 essay may think tim berners-lee team cern credited inventing original http along html associated technology web server text-based web browser berners-lee first proposed worldwideweb project 1989—now known world wide web first version protocol one method namely get would request page server response server always html page first documented version http http v0.9 1991 dave raggett led http working group http wg 1995 wanted expand protocol extended operations extended negotiation richer meta-information tied security protocol became efficient adding additional methods header fields officially introduced recognized http v1.0 1996 http wg planned publish new standards december 1995 support pre-standard http/1.1 based developing called http-ng rapidly adopted major browser developers early 1996 march year pre-standard http/1.1 supported arena netscape 2.0 netscape navigator gold 2.01 mosaic 2.7 lynx 2.5 internet explorer 2.0 end-user adoption new browsers rapid march 1996 one web hosting company reported 40 browsers use internet http 1.1 compliant web hosting company reported june 1996 65 browsers accessing servers http/1.1 compliant http/1.1 standard defined officially released january 1997 improvements updates http/1.1 standard released june 1999 2007 http working group formed part revise clarify http/1.1 specification june 2014 wg released updated six-part specification obsoleting http/2 published may 2015 http session sequence network request-response transactions http client initiates request establishing transmission control protocol tcp connection particular port server typically port 80 occasionally port 8080 see list tcp udp port numbers http server listening port waits client request message upon receiving request server sends back status line http/1.1 200 ok message body message typically requested resource although error message information may also returned http/0.9 1.0 connection closed single request/response pair http/1.1 keep-alive-mechanism introduced connection could reused one request persistent connections reduce request latency perceptibly client need re-negotiate tcp 3-way-handshake connection first request sent another positive side effect general connection becomes faster time due tcp slow-start-mechanism version 1.1 protocol also made bandwidth optimization improvements http/1.0 example http/1.1 introduced chunked transfer encoding allow content persistent connections streamed rather buffered http pipelining reduces lag time allowing clients send multiple requests waiting response another addition protocol byte serving server transmits portion resource explicitly requested client http stateless protocol stateless protocol require http server retain information status user duration multiple requests however web applications implement states server side sessions using instance http cookies hidden variables within web forms http provides multiple authentication schemes basic access authentication digest access authentication operate via challenge-response mechanism whereby server identifies issues challenge serving requested content http provides general framework access control authentication via extensible set challenge-response authentication schemes used server challenge client request client provide authentication information http authentication specification also provides arbitrary implementation-specific construct dividing resources common given root uri realm value string present combined canonical root uri form protection space component challenge effect allows server define separate authentication scopes one root uri client sends requests server server sends responses request message consists following request line header fields must end cr lf carriage return character followed line feed character empty line must consist cr lf whitespace http/1.1 protocol header fields except host optional request line containing path name accepted servers maintain compatibility http clients http/1.0 specification http defines methods sometimes referred verbs nowhere specification mention verb options head verb indicate desired action performed identified resource resource represents whether pre-existing data data generated dynamically depends implementation server often resource corresponds file output executable residing server http/1.0 specification defined get head post methods http/1.1 specification added five new methods options put delete trace connect specified documents semantics well-known depended client use method server configured support combination methods method unknown intermediate treated unsafe non-idempotent method limit number methods defined allows future methods specified without breaking existing infrastructure example webdav defined 7 new methods specified patch method method names case sensitive contrast http header field names case-insensitive general-purpose http servers required implement least get head methods methods considered optional specification methods example get head options trace convention defined safe means intended information retrieval change state server words side effects beyond relatively harmless effects logging web caching serving banner advertisements incrementing web counter making arbitrary get requests without regard context application state therefore considered safe however mandated standard explicitly acknowledged guaranteed contrast methods post put delete patch intended actions may cause side effects either server external side effects financial transactions transmission email methods therefore usually used conforming web robots web crawlers conform tend make requests without regard context consequences despite prescribed safety get requests practice handling server technically limited way therefore careless deliberate programming cause non-trivial changes server discouraged cause problems web caching search engines automated agents make unintended changes server example website might allow deletion resource url http //example.com/article/1234/delete arbitrarily fetched even using get would simply delete article one example occurring practice short-lived google web accelerator beta prefetched arbitrary urls page user viewing causing records automatically altered deleted en masse beta suspended weeks first release following widespread criticism methods put delete defined idempotent meaning multiple identical requests effect single request methods get head options trace prescribed safe also idempotent http stateless protocol contrast post method necessarily idempotent therefore sending identical post request multiple times may affect state cause side effects financial transactions cases may desirable cases could due accident user realize action result sending another request receive adequate feedback first request successful web browsers may show alert dialog boxes warn users cases reloading page may re-submit post request generally web application handle cases post request submitted note whether method idempotent enforced protocol web server perfectly possible write web application example database insert non-idempotent action triggered get request ignoring recommendation however may result undesirable consequences user agent assumes repeating request safe trace method used part class attacks known cross-site tracing reason common security advice disabled server configuration microsoft iis supports proprietary track method behaves similarly likewise recommended disabled response message consists following status line header fields must end cr lf empty line must consist cr lf whitespace strict requirement cr lf relaxed somewhat within message bodies consistent use system linebreaks cr lf alone http/1.0 since first line http response called status line includes numeric status code 404 textual reason phrase found way user agent handles response depends primarily code secondarily response header fields custom status codes used user agent encounters code recognize use first digit code determine general class response standard reason phrases recommendations replaced local equivalents web developer discretion status code indicated problem user agent might display reason phrase user provide information nature problem standard also allows user agent attempt interpret reason phrase though might unwise since standard explicitly specifies status codes machine-readable reason phrases human-readable http status code primarily divided five groups better explanation request responses client server named popular way establishing encrypted http connection https two methods establishing encrypted http connection also exist secure hypertext transfer protocol using http/1.1 upgrade header specify upgrade tls browser support two however nearly non-existent sample conversation http client http server running www.example.com port 80 client request consisting case request line one header field followed blank line request ends double newline form carriage return followed line feed host field distinguishes various dns names sharing single ip address allowing name-based virtual hosting optional http/1.0 mandatory http/1.1 means /index.html one etag entity tag header field used determine cached version requested resource identical current version resource server content-type specifies internet media type data conveyed http message content-length indicates length bytes http/1.1 webserver publishes ability respond requests certain byte ranges document setting field accept-ranges bytes useful client needs certain portions resource sent server called byte serving connection close sent means web server close tcp connection immediately transfer response header lines optional content-length missing length determined ways chunked transfer encoding uses chunk size 0 mark end content identity encoding without content-length reads content socket closed content-encoding like gzip used compress transmitted data gopher protocol content delivery protocol displaced http early 1990s spdy protocol alternative http developed google superseded new http protocol http/2 | [
10242,
8211,
10266,
6171,
10269,
10271,
35,
2085,
10284,
8238,
2098,
2099,
53,
2106,
4158,
64,
8265,
6231,
8281,
10341,
10344,
113,
115,
119,
2169,
124,
2182,
8335,
152,
2206,
8351,
172,
6318,
6319,
185,
6330,
2238,
8386,
6347,
10452,
4... | Test |
4,798 | 4 | National_Information_Assurance_Certification_and_Accreditation_Process:national information assurance certification accreditation process national information assurance certification accreditation process niacap formerly minimum-standard process certification accreditation computer telecommunications systems handle u.s. national-security information niacap derived department defense certification accreditation process ditscap played key role national information assurance partnership committee national security systems cnss policy cnssp 22 dated january 2012 cancelled cnss policy 6 “ national policy certification accreditation national security systems ” dated october 2005 national security telecommunications information systems security instruction nstissi 1000 “ national information assurance certification accreditation process niacap ” dated april 2000 cnssp 22 also states cnss intends adopt national institute standards technology nist issuances applicable additional cnss issuances occur needs nss sufficiently addressed nist document annex b identifies guidance documents includes nist special publications sp establishing organization-wide risk management program directs organization make use nist special publication 800-37 implies risk management framework rmf step 5 – authorize information system replaces certification accreditation process national security systems areas federal government fall sp 800-37 rev 1 | [
7528,
5865,
1875,
8627,
2558
] | None |
4,799 | 9 | John_McCarthy_(computer_scientist):john mccarthy computer scientist john mccarthy september 4 1927 – october 24 2011 american computer scientist cognitive scientist mccarthy one founders discipline artificial intelligence coined term artificial intelligence ai developed lisp programming language family significantly influenced design algol programming language popularized timesharing influential early development ai mccarthy spent career stanford university received many accolades honors 1971 turing award contributions topic ai united states national medal science kyoto prize john mccarthy born boston massachusetts september 4 1927 irish immigrant father lithuanian jewish immigrant mother john patrick ida glatt mccarthy family obliged relocate frequently great depression mccarthy father found work organizer amalgamated clothing workers los angeles california father came fishing village cromane county kerry ireland mother died 1957 mccarthy exceptionally intelligent graduated belmont high school two years early mccarthy accepted caltech 1944 mccarthy showed early aptitude mathematics teens taught college mathematics studying textbooks used nearby california institute technology caltech result able skip first two years mathematics caltech mccarthy suspended caltech failure attend physical education courses served us army readmitted receiving b.s mathematics 1948 caltech attended lecture john von neumann inspired future endeavors mccarthy initially completed graduate studies caltech moving princeton university received ph.d. mathematics institution 1951 student solomon lefschetz short-term appointments princeton stanford university mccarthy became assistant professor dartmouth 1955 year later mccarthy moved mit research fellow autumn 1956 1962 mccarthy became full professor stanford remained retirement 2000 end early days mit already affectionately referred uncle john students mccarthy championed mathematical logic artificial intelligence john mccarthy one founding fathers artificial intelligence together alan turing marvin minsky allen newell herbert a. simon mccarthy coined term artificial intelligence 1955 organized famous dartmouth conference summer 1956 conference started ai field minsky later joined mccarthy mit 1959 1958 proposed advice taker inspired later work question-answering logic programming john mccarthy invented lisp late 1950s based lambda calculus lisp soon became programming language choice ai applications publication 1960 1958 mccarthy served acm ad hoc committee languages became part committee designed algol 60 august 1959 proposed use recursion conditional expressions became part algol around 1959 invented so-called garbage collection methods solve problems lisp helped motivate creation project mac mit worked stanford university helped establish stanford ai laboratory many years friendly rival project mac mccarthy instrumental creation three earliest time-sharing systems compatible time-sharing system bbn time-sharing system dartmouth time sharing system colleague lester earnest told los angeles times internet would happened nearly soon except fact john initiated development time-sharing systems keep inventing new names time-sharing came called servers ... call cloud computing still time-sharing john started 1961 perhaps first suggest publicly idea utility computing speech given celebrate mit centennial computer time-sharing technology might result future computing power even specific applications could sold utility business model like water electricity idea computer information utility popular late 1960s faded mid-1990s however since 2000 idea resurfaced new forms see application service provider grid computing cloud computing 1966 mccarthy team stanford wrote computer program used play series chess games counterparts soviet union mccarthy team lost two games drew two games see kotok-mccarthy 1978 1986 mccarthy developed circumscription method non-monotonic reasoning 1982 seems originated idea space fountain type tower extending space kept vertical outward force stream pellets propelled earth along sort conveyor belt returns pellets earth payloads would ride conveyor belt upward mccarthy often commented world affairs usenet forums ideas found sustainability web page aimed showing human material progress desirable sustainable mccarthy serious book reader optimist staunch supporter free speech best usenet interaction visible rec.arts.books archives john actively attended sf bay area dinners palo alto r.a.b readers called rab-fests john went defend free speech criticism involving european ethnic jokes stanford mccarthy saw importance mathematics mathematics education usenet .sig years refuses arithmetic doomed talk nonsense license plate cover read similarly arithmetic doomed talk nonsense advised 30 phd graduates 2001 short story robot baby farcically explored question whether robots simulate emotions anticipated aspects internet culture social networking become increasingly prominent ensuing decades mccarthy married three times second wife vera watson programmer mountaineer died 1978 attempting scale annapurna part all-women expedition organised arlene blum later married carolyn talcott computer scientist stanford later sri international mccarthy considered atheist raised communist became conservative republican two-day visit czechoslovakia 1968 soviet invasion mccarthy died home stanford october 24 2011 1979 mccarthy wrote article entitled ascribing mental qualities machines wrote machines simple thermostats said beliefs beliefs seems characteristic machines capable problem-solving performance 1980 philosopher john searle responded famous chinese room argument disagreeing mccarthy taking stance machines beliefs simply conscious searle argues machines lack understanding intentionality term commonly used philosophy mind vast amount literature written support one side | [
512,
10752,
11269,
2056,
2062,
9231,
7184,
2577,
9749,
8728,
4633,
4122,
8226,
4643,
3119,
5684,
2105,
3132,
6717,
8258,
8771,
70,
1610,
1611,
588,
1613,
9299,
10841,
3675,
7775,
4194,
7267,
2660,
8293,
9315,
2666,
3698,
5751,
7805,
1159,... | None |
4,800 | 9 | Amir_Pnueli:amir pnueli amir pnueli april 22 1941 – november 2 2009 israeli computer scientist 1996 turing award recipient pnueli born nahalal british mandate palestine israel received bachelor degree mathematics technion haifa ph.d. applied mathematics weizmann institute science thesis topic calculation tides ocean switched computer science stint post-doctoral fellow stanford university works computer science focused temporal logic model checking particularly regarding fairness properties concurrent systems returned israel researcher founder first chair computer science department tel aviv university became professor computer science weizmann institute 1981 1999 death pnueli also held position computer science department new york university new york u.s.. pnueli also founded two startup technology companies career three children death four grandchildren pnueli died november 2 2009 brain hemorrhage | [
7048,
11020,
10668,
2482,
1976,
2238,
4799,
10049,
4930,
70,
3529,
1883,
7775,
9315,
11242,
2283,
2798,
1783,
511
] | None |
4,801 | 6 | Cryptmount:cryptmount cryptmount software tool managing encrypted file systems linux family operating systems uses device mapper dm-crypt infrastructure provide transparent encryption file systems stored disk partitions within ordinary files main features codice_1 include | [
9762,
7983,
5840,
11568,
7794,
823,
9882,
700,
2045
] | None |
4,802 | 7 | Infrastructure_as_code:infrastructure code infrastructure code iac process managing provisioning computer data centers machine-readable definition files rather physical hardware configuration interactive configuration tools infrastructure managed comprises physical equipment bare-metal servers well virtual machines associated configuration resources definitions may version control system use either scripts declarative definitions rather manual processes term often used promote declarative approaches iac approaches promoted cloud computing sometimes marketed infrastructure service iaas iac supports iaas confused iac grew response difficulty posed two pieces technology – utility computing second-generation web frameworks 2006 launch amazon web services ’ elastic compute cloud 1.0 version ruby rails months brought widespread scaling problems many enterprises problems previously witnessed huge companies new tools emerging handle ever growing field idea iac born thought modelling infrastructure code ability design implement deploy applications infrastructure known software best practices appealed software developers infrastructure administrators ability treat like code use tools software project would allow developers rapidly deploy applications value iac broken three measurable categories cost reduction speed faster execution risk remove errors security violations cost reduction aims helping enterprise financially also terms people effort meaning removing manual component people able refocus efforts towards enterprise tasks infrastructure automation enables speed faster execution configuring infrastructure aims providing visibility help teams across enterprise work quickly efficiently automation removes risk associated human error like manual misconfiguration removing decrease downtime increase reliability outcomes attributes help enterprise move towards implementing culture devops combined working development operations generally three approaches iac declarative functional vs. imperative procedural vs. intelligent environment aware difference declarative imperative intelligent approach essentially 'what versus 'how versus 'why declarative approach focuses eventual target configuration imperative focuses infrastructure changed meet intelligent approach focuses configuration certain way consideration co-relationships co-dependencies multiple applications running infrastructure typically found production declarative approach defines desired state system executes needs happen achieve desired state imperative defines specific commands need executed appropriate order end desired conclusion intelligent determines correct desired state system executes needs happen achieve desired state impact co-dependent applications environment aware desired state next generation iac two methods iac 'push 'pull main difference manner servers told configured pull method server configured pull configuration controlling server push method controlling server pushes configuration destination system many tools fulfill infrastructure automation capabilities use iac broadly speaking framework tool performs changes configures infrastructure declaratively imperatively based programmatic approach considered iac traditionally server lifecycle automation configuration management tools used accomplish iac enterprises also using continuous configuration automation tools stand-alone iac frameworks microsoft ’ powershell dsc aws cloudformation continuous configuration automation cca tools thought extension traditional iac frameworks leverage iac change configure automate infrastructure also provide visibility efficiency flexibility infrastructure managed additional attributes provide enterprise-level security compliance making companies keen implementing types tools important aspect considering cca tools open source community content gartner states value cca tools “ dependent user-community-contributed content support commercial maturity performance automation tooling. ” vendors like puppet chef around significant amount time created communities chef chef community repository puppet puppetforge vendors rely adjacent communities leverage iac frameworks powershell dsc new vendors emerging content driven model driven intelligence product deliver content visual object-oriented systems work well developers especially useful production oriented devops operations constituents value models versus scripting content field continues develop change community based content become ever important iac tools used unless model driven object oriented notable cca tools include iac key attribute enabling best practices devops – developers become involved defining configuration ops teams get involved earlier development process tools utilize iac bring visibility state configuration servers ultimately provide visibility users within enterprise aiming bring teams together maximize efforts automation general aims take confusion error-prone aspect manual processes make efficient productive allowing better software applications created flexibility less downtime overall cost effective way company iac intended reduce complexity kills efficiency manual configuration automation collaboration considered central points devops infrastructure automation tools often included components devops toolchain | [
4194,
8581,
6856,
5770,
8554,
1004,
4429,
7628,
7248,
1435,
9948,
9245
] | None |
4,803 | 2 | CPU_shielding:cpu shielding cpu shielding practice multiprocessor system cpu multiple cores real-time tasks run one cpu core non-real-time tasks run another operating system must able set cpu affinity processes interrupts linux order shield cpus individual interrupts serviced make sure following kernel configuration parameter set | [
7938,
7812,
8326,
4360,
4493,
2195,
11155,
1813,
10780,
1694,
3618,
4011,
9646,
7983,
10675,
823,
9660,
10817,
4423,
5067,
5457,
8147,
1761,
4841,
1776
] | Validation |
4,804 | 2 | Dominic_Giampaolo:dominic giampaolo dominic p. giampaolo software developer helped develop file system operating system beos currently works apple inc. graduating lewiston high school lewiston maine 1987 started studying political science american university washington dc changed computer science one semester completing bachelor degree master degree worcester polytechnic institute graduating travelled west coast work silicon graphics advanced systems division worked group ported irix 64-bit r8000 microprocessor chip set worked realityengine infinitereality graphics systems working silicon graphics located fixed bug discreet logic flame compositing system delaying post-production motion picture speed october 1995 giampaolo heard bebox friend poker game shortly visiting inc. offices see demo computer began working beos working initially number areas including kernel posix layer notably developing file system alongside cyril meurillon replaced old file system written benoit schillings replaced original flat file system written meurillon file system included number advances compared personal computer filesystems use time journal improve reliability support extensive metadata indexed respond quickly searches giampaolo worked google qnx software systems qnx discovered bug instruction fetch unit intel pentium ii pentium iii processors since march 2002 giampaolo working apple inc. part mac os x file system apple file system project spotlight groups | [
9762,
10051,
5293,
3312,
6256,
8114,
9335,
4665
] | None |
4,805 | 3 | Socket_5:socket 5 socket 5 created second generation intel p5 pentium processors operating speeds 75 120 mhz well certain pentium overdrive pentium mmx processors core voltage 3.3 v. superseded earlier socket 4 released march 1994 consisting 320 pins first socket use staggered pin grid array spga allowed chip pins spaced closer together earlier sockets socket 5 replaced socket 7 1997 | [
3588,
1677,
5901,
8851,
4246,
2455,
3992,
8855,
11417,
3995,
4252,
6175,
7714,
10019,
4523,
2604,
2350,
6192,
9649,
4537,
2874,
7105,
7110,
8394,
3403,
4427,
4179,
3798,
4185,
473,
7002,
9945,
11484,
9570,
10468,
613,
8552,
1260,
4717,
10... | Test |
4,806 | 4 | Information_Exchange_Gateway:information exchange gateway nato defined concept information exchange gateway ieg facilitate secure communication different security management domains ieg designed provide standard secure method communication nato nato nations non-nato nations coalition forces non government organisations ngos international organisations ios information exchange gateway provides information exchange services ies facilitate exchange information networks including data protocol translation necessary information protection services ips ensure intended information exchanged addition node protection services nps ensure information exchanged safe secure way intended information validated ips exchanged nato defined five main ieg scenarios scenario variants transferring classified information scenarios take account security classifications domains connect well security policy owners administrators domains scenarios ieg must include guard provide ips nps functions used guard ieg dmz split two | [
5608,
3930,
6110
] | Test |
4,807 | 3 | Macintosh_SE/30:macintosh se/30 macintosh se/30 personal computer designed manufactured sold apple computer inc. january 1989 october 1991 fastest original black-and-white compact macintosh series se/30 black-and-white monitor single pds slot rather nubus slots iix se/30 shares common architecture supported third-party accelerators network cards display adapter although officially able support 32 mb se/30 could expand 128 mb ram significant amount ram time included 40 80 mb hard drive also first compact mac include 1.44 mb high density floppy disk drive standard late versions se one earlier versions power se/30 demonstrated use produce week newspaper first colour tabloid newspaper uk use new digital pre-press technology personal desktop computer keeping apple practice apple ii+ power macintosh g3 announced logic board upgrade available convert regular se se/30 se would exactly specs se/30 difference floppy drive se 800 kb drive set included new front bezel replace original se bezel se/30 naming scheme used time apple indicated presence 68030 processor adding letter x model name macintosh se upgraded 68030 processor posed awkward problem apple willing name new computer macintosh sex thus se/30 name chosen internally code names green jade fafnir roadrunner used machine followed 1991 macintosh classic ii despite processor clock speed 60 fast se/30 due 16-bit data path supported 10 mb memory lacked internal expansion slot made motorola 68882 fpu optional upgrade although uses 32-bit instructions se/30 rom like iix rom includes code using 24-bit addressing rendering rom 32-bit dirty limited actual amount ram accessed 8 mb system 6.0.8 system extension called mode32 enables access installed extra memory system 6.0.8 system 7.0 system 7.5.5 se/30 use 128 mb ram alternatively replacing rom simm one mac iisi mac iifx makes se/30 32-bit-clean thereby enables use 128 mb ram system 7.5 os 8.1 standard se/30 run system 7.5.5 since mac os 7.6 requires 32-bit-clean rom additionally se/30 run a/ux apple older version unix able run macintosh programs though official upgrade path se/30 several third-party processor upgrades available 68040 upgrade made possible run mac os 8.1 extended se/30 productive life many years micron technology xceed gray-scale 30 video card fit se/30 pds slot enabling display greyscale video internal display non-color compact mac able bruce f. webster wrote macworld march 1989 se/30 break new ground however establish apple commitment classic mac product line provides users apple-supported alternative either small slow mac large powerful one important fills gap macintosh family ... new level power portability macintosh community january 2009 macworld feature commemorating 25th anniversary macintosh three industry commentators – adam c. engst tidbits john gruber daring fireball john siracusa ars technica – chose se/30 favorite mac model time like great mac wrote gruber se/30 n't terrific system debuted remained eminently usable years come think original mac era machine mind se/30 se/30 remains popular hobbyists described “ best computer apple ever make ” used models selling significant premium machines era contemporary pds upgrades allowed se/30 ’ internal monitor upgraded support 256 shades gray original-design macintosh support upgrade 68040 processor se/30 ’ standard ram limit 128mb greatly exceeded even much later models color classic macintosh lc ii 2018 add-ons software became available add wifi even streaming spotify support se/30 nbc tv series seinfeld jerry se/30 sitting desk first seasons would first many macs occupy desk including powerbook duo twentieth anniversary macintosh fx series always sunny philadelphia waitress seen macintosh se/30 bedroom desk episode gang gives back film watchmen ozymandias all-black tempest-shielded se/30 desk film peter parker shown macintosh se/30 bedroom | [
7697,
4114,
6165,
11289,
7706,
8222,
1057,
6183,
1576,
4139,
7211,
8253,
576,
1090,
4180,
10838,
10840,
9312,
8806,
6258,
10357,
4220,
10365,
10878,
6783,
7299,
4741,
8842,
6283,
7824,
147,
7830,
6807,
4258,
7842,
7844,
3241,
7869,
8893,
... | Test |
4,808 | 9 | TSP_(econometrics_software):tsp econometrics software tsp programming language estimation simulation econometric models tsp stands time series processor although also commonly used cross section panel data program initially developed robert hall graduate studies massachusetts institute technology 1960s company behind program tsp international founded 1978 bronwyn h. hall robert hall wife divorce april 1983 asset tsp split two versions subsequently two versions diverged terms interface types subroutines included one version tsp still developed tsp international version initially named microtsp named eviews developed quantitative micro software | [
5129,
7945,
3980,
2317,
6797,
7950,
2457,
7580,
7326,
7983,
6962,
823,
6718,
5830,
5703,
8262,
5833,
5450,
2000,
9944,
2652,
10848,
4840,
363,
5612,
7924
] | Test |
4,809 | 7 | Access_Grid:access grid access grid collection resources technologies enables large format audio video based collaboration groups people different locations access grid ensemble resources including multimedia large-format displays presentation interactive environments interfaces grid computing middleware visualization environments simple terms advanced videoconferencing using big displays multiple simultaneous camera feeds node site technology invented argonne national laboratory chicago alliance chautauqua 99 series two-day conferences computational science organised ncsa first large-scale access grid event access grid later demonstrated supercomputing'99 portland international audience latest stable version software release 3.2 also installable bundle additional video codecs hd additional tools access grid generated great interest activity australia factors widely disparate geographic locations relatively low population-densities previously presented great obstacles in-person collaborations international centre excellence education mathematics ice-em funded 10 australian universities construct nodes nodes allow mathematics postgraduate community professionals access international experts visiting australia nodes also provide means carrying collaborative research peers within australia internationally australia first access grid node built sydney vislab australian technology park august 2001 2007 australian ag network grown 30 sites serviced asia pacific access grid apag venue servers university sydney ag2 university queensland ag3 university queensland began providing ag facilities 2002 increasing usage every year since 2004 uq vislab began providing access grid installation packages various linux distributions well freebsd wider ag community although intellectual property concerns placed future linux-based technologies doubt also active developing various enhancements add-ons including shared applications remote sensor monitoring shared application remote thermo shared gis based grass december 2006 new zealand university operational ag node use grid increasing current development work includes federated data management using storage resource broker srb high definition video communications uk academic community support access grid toolkit iocom evo technologies janet provided janet videoconferencing management centre first access grid ag node built university manchester 2001 jisc-funded support access grid support centre agsc manchester april 2004 july 2011 three hundred ag nodes registered uk ranging full room nodes small individual desktop nodes number academic projects using ag technologies taught course centre magic postgraduate mathematics mathematics projects | [
10641,
8122,
5956,
7407
] | Train |
4,810 | 3 | Macintosh_IIci:macintosh iici macintosh iici personal computer designed manufactured sold apple computer inc. september 1989 february 1993 powerful version macintosh iicx released earlier year shares compact case design three expansion slots iici improved upon iicx 16 mhz motorola 68030 cpu 68882 fpu replacing 25 mhz versions chips macintosh quadra 700 introduced end 1991 apple mainstream workstation product replace iici albeit significantly higher price point time apple authorized resellers offering entry-level iici systems 4,000 usd less whereas quadra 700 entered market 6,000 usd apple continued sell iici early 1993 less expensive quadra 650 comparably-priced quadra 800 introduced iici introduced several technical architectural enhancements important preparing system 7 called blue project would influence future macintoshes though came cost compatibility iici one popular longest-lived macintosh models 20th century much lifespan business workhorse macintosh line short time 1989 introduction 40 mhz macintosh iifx iici fastest mac available iici came either 40- 80-megabyte hard disk possible upgrades include 25 33 40 50 mhz daystar 68030 boards quadra 700 motherboard couple different third-party 68040 upgrades two powerpc 601 upgrade cards running either 66 mhz 100 mhz exclusively daystar digital bought xlr8 still holds daystar product logo name line products 68030 68040 upgrades also made sonnet diimo companies quadra 700 released 1991 logic board upgrade made available iici upgrade performance level quadra easter egg exists iici rom system date set september 20 1989 machine release date keys held boot time image development team displayed signatures product design team seen molded plastic case one removes motherboard | [
7697,
4114,
6165,
11289,
7706,
8222,
1057,
6183,
1576,
4139,
7211,
1592,
8253,
576,
1090,
4180,
10838,
10840,
9312,
8806,
6258,
10357,
4220,
10365,
10878,
6783,
7299,
4741,
8842,
6283,
7824,
147,
7830,
6807,
4258,
7842,
7844,
7869,
8893,
... | Test |
4,811 | 1 | In-memory_processing:in-memory processing computer science in-memory processing emerging technology processing data stored in-memory database older systems based disk storage relational databases using sql query language increasingly regarded inadequate meet business intelligence bi needs stored data accessed much quickly placed random-access memory ram flash memory in-memory processing allows data analysed real time enabling faster reporting decision-making business hitherto prevalent disk-based technology data loaded computer hard disk form multiple tables multi-dimensional structures queries run disk-based technologies relational database management systems rdms often based structured query language sql sql server mysql oracle many others rdms designed requirements transactional processing using database supports insertions updates well performing aggregations joins typical bi solutions typically slow another drawback sql designed efficiently fetch rows data bi queries usually involve fetching partial rows data involving heavy calculations improve query performance multidimensional databases olap cubes also called multidimensional online analytical processing molap constructed designing cube elaborate lengthy process changing cube structure adapt dynamically changing business needs may cumbersome cubes pre-populated data answer specific queries although increase performance still suitable answering ad-hoc queries information technology staff spend substantial development time optimizing databases constructing indexes aggregates designing cubes star schemas data modeling query analysis reading data hard disk much slower possibly hundreds times compared reading data ram especially analyzing large volumes data performance severely degraded though sql powerful tool complex queries take relatively long time execute often result bringing performance transactional processing order obtain results within acceptable response time many data warehouses designed pre-calculate summaries answer specific queries optimized aggregation algorithms needed increase performance memory processing accomplished via traditional databases oracle db2 microsoft sql server via nosql offerings in-memory data grid like hazelcast infinispan oracle coherence scaleout software in-memory database data grid information initially loaded memory ram flash memory instead hard disks data grid processing occurs three order magnitude faster relational databases advanced functionality acid degrade performance compensation additional functionality arrival column centric databases store similar information together allow data stored efficiently greater compression ratios allows huge amounts data stored physical space reducing amount memory needed perform query increasing processing speed many users software vendors integrated flash memory systems allow systems scale larger data sets economically oracle integrating flash memory oracle exadata products increased performance microsoft sql server 2012 bi/data warehousing software coupled violin memory flash memory arrays enable in-memory processing data sets greater 20tb users query data loaded system ’ memory thereby avoiding slower database access performance bottlenecks differs caching widely used method speed query performance caches subsets specific pre-defined organized data in-memory tools data available analysis large data mart small data warehouse entirely memory accessed quickly multiple concurrent users applications detailed level offers potential enhanced analytics scaling increasing speed application theoretically improvement data access speed 10,000 1,000,000 times compared disk also minimizes need performance tuning staff provides faster service end users certain developments computer technology business needs tended increase relative advantages in-memory technology range in-memory products provide ability connect existing data sources access visually rich interactive dashboards allows business analysts end users create custom reports queries without much training expertise easy navigation ability modify queries fly benefit many users since dashboards populated fresh data users access real time data create reports within minutes in-memory processing may particular benefit call centers warehouse management in-memory processing source database queried instead accessing database every time query run thereby eliminating repetitive processing reducing burden database servers scheduling populate in-memory database overnight database servers used operational purposes peak hours large number users large amount ram needed in-memory configuration turn affects hardware costs investment likely suitable situations speed query response high priority significant growth data volume increase demand reporting facilities may still cost-effective information subject rapid change security another consideration in-memory tools expose huge amounts data end users makers advise ensuring authorized users given access data | [
3219,
11030,
2456,
8353,
10658,
675,
2339,
10413,
3886,
10675,
2234,
10048,
4036,
9286,
2383,
7767,
862,
11487,
2273,
5090,
10340,
1382,
1770,
5355,
7022,
2558
] | Test |
4,812 | 2 | MS-DOS_5_Beta:ms-dos 5 beta ms-dos 5.0 project started december 1989 ms-dos 5.0 codename lifeboat based ms-dos 4.00 code ms-dos 5.00 first version ms-dos use betas builds several ms-dos 5.00 betas released final launch | [
9166
] | Test |
4,813 | 4 | Cyber-arms_industry:cyber-arms industry cyber-arms industry markets associated events surrounding sale software exploits zero-days cyberweaponry surveillance technologies related tools term may extend grey black markets online offline many years burgeoning dark web market remained niche available in-the-know well funded since least 2005 western governments including u.s. united kingdom russia france israel buying exploits defence contractors individual hackers 'legitimate market zero day exploits exists well advertised immediately accessible attempts openly sell zero day exploits governments security vendors keep black market far unsuccessful traditional arms producers military services companies bae systems eads leonardo general dynamics raytheon thales expanded cybersecurity markets however smaller software companies blue coat amesys also become involved often drawing attention providing surveillance censorship technologies regimes bashar al-assad syria muammar gaddafi libya suppliers exploits western governments include massachusetts firm netragard trade show iss world runs every months referred 'international cyber arms bazaar 'wiretappers ball focuses surveillance software lawful interception popular internet forums generally russian ukrainian reports english-only chinese-only german-only vietnamese-only sites among others phishing spear-phishing social engineer campaigns typically done english majority potential victims know language india central bureau investigation describe proliferation underground markets 'widespread colonel john adams head marine corps intelligence activity expressed concerns markets could allow cyberweapony fall hands hostile governments would otherwise lack expertise attack advanced country computer systems online increasing uses encryption privacy mechanisms record messaging cryptocurrencies since 2005 darknet markets black markets 'cyber arms bazaar prices dropping fast cost cyberweapony plummeting least 90 percent botnets increasingly rented cyber criminals commodities variety purposes rdp shops offer cheap access hacked computers recent years many software firms success bug bounty programs cases vupen chrome exploit rejected market value meanwhile vendors hp spent 7 million 2005 2015 buying exploits software behaviour criticised head united states cyber command general keith alexander building black market | [
3520,
2148,
3423,
711,
5384,
297,
3629,
7759,
3473,
4689,
4883,
3092,
4945,
6326,
9688,
3290,
6588,
127
] | Train |
4,814 | 4 | FireHOL:firehol firehol shell script designed wrapper iptables written ease customization linux kernel firewall netfilter firehol graphical user interface configured easy understand plain text configuration file advantage firehol friendliness beginners n't worry answer packet firehol first parses configuration file sets appropriate iptables rules achieve expected firewall behavior large complex bash script file depending iptables console tools rather communicating kernel directly advantage portability linux system iptables bash appropriate tools run main drawback slower starting times particularly older systems since delay happens per boot—or less resulting rules saved disk—high performance generally important except embedded systems firehol also benefits shell flexibility easily extended configured high degree firehol configuration files fully functional bash scripts one write scripts normal shell syntax operate expected one might loop firehol statement forward entire set ports example firehol free software open-source distributed terms gnu general public license | [
1792,
2049,
4480,
2563,
6797,
10387,
1172,
9496,
3482,
1436,
4511,
6431,
10531,
5924,
550,
8998,
10790,
3243,
1708,
3885,
7983,
8753,
823,
569,
5178,
11577,
9279,
5057,
1858,
10433,
11073,
2118,
10574,
9423,
7121,
10451,
10708,
11221,
4568,... | Validation |
4,815 | 6 | Ntfsprogs:ntfsprogs ntfsprogs collection free unix utilities managing ntfs filesystem used windows nt operating system since version 3.1 hard disk partition 'ntfsprogs first stable method writing ntfs partitions linux ntfs versions supported used 32-bit 64-bit windows ntfsprogs remains popular way interacting ntfs partitions included linux distributions live cds also versions compiled windows april 12 2011 tuxera announced ntfsprogs project merged ntfs-3g programs included basic functionality and/or intended developers | [
7136,
3841,
7810,
9762,
3975,
7983,
8976,
2193,
5492,
5397,
823,
1150,
639
] | None |
4,816 | 2 | Surface_(2012_tablet):surface 2012 tablet first-generation surface launched surface windows rt later marketed surface rt hybrid tablet computer developed manufactured microsoft announced june 18 2012 released october 26 2012 first ever personal computer designed in-house microsoft positioned direct competitor apple ipad line surface included several notable features including folding kickstand allowed tablet stand angle ability attach optional protective covers incorporated keyboards surface served launch device windows rt variation windows 8 designed devices based arm architecture windows rt contains notable differences limitations compared windows 8 including several removed features bundled special edition microsoft office 2013 home student besides software included operating system incompatible desktop software runs windows 8 personal computers tablets intel compatible processors windows rt run metro-style apps obtained windows store however visually resembling surface pro 2-in-1 detachable surface considered 2-in-1 pc fact variant hybrid tablet surface met mixed reviews although praised hardware design accessories aspects operating system criticism directed towards performance device well limitations windows rt operating system application ecosystem sales surface poor microsoft cutting price worldwide taking us 990 million loss july 2013 result succeeded surface 2 2013 comes newer rt 8.1 os original surface also since received update support surface 2 end 2023 device announced press-only event los angeles first pc microsoft designed manufactured in-house surface supports wifi wireless connectivity cellular variant tablet went sale eight countries australia canada china france germany hong kong united kingdom united states surface pro launched later surface tablet display 1366x768 pixels five-point multi-touch touchscreen gorilla glass 2 device measures made magnesium kickstand usb port magnetic keyboard interface give surface ability add wireless mouse external keyboard thumb drive also slot microsd card add 200 gb surface runs windows rt preloaded windows mail calendar contacts sports news travel finance camera weather reader skydrive store photos skype longer supported maps games messaging bing desktop xbox music xbox video windows store applications supports microsoft office home student 2013 rt includes word powerpoint excel onenote within desktop application windows rt allows installing windows store applications windows rt compiled entirely arm instruction set architecture major update windows rt 8.0 launched october 17 2013 called windows rt 8.1 update brought many improvements surface overhauled mail app bing apps like reading list onedrive updated skydrive also brought support larger tiles help tips app internet explorer 11 outlook 2013 rt changes pc settings lockscreen photo slideshow infinitely re-sizable apps start button speed improvements later update windows rt 8.1 dubbed windows rt 8.1 update added search button start screen well taskbar modern ui title bar modern ui apps surface launched two accessories type cover touch cover touch cover came white black magenta red cyan type cover came black limited edition touch covers released featuring laser-etched artwork back touch type covers double keyboards magnetically attach surface accessory spine later adapters micro-hdmi hdmi vga released cnet praised design surface noting looked practical without cold feels like high-quality device microsoft cut corners make kickstand also praised feel quality kickstand keyboard cover accessories also noted satisfying clicking sound engaged attached covers deemed essential getting complete surface experience touch cover praised spacious typing area tablet keyboard attachments usable getting used soft feel type cover recommended touch cover due higher quality conventional key design surface display praised larger size widescreen aspect ratio ipad line panned muted color reproduction touchscreen-oriented aspects windows 8 interface praised elegant albeit harder learn android ios windows rt operating system panned still requiring use mouse-oriented desktop interface access applications settings accessible within metro shell poor application ecosystem windows store state on-launch compared ghost town apocalypse surface also panned poor performance especially comparison tegra 3-based tablets conclusion felt paired keyboard cover surface excellent office productivity tool best tablet form entertainment needs n't go far beyond movies tv shows music occasional simple game 're covered well assuming windows store would eventually improve application selection surface wonky performance keep useful productivity device reaching true tablet greatness sales surface windows rt devices poor july 2013 microsoft reported loss us 900 million due lackluster sales surface cut price 30 worldwide microsoft price cut result slight increase market share device late-august 2013 usage data advertising network adduplex provides advertising services within windows store apps revealed surface share increased 6.2 9.8 | [
4356,
11524,
5384,
6539,
6797,
782,
1935,
10900,
3605,
9498,
11549,
7970,
1832,
6827,
7983,
3890,
8757,
10303,
4289,
9033,
2635,
10957,
4051,
11221,
11605,
2777,
11103,
10338,
3304,
617,
8681,
9964,
1400
] | Validation |
4,817 | 7 | Shared-nothing_architecture:shared-nothing architecture shared-nothing architecture sn distributed-computing architecture update request satisfied single node processor/memory/storage unit intent eliminate contention among nodes nodes share independently access memory storage one alternative architecture shared everything requests satisfied arbitrary combinations nodes may introduce contention multiple nodes may seek update data time sn eliminates single points failure allowing overall system continue operating despite failures individual nodes allowing individual nodes upgrade without system-wide shutdown sn system scale simply adding nodes since central resource bottlenecks system another term sn sharding sn system typically partitions data among many nodes refinement replicate commonly used infrequently modified data across many nodes allowing requests resolved single node michael stonebraker university california berkeley used term 1986 database paper teradata delivered first sn database system 1983 tandem computers released nonstop sql shared nothing database 1984 shared-nothing popular web development shared-nothing architectures prevalent data warehousing applications although requests require data multiple nodes dramatically reduce throughput | [
11136,
8195,
8965,
7175,
9225,
5772,
3990,
4630,
9883,
7581,
4255,
6433,
8226,
8229,
7085,
9782,
11203,
5956,
9285,
1606,
333,
11343,
337,
2901,
3927,
4696,
2011,
1636,
5999,
1142,
7288,
7802,
3196
] | Test |
4,818 | 3 | Zanac:zanac released msx computer family computer disk system nintendo entertainment system virtual console reworked msx2 computer zanac ex playstation zanac x zanac players fly lone starfighter dubbed afx-6502 zanac twelve levels goal destroy system —a part-organic part-mechanical entity bent destroying mankind zanac developed main core developers compile including masamitsu moo niitani koji janus teramoto takayuki jemini hirono developers went make popular similarly-based games guardian legend blazing lazers puyo puyo series game known intense fast-paced gameplay level difficulty music seems match pace game praised unique adaptive artificial intelligence game automatically adjusts difficulty level according player skill level rate fire ship current defensive status/capability zanac player controls spaceship afx-6502 zanac flies various planets space stations outer space armada enemies comprising defenses game main antagonist—the system player must fight twelve levels destroy system defenses objective shoot enemies projectiles accumulate points players start three lives lose life get hit enemy projectile losing life gameplay continues player reappearing screen losing previously accumulated power-ups player remains temporarily invincible moment upon reappearing screen game ends player lives lost completing twelfth final area however player earn 1-ups extra lives throughout game accumulating high point scores zanac continue option allows players restart game level lost lives player operates rapid-fire main cannon upgraded collecting power-ups found blue boxes periodically descend top screen main cannon power level upgraded number bullets fired ship well speed increases addition player operates specialty weapon separate main cannon eight different specialty weapons represented differently-numbered power-ups player change type specialty weapon equipped collecting differently-numbered power-up upgrade current specialty weapon collecting numbered power-up matches current weapon weapons range directional bullets shields indestructible projectiles players lose accumulated power-ups lose life enemies zanac include meteors various bullet-shooting enemy aircraft bullet-resistant disks ground turrets reconnaissance planes bosses consist stationary fortresses consisting entirely ground turrets player must destroy turrets within specified time limit score bonus points every stage one stationary fortresses addition large enemy ships acting mini-bosses appear throughout game ships resistant player weaponry bullets inflict minor damage repelled mini-bosses change color become damaged distinguishing aspect zanac gameplay unique enemy artificial intelligence called automatic level difficulty control alc alc measures system aggressiveness game difficulty depending actions player attack pattern skill level alc increases experts decreases inexperienced players instance shooting main cannon frequently collecting power-ups failing destroy bosses within specified time limit increases alc resulting greater number tougher enemies appearing screen however actions losing lives starting new level destroying reconnaissance planes reduces alc resulting fewer on-screen enemies plot zanac revolves around system —a device figuratively similar pandora box system created millennia ago unknown alien race contains boundless wisdom knowledge well vast destructive potential properly opened would grant access untold wisdom technology improperly accessed would unleash almost unlimited destruction mankind attempted access system failed causing system spread throughout space exert mass destruction forms life including human race mankind discovered properly access knowledge technology within system could shut destructive expansion vast tactical systems moreover defenses system designed around destroying overcoming entire fleets mankind hopes lone starfighter may able slip penetrate defenses system allowing ship fight way heart system destroy afx-6502 zanac advanced starfighter ever produced launched desperate mission fight way heart system shut zanac initially released 1986 msx computer japanese video game company compile—the company responsible games blazing lazers devil crush puyo puyo series compile re-released game msx2 computer later year zanac ex featured improved graphics sound original msx version zanac ported heavily reworked release family computer disk system japan north america nes october 1987 nes version later re-released wii virtual console service published d4 enterprise version identical nes version released 1987 compile released compilation titled zanac x zanac sony playstation console japan commemorate 15th anniversary original compilation features updated version zanac —titled zanac neo —and three versions nes version game including version featuring enhanced graphics sound game features two-player cooperative gameplay well remix game soundtrack zanac retrospect considered unique shoot 'em game combining gameplay elements games xevious especially extensive power-up system vertical-scrolling gameplay features air ground targets brett alan weiss allgame praised zanac calling extremely fast-paced shooter player almost completely surrounded enemy ships bullets praises game music seems flow along action game calls music least close get zen moment playing shooting game nes frank provo gamespot lauded zanac difficulty level ability handle many sprites screen without slowdown glitches unique ai placed game subgenre however criticisms include mediocre primitive music sound steep learning curve gameplay difficulty level poor translation game game instruction manual addition weiss says enemies zanac fearsome n't much personality | [
4818,
226,
10931,
9006
] | None |
4,819 | 6 | Case_preservation:case preservation computer file system stores file names computer may keep discard case information case stored called case preservation system case-preserving necessarily case-insensitive possible common system case-insensitive yet case-preserving combination often considered natural people understand people prefer using correct capitalization still recognize others example someone refers united states america understood mean united states america even though capitalization incorrect versions macos prior introduction apfs current versions microsoft windows operating systems versions amiga os case-preserving case-insensitive cases since case-insensitive requesting file name capitalization used contrast case-sensitive systems single capitalization would work case-preserving viewing file name presented capitalization used file created non-case-preserving system arbitrary capitalization would displayed instead upper- lower-case also case-insensitive case preserving file systems readme.txt readme.txt folder examples systems various case-sensitivity case-preservation exist among file systems | [
5120,
2564,
6669,
3598,
10257,
9236,
6677,
5142,
8214,
3611,
9249,
9762,
5158,
7225,
11323,
8772,
1109,
4708,
9836,
7789,
9333,
6263,
9335,
9343,
7818,
6797,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
5286,
10405,
5293,
7344,
2230,
5... | None |
4,820 | 4 | Security_Technical_Implementation_Guide:security technical implementation guide security technical implementation guide stig cybersecurity methodology standardizing security protocols within networks servers computers logical designs enhance overall security guides implemented enhance security software hardware physical logical architectures reduce vulnerabilities examples stigs would benefit configuration desktop computer enterprise server operating systems inherently secure leaves open criminals identity thieves computer hackers stig describes minimize network-based attacks prevent system access attacker interfacing system either physically machine network stigs also describe maintenance processes software updates vulnerability patching advanced stigs might cover design corporate network covering configurations routers firewalls domain name servers switches | [
1762,
9293,
11446,
7354,
635,
5404,
1567
] | None |
4,821 | 3 | Hercules_(processors):hercules processors hercules line arm architecture-based microcontrollers texas instruments built around one arm cortex cores hercules safety microcontroller platform includes series microcontrollers specifically targeted functional safety applications hardware-base fault correction/detection features dual cores run lock-step full path ecc automated self testing memory logic peripheral redundancy monitor/checker cores line includes tms470m tms570 rm4 families families designed specifically iec 61508 iso 26262 safety critical applications however differ significantly degree support safety standards | [
7170,
8720,
11282,
9235,
11289,
1057,
38,
4139,
8237,
9774,
8250,
8253,
7745,
7235,
7747,
2635,
99,
8812,
11374,
10361,
638,
644,
8842,
146,
659,
1170,
7833,
666,
5786,
4258,
4773,
9911,
9913,
1722,
10945,
9928,
2788,
3301,
9964,
6391,
... | Test |
4,822 | 9 | Lively_Kernel:lively kernel lively kernel open-source web programming environment supports desktop-style applications rich graphics direct manipulation abilities without installation upgrade troubles conventional desktop applications development began sun microsystems laboratories menlo park california later moved hasso plattner institute potsdam-babelsberg near berlin lively kernel graphical composition integrated programming environment written fully programming language javascript using standard browser graphics w3c canvas svg thus accessible browser web page begins operating soon web page loaded able edit code graphics built-in webdav support save results even clone onto new web pages along application development abilities also function integrated development environment ide making whole system self-sufficient tools except browser lively kernel uses morphic graphics model add behavior scene graph built browser graphics simple graphics thus assembled standard widgets sliders scroll bars text views lists clipping frames simple window system built widgets offers object inspectors file browsers code browsers even rudimentary demo pages thus ability edit test new code simple code browser system running lively used build simple web sites including tutorial also client-side wiki system stores pages versioned repository content vary relatively static pages text fully dynamic models look behave like adobe flash simulations lively kernel achieves complex dynamic behavior without specific animation support use animation features svg simple scheduling multiple green-thread processes javascript lively kernel includes multifont text editor written javascript includes support centering justification similar rudimentary text composition abilities working lively thus much feel working web page design program except on-the-fly text layout done offline composition program built-in dynamic behavior text lively kernel liveliness lively graphics becomes even apparent manipulating scale rotation handles objects text whole code browser used tilted 20 degrees side text editor made entirely lively graphics works perfectly well rotated scaled scroll bars clipping frames rest entire user interface lively kernel depends browser support javascript svg canvas graphics part w3c standards 2009 means runs safari firefox chrome opera browsers requirement might seem less compatible html lively actually compatible across browsers runs html uniformity among javascript svg canvas implementations one html implementation another except one small initial file lively kernel code base entirely free tests client browser used 2011 lively kernel runs best webkit-based browsers safari macintosh chromium google chrome windows running internet explorer windows requires google chrome frame testing popular browsers planned next release lively includes integrated development environment considerable power designed work via webdav local set dozen source javascript files synchronizable versioned repository user opens systembrowser javascript source files listed file pane browser user clicks one files read parsed ometa javascript parser displayed similar smalltalk browser functions class definitions listed class method names shown user click method name edit code bottom pane save new definition new definition checked syntax correct stored back .js file moreover eval mode usual case method redefined system running allows non-critical changes made without need restart lively applications developed source files loaded rapid scan find every reference selected text present code bodies match separate sub-browser lively ide includes object inspectors morph style panels controlling fills borders text styles also facilities debugging error points profiling performance tuning pushed owing improving quality run-time support major browsers ide operates source code files versioned repository manage evolution lively code base approach used empower users control active web content form client-side wiki lively includes facilities edit content worlds scene graphs content store content web pages webdav connection allows lively store new versions page content incrementally developed new version saved viewable rest internet prior versions retrieved cases error change mind notable wiki style evolving web content extends textual graphical scripting content lively well new forms may defined yet without need wiki server kind required server providing http webdav interface increasing amounts lively project content maintained manner lively qt new implementation lively kernel kernel parts replaced functionality offered qt framework lively qt inherits basic functionality implementation widgets layout management core event handling core javascript support qt lively qt retains exceptionally interactive nature liveliness lively kernel e.g. allowing user interface application source code edited fly however lively qt development work performed using familiar well-documented apis qt platform | [
9732,
2062,
9245,
2603,
5165,
5677,
3631,
576,
8771,
8262,
4171,
84,
10841,
603,
2658,
5219,
5743,
8303,
2673,
8304,
9841,
9848,
5754,
7292,
1664,
1666,
6791,
6797,
3734,
8854,
4777,
3761,
11442,
692,
7871,
9943,
9434,
7396,
10470,
10480,... | Validation |
4,823 | 9 | Logic_error:logic error computer programming logic error bug program causes operate incorrectly terminate abnormally crash logic error produces unintended undesired output behaviour although may immediately recognized logic errors occur compiled interpreted languages unlike program syntax error program logic error valid program language though behave intended often clue existence logic errors production wrong solutions though static analysis may sometimes spot one ways find type error output program variables file screen order determine error location code although work cases example calling wrong subroutine easiest way find problem program uses incorrect results bad mathematical calculation example function c calculate average two numbers contains logic error missing parentheses calculation compiles runs give expected answer due operator precedence division evaluated addition | [
1952,
805,
3367,
10510,
4592,
9714,
4572,
2045
] | None |
4,824 | 5 | Wireless_Framework_Telecommunication_(code_name:_Beep):wireless framework telecommunication code name beep wireless framework telecommunication beep implementation xmpp protocol mobile devices enable two roaming mobile devices positioned two different locations exchange data order communication stream successful mobile devices must connected internet wireless technology regardless wireless technologies using internet acts middle carrier developers trying best offer communication services highest possible quality relieve user paying current high costs communication moreover project empower client mobile device roaming capabilities allowing mobile device easily locate initiate interaction session another mobile device within unlimited range beep implementation generic high level abstract well-defined framework supports wireless communication internet enabling two roaming mobile devices exchange data necessarily using wireless technology use protocol enable developers program application run top protocol exchange data different types licensed gnu general public license gpl | [] | Test |
4,825 | 4 | Ziften:ziften ziften cybersecurity software company based austin texas united states organization endpoint protection platform designed provide advanced anti-virus endpoint detection response endpoint visibility hardening enterprise laptops desktops servers cloud ziften founded 2009 mark obrecht previously founded whole security behavior-based security anti-phishing company sold symantec 2005 july 2011 ziften raised 5.8 million capital series round trellis partners fayez sarofim co may 2012 ziften raised 5.5 million capital series b round fayez sarofim co july 2015 ziften raised 24 million capital new york-based spring mountain capital lp fayez sarofim co april 2017 ziften raised additional 14.7m trousdale ventures organization total funding date 50m mike hamilton previously ziften chief product officer appointed ceo june 2018 september 2017 ziften announced series managed security services called managed assess service managed hunt service managed respond service designed help organizations augment security teams getting additional help monitoring edr analytics security forensics november 2017 microsoft announced new partnerships windows defender advanced threat protection atp service including integration ziften zenith security platform macos linux operating system support integration provides security events onboarded macos linux devices surfaces within windows defender atp console ziften later included member initial formation microsoft intelligent security association august 2018 ziften enhanced zenith endpoint protection platform advanced anti-virus capabilities new capabilities help block file-based file-less in-memory attacks zenith uses artificial intelligence ai cloud help protect enterprises | [] | None |
4,826 | 4 | National_Cybersecurity_Center_of_Excellence:national cybersecurity center excellence national cybersecurity center excellence nccoe us government organization builds publicly shares solutions cybersecurity problems faced u.s. businesses center located rockville maryland established 2012 partnership national institute standards technology nist state maryland montgomery county center partnered nearly 20 market-leading companies contribute hardware software expertise nccoe asks industry sector members cybersecurity problems selects issues affect entire sector reaches across sectors center forms team people cybersecurity technology companies federal agencies academia address problem teams work center ’ labs build example solutions using commercially available off-the-shelf products example solution nccoe publishes practice guide collection materials information needed deploy example solution makes available general public center ’ goal “ accelerate deployment use secure technologies ” help businesses improve defenses cyber attack nccoe part nist non-regulatory federal agency within u.s. department commerce develops measurement standards conducts research measurement science according nist website federal information security management act 2002 fisma “ reaffirmed nist ’ role developing information security standards federal information processing standards guidelines non-national security federal information systems assigned nist specific responsibilities including development standards used federal agencies categorize information information systems based objectives providing appropriate levels information security according range risk levels guidelines recommending types information information systems included category minimum information security requirements management operational technical security controls information information systems category. ” many private sector organizations voluntarily adopt standards guidelines security requirements nist center nccoe applied space demonstration standards-based approaches cybersecurity president barack obama issued executive order 13636 “ improving critical infrastructure cybersecurity ” february 2013 tasking nist create cybersecurity framework helps organizations mitigate risks nation ’ essential systems power generation distribution financial services sector transportation nist released framework improving critical infrastructure cybersecurity february 2014 “ consists standards guidelines practices promote protection critical infrastructure. ” nccoe demonstrates framework implemented real-world environments industrial sector approaches center cybersecurity problem center maps solution ’ hoped-for capabilities cybersecurity framework well standards controls best practices nccoe ’ launch formally announced february 21 2012 u.s senator barbara mikulski d-md maryland lt governor anthony brown montgomery county executive isiah leggett secretary commerce standards technology nist director patrick d. gallagher nist issued press release day stating center created “ work strengthen u.s. economic growth supporting automated trustworthy e-government e-commerce. ” nccoe “ host multi-institutional collaborative efforts build expertise industry government ” according press release september 2014 national institute standards technology nist awarded contract mitre corporation operate department commerce ’ first federally funded research development center ffrdc national cybersecurity ffrdc supports nccoe according press release nist website “ ffrdc first solely dedicated enhancing security nation ’ information systems. ” press release states ffrdc help nccoe “ expand accelerate public-private collaborations ” focus “ boosting security u.s. information systems. ” “ ffrdcs operate public interest required free organizational conflicts interest well bias toward particular company technology product—key attributes given nccoe ’ collaborative nature…the first three task orders contract allow nccoe expand efforts developing use cases building blocks provide operations management facilities planning. ” partners founded nccoe national institute standards technology nist state maryland montgomery county partnership instrumental establishing center nationally recognized cybersecurity resource potential increase number local cybersecurity companies local workforce development provide local companies exposure nist ’ expertise national cybersecurity excellence partners nceps offer technology companies opportunity develop long-term relationships nccoe nist core partners nceps provide hardware software personnel collaborate nccoe current projects sector representatives approach nccoe behalf industry share business problems solved cybersecurity solution representatives also provide insight project build process help validate center ’ approach developing example solution members government agencies academic institutions discuss cybersecurity challenges nccoe provide insight feedback existing center projects collaborate technology companies center ’ labs users businesses working improve cybersecurity opportunity test nccoe ’ example solutions evaluate effectiveness provide feedback | [
8042,
5780
] | Test |
4,827 | 5 | CryptoNote:cryptonote cryptonote application layer protocol aims solve problems outlined bitcoin core protocol behind bitcoin protocol powers several decentralized privacy-oriented cryptocurrencies nothing known original author cryptonote nicolas van saberhagen | [
9248,
3713,
8706,
9859,
6797,
7983,
1908,
5397,
8916,
11612,
4280,
764,
1087
] | Test |
4,828 | 4 | National_Collegiate_Cyber_Defense_Competition:national collegiate cyber defense competition national collegiate cyber defense competition nccdc championship event collegiate cyber defense competition system – largest college-level cyber defense competition usa event held annually san antonio area effort help facilitate development regular national level cyber security exercise center infrastructure assurance security university texas san antonio utsa hosted first collegiate cyber defense competition southwestern region may 2005 june 29 2010 united states house legislature passed recognizing national ccdc promoting cyber security curriculum similar cyber defense competitions many aspects nccdc unique focuses operational aspect managing protecting existing network infrastructure exercises examine abilities group students design configure protect network course entire semester competition focused operational task assuming administrative protective duties existing commercial network teams assessed based ability detect respond outside threats maintain availability existing services mail servers web servers respond business requests addition removal additional services balance security needs business needs nccdc operated rules published center infrastructure assurance utsa current rules found homepage several regional groups formed provide qualifying events nccdc annual event regions share overlap various states every effort made make regional event consistent nccdc event | [
9175
] | Test |
4,829 | 6 | CRFS:crfs crfs coherent remote file system network file system protocol zach brown formerly oracle intended leverage btrfs architecture gain higher performance existing protocols nfs smb expose btrfs features snapshots remote clients code unmaintained one looking network file system top btrfs number options available active support development including ceph beegfs glusterfs samba | [
2395,
8772,
3582
] | Train |
4,830 | 4 | Hacker:hacker computer hacker skilled computer expert uses technical knowledge overcome problem hacker refer skilled computer programmer term become associated popular culture security hacker someone technical knowledge uses bugs exploits break computer systems reflecting two types hackers two definitions word hacker today mainstream usage hacker mostly refers computer criminals due mass media usage word since 1980s includes hacker slang calls script kiddies people breaking computers using programs written others little knowledge way work usage become predominant general public largely unaware different meanings exist self-designation hobbyists hackers generally acknowledged accepted computer security hackers people programming subculture consider computer intrusion related usage incorrect emphasize difference two calling security breakers crackers analogous safecracker controversy usually based assertion term originally meant someone messing something positive sense using playful cleverness achieve goal supposed meaning term shifted decades came refer computer criminals security-related usage spread widely original meaning become less known popular usage media computer intruders computer criminals exclusive meaning word today example internet 'hacker broke state government security systems march computer enthusiast hacker culture community primary meaning complimentary description particularly brilliant programmer technical expert example linus torvalds creator linux considered hacker large segment technical community insist latter correct usage word see jargon file definition mainstream media current usage term may traced back early 1980s term introduced wider society mainstream media 1983 even computer community referred computer intrusion hacking although exclusive definition word reaction increasing media use term exclusively criminal connotation computer community began differentiate terminology alternative terms cracker coined effort maintain distinction hackers within legitimate programmer community performing computer break-ins terms black hat white hat gray hat developed laws breaking computers came effect distinguish criminal activities activities legal however network news use term consistently pertained primarily criminal activities despite attempt technical community preserve distinguish original meaning today mainstream media general public continue describe computer criminals levels technical sophistication hackers generally make use word non-criminal connotations members media sometimes seem unaware distinction grouping legitimate hackers linus torvalds steve wozniak along criminal crackers result definition still subject heated controversy wider dominance pejorative connotation resented many object term taken cultural jargon used negatively including historically preferred self-identify hackers many advocate using recent nuanced alternate terms describing criminals others negatively take advantage security flaws software hardware others prefer follow common popular usage arguing positive form confusing unlikely become widespread general public minority still use term senses despite controversy leaving context clarify leave ambiguous meaning intended however positive definition hacker widely used predominant form many years negative definition popularized hacker therefore seen shibboleth identifying use technically-oriented sense opposed exclusively intrusion-oriented sense members computing community hand due variety industries software designers may find many prefer referred hackers word holds negative denotation many industries possible middle ground position suggested based observation hacking describes collection skills tools used hackers descriptions differing reasons analogy made locksmithing specifically picking locks skill used good evil primary weakness analogy inclusion script kiddies popular usage hacker despite lack underlying skill knowledge base sometimes hacker simply used synonymously geek true hacker group person person loves stay night machine love-hate relationship ... 're kids tended brilliant interested conventional goals ... term derision also ultimate compliment fred shapiro thinks common theory 'hacker originally benign term malicious connotations word later perversion untrue found malicious connotations already present mit 1963 quoting tech mit student newspaper time referred unauthorized users telephone network phreaker movement developed computer security hacker subculture today hacker culture idea derived community enthusiast computer programmers systems designers 1960s around massachusetts institute technology mit tech model railroad club tmrc mit artificial intelligence laboratory concept expanded hobbyist home computing community focusing hardware late 1970s e.g homebrew computer club software video games software cracking demoscene 1980s/1990s later would go encompass many new definitions art life hacking security hackers people involved circumvention computer security among security hackers several types including white hats hackers work keep data safe hackers finding system vulnerabilities mitigated white hats usually employed target system owner typically paid sometimes quite well work work illegal done system owner consent black hats crackers hackers malicious intentions often steal exploit sell data usually motivated personal gain work usually illegal cracker like black hat hacker specifically someone skilled tries via hacking make profits benefit vandalize crackers find exploits system vulnerabilities often use advantage either selling fix system owner selling exploit black hat hackers turn use steal information gain royalties grey hats include hack fun troll may fix exploit vulnerabilities usually financial gain even malicious work still illegal done without target system owner consent grey hats usually associated black hat hackers four primary motives proposed possibilities hackers attempt break computers networks first criminal financial gain hacking systems specific purpose stealing credit card numbers manipulating banking systems second many hackers thrive increasing reputation within hacker subculture leave handles websites defaced leave evidence proof involved specific hack third corporate espionage allows companies acquire information products services stolen used leverage within marketplace fourth state-sponsored attacks provide nation states wartime intelligence collection options conducted cyberspace main basic difference programmer subculture computer security hacker mostly separate historical origin development however jargon file reports considerable overlap existed early phreaking beginning 1970s article mit student paper tech used term hacker context already 1963 pejorative meaning someone messing phone system overlap quickly started break people joined activity less responsible way case publication article exposing activities draper engressia according raymond hackers programmer subculture usually work openly use real name computer security hackers prefer secretive groups identity-concealing aliases also activities practice largely distinct former focus creating new improving existing infrastructure especially software environment work latter primarily strongly emphasize general act circumvention security measures effective use knowledge report help fixing security bugs exploitation reasons rather secondary visible difference views design mit hackers incompatible timesharing system deliberately security measures subtle overlaps however since basic knowledge computer security also common within programmer subculture hackers example ken thompson noted 1983 turing award lecture possible add code unix login command would accept either intended encrypted password particular known password allowing backdoor system latter password named invention trojan horse furthermore thompson argued c compiler could modified automatically generate rogue code make detecting modification even harder compiler program generated compiler trojan horse could also automatically installed new compiler program without detectable modification source new compiler however thompson disassociated strictly computer security hackers would like criticize press handling 'hackers 414 gang dalton gang etc acts performed kids vandalism best probably trespass theft worst ... watched kids testifying congress clear completely unaware seriousness acts programmer subculture hackers sees secondary circumvention security mechanisms legitimate done get practical barriers way actual work special forms even expression playful cleverness however systematic primary engagement activities one actual interests programmer subculture hackers significance actual activities either difference historically members programmer subculture hackers working academic institutions used computing environment contrast prototypical computer security hacker access exclusively home computer modem however since mid-1990s home computers could run unix-like operating systems inexpensive internet home access available first time many people outside academic world started take part programmer subculture hacking since mid-1980s overlaps ideas members computer security hacking community prominent case robert t. morris user mit-ai yet wrote morris worm jargon file hence calls true hacker blundered nevertheless members programmer subculture tendency look disassociate overlaps commonly refer disparagingly people computer security subculture crackers refuse accept definition hacker encompasses activities computer security hacking subculture hand tends distinguish two subcultures harshly acknowledging much common including many members political social goals love learning technology restrict use term cracker categories script kiddies black hat hackers instead three subcultures relations hardware modifications early days network hacking phreaks building blue boxes various variants programmer subculture hackers stories several hardware hacks folklore mysterious 'magic switch attached pdp-10 computer mit ai lab turned crashed computer early hobbyist hackers built home computers construction kits however activities died 1980s phone network switched digitally controlled switchboards causing network hacking shift dialing remote computers modems pre-assembled inexpensive home computers available academic institutions started give individual mass-produced workstation computers scientists instead using central timesharing system kind widespread hardware modification nowadays case modding encounter programmer computer security hacker subculture occurred end 1980s group computer security hackers sympathizing chaos computer club disclaimed knowledge activities broke computers american military organizations academic institutions sold data machines soviet secret service one order fund drug addiction case solved clifford stoll scientist working system administrator found ways log attacks trace back help many others 23 german film adaption fictional elements shows events attackers perspective stoll described case book cuckoo egg tv documentary kgb computer perspective according eric s. raymond nicely illustrates difference 'hacker 'cracker stoll portrait lady martha friends berkeley internet paints marvelously vivid picture hackers people around like live think | [
1024,
5636,
10756,
535,
9761,
4644,
4133,
7739,
1608,
3657,
6728,
8779,
11358,
4703,
8288,
2147,
8292,
8807,
6262,
3704,
1147,
10875,
3711,
8320,
5764,
2187,
4240,
7829,
1688,
2717,
9375,
9904,
9395,
8886,
6842,
7872,
3789,
4304,
6352,
43... | None |
4,831 | 2 | Michael_Kerrisk:michael kerrisk michael kerrisk technical author programmer since 2004 maintainer linux man-pages project succeeding andries brouwer born 1961 new zealand lives munich germany kerrisk worked digital equipment google linux foundation editor writer lwn.net currently works freelance consultant trainer best known book linux programming interface published starch press 2010 book widely regarded definitive work linux system programming translated several languages maintainer linux man-pages project kerrisk authored co-authored third man pages worked improving project infrastructure contributions received special award 2016 new zealand open source awards | [
1026,
3082,
5644,
5139,
2581,
10780,
10785,
6691,
6180,
8242,
9266,
2109,
6213,
10822,
8263,
8268,
589,
4177,
8787,
5222,
10856,
7793,
3189,
4734,
7812,
4238,
10382,
8848,
657,
2195,
2711,
6808,
9882,
1694,
6302,
8354,
2723,
8364,
1717,
1... | Test |
4,832 | 3 | Palm_VII:palm vii palm vii personal digital assistant made palm computing division 3com device featured antenna used wireless data communication first palm device connectivity provided mobitex network defunct palm.net service web clipping applications also known palm query applications pqas made use network request post web data devices also provided pqa developers user position form zipcode making palm vii first web-enabled location-based services mobile platform cost service 14.95 per month allowed limited number web pages viewed palm vii expensive palm sold date unit pricing starting us 599 despite high price tag palm vii proved popular one first truly wireless data-capable information devices | [
2308,
10500,
6790,
3606,
8982,
6178,
5164,
7983,
9013,
694,
5318,
11337,
9037,
2258,
1621,
4449,
2285,
1776,
2420,
8952,
9598
] | Test |
4,833 | 3 | AMULET_microprocessor:amulet microprocessor amulet series microprocessors implementing arm processor architecture developed advanced processor technologies group school computer science university manchester formerly amulet pal groups based institution amulet unique amongst arm implementations asynchronous microprocessor making use square wave clock signal data synchronization movement | [
1376,
1776,
8523,
9964
] | Test |
4,834 | 4 | SIFT_Workstation_-_Digital_Forensics_and_Incident_Response_Distribution:sift workstation digital forensics incident response distribution sift computer forensics distribution installs necessary tools ubuntu perform detailed digital forensic incident response examination compatible expert witness format e01 advanced forensic format aff raw dd memory analysis evidence formats toolkit ability securely examine raw disks multiple file systems evidence formats places strict guidelines evidence examined read-only verifying evidence changed | [
5010,
4500,
8469,
3099,
7968,
6177,
5284,
11182,
7983,
10290,
4789,
8635,
830,
2494,
3393,
7369,
842,
6475,
10189,
4049,
5475,
7525,
9319,
7160,
11642
] | None |
4,835 | 9 | P_(programming_language):p programming language p programming language developed microsoft uc berkeley p enables programmers specify systems consisting collection state machines communicate asynchronously terms events code run microsoft windows windows phone open source | [
5612,
6797,
8262,
7983
] | None |
4,836 | 2 | Graphics_Device_Interface:graphics device interface graphics device interface gdi microsoft windows application programming interface core operating system component responsible representing graphical objects transmitting output devices monitors printers gdi responsible tasks drawing lines curves rendering fonts handling palettes directly responsible drawing windows menus etc task reserved user subsystem resides user32.dll built atop gdi systems components similar gdi example macos quartz x window system xlib/xcb gdi significant advantages direct methods accessing hardware perhaps scaling capabilities abstract representation target devices using gdi easy draw multiple devices screen printer expect proper reproduction case capability center see get applications microsoft windows simple games require fast graphics rendering may use gdi however gdi relatively hard use advanced animation lacks notion synchronizing individual video frames video card lacks hardware rasterization 3d etc modern games usually use directx opengl instead let programmers exploit features modern hardware device context dc used define attributes text images output screen printer actual context maintained gdi handle device context hdc obtained output written released elements written gdi uses bresenham line drawing algorithm draw aliased lines gdi present initial release windows ms-dos programs hitherto manipulated graphics hardware using software interrupts sometimes via video bios manipulating video memory directly code written way expects user video memory tenable windowed system like microsoft windows multiple applications would want write subwindows concurrently byte december 1983 discussed microsoft plans system output graphics printers monitors code forthcoming first release windows introduction windows xp gdi complemented c++-based gdi+ subsystem gdi+ adds anti-aliased 2d graphics floating point coordinates gradient shading complex path management intrinsic support modern graphics-file formats like jpeg png support composition affine transformations 2d view pipeline gdi+ uses argb values represent color use features apparent windows xp user interface several applications microsoft paint windows picture fax viewer photo printing wizard pictures slideshow screensaver presence basic graphics layer greatly simplifies implementations vector-graphics systems flash svg gdi+ included versions windows windows xp gdi+ dynamic library also shipped application used older versions windows windows 98 windows nt 4.0 onwards additional text processing resolution independence capabilities gdi+ text rendering performed cpu nearly order magnitude slower hardware accelerated gdi chris jackson published tests indicating piece text rendering code written could render 99,000 glyphs per second gdi code using gdi+ rendered 16,600 glyphs per second microsoft .net class library provides managed interface gdi+ via codice_1 namespace gdi+ similar purpose structure apple quickdraw gx subsystem open-source libart cairo libraries windows vista windows applications including gdi gdi+ applications run new compositing engine desktop window manager dwm built atop windows display driver model gdi rendering implemented canonical display driver cdd.dll draws system memory surfaces redirected dwm gdi longer hardware-accelerated video card driver however due nature desktop composition internal management moving bitmaps transparency anti-aliasing gdi+ handled dwm core operations like window moves faster responsive underlying content need re-rendered application windows 7 includes gdi hardware acceleration blitting operations windows display driver model v1.1 improves gdi performance canonical display driver allows dwm engine use local video memory compositing thereby reducing system memory footprint increasing performance graphics operations primitive gdi operations still hardware-accelerated unlike direct2d november 2009 amd nvidia released wddm v1.1 compatible video drivers gdi+ continues rely software rendering windows 7 gdi printer winprinter analogous winmodem printer designed accept output host computer running gdi windows host computer print processing gdi software renders page bitmap sent software printer driver usually supplied printer manufacturer processing particular printer printer combination gdi driver bidirectional receive information printer whether ready print paper ink non-gdi printers require hardware firmware memory page rendering gdi printer uses host computer making cheaper manufacture similar non-gdi printer manufacturers produce essentially printer version compatible printer control language pcl postscript cheaper gdi-only version cases lowest-cost models given manufacturer range support gdi printer control language accept input device suitable driver gdi printer requires pc running windows compatible hardware operating systems general gdi printers compatible hardware print servers although servers built-in processing capability making compatible specified gdi printers gdi printers made available computers network connected shared printers computer running windows generic gdi drivers pnm2ppa written make gdi printers compatible non-windows operating systems freebsd guarantee particular gdi printer supported order allow simpler creation drivers winprinters microsoft universal printer driver created allows printer vendors write generic printer description gpd minidrivers describe printer capabilities command set plaintext rather kernel mode driver development time window opened consumes gdi objects complexity window increases additional features buttons images gdi object usage also increases many objects use windows unable draw gdi objects leading misbehaving software frozen unresponsive program operation many applications also incorrectly coded fail release gdi objects use adds problem total available gdi objects varies one version windows next windows 95 98 millennium limit 1,200 total objects windows 2000 limit 16,384 objects windows xp vista windows 7 configurable limit via registry defaults 10,000 objects per process theoretical maximum 65,536 entire session windows 8 8.1 increase gdi object limit 65,536 per user logon session earlier versions windows windows 3.1 windows 98 included resource meter program allow user monitor much total system gdi resources use unfortunately resource meter consumed gdi objects later versions windows 2000 windows xp report gdi object usage program task manager tell user total gdi capacity available overflowing gdi capacity affect windows preventing new windows opening menus displaying alert boxes appearing situation difficult clear potentially require forced hard-reset system since prevents core system programs functioning windows 8 8.1 forced logoffs occur result gdi capacity overflow instead hard reboot example forcing frozen process end using task manager normally makes sure alert window appear free gdi windows beeps error alert choice appear gdi-overflowing processes terminated unless user uses taskkill command direct2d directwrite designed replace gdi/gdi+ uniscribe respectively screen-oriented rendering shipped windows 7 windows server 2008 r2 well windows vista windows server 2008 platform update installed wpf/uwp based-application win2d gdi like class library developed microsoft downloaded inside visual studio using nuget win2d easy-to-use windows runtime api immediate mode 2d graphics rendering gpu acceleration | [
10243,
11270,
5643,
4624,
10769,
9234,
1043,
537,
540,
3102,
1055,
9762,
2083,
8227,
8740,
11300,
1577,
10281,
2603,
4143,
9263,
11316,
1077,
2101,
8246,
8763,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
9813,
10839,
603,... | Test |
4,837 | 8 | NCSA_HTTPd:ncsa httpd ncsa httpd early discontinued web server originally developed ncsa university illinois urbana–champaign robert mccool others first released 1993 among earliest web servers developed following tim berners-lee cern httpd tony sanders plexus server others time natural counterpart mosaic web browser client–server world wide web also introduced common gateway interface allowing creation dynamic websites robert mccool left ncsa mid-1994 development ncsa httpd slowed greatly independent effort apache project took codebase continued meanwhile ncsa released one version 1.5 ceased development august 1995 ncsa httpd powered web servers internet nearly quickly switched apache april 1996 apache passed ncsa httpd 1 server internet retained position mid-to-late 2016 | [
1920,
4485,
4997,
7430,
9229,
7567,
7695,
1937,
11154,
7443,
8350,
7457,
3746,
8994,
2596,
3237,
9125,
679,
11682,
7338,
9387,
44,
11439,
10800,
2485,
6714,
10622,
1991,
11134,
595,
1363,
4439,
3545,
225,
865,
1250,
2404,
6379,
9580,
2287... | Validation |
4,838 | 9 | Fifth-generation_programming_language:fifth-generation programming language fifth-generation programming language 5gl programming language based problem solving using constraints given program rather using algorithm written programmer constraint-based logic programming languages declarative languages fifth-generation languages fourth-generation programming languages designed build specific programs fifth-generation languages designed make computer solve given problem without programmer way user needs worry problems need solved conditions need met without worrying implement routine algorithm solve fifth-generation languages used mainly artificial intelligence research ops5 mercury examples fifth-generation languages types languages also built upon lisp many originating lisp machine icad many frame languages kl-one 1980s fifth-generation languages considered way future predicted would replace languages system development exception low-level languages notably 1982 1993 japan put much research money fifth-generation computer systems project hoping design massive computer network machines using tools however larger programs built flaws approach became apparent turns given set constraints defining particular problem deriving efficient algorithm solve difficult problem crucial step yet automated still requires insight human programmer vendors known occasion advertise languages 5gl time actually sell 4gls higher level automation knowledge base hype 1980s faded away projects eventually dropped 5gl awareness also dropped opened doors vendors re-use term marketing new tools without causing much controversy among current generations programmers | [
9345,
2691,
9224,
5651,
5527,
9626,
3613,
4770,
5415,
5680,
305,
9780,
1591,
4410,
191,
10819,
8262,
9926,
4042,
5845,
477,
7395,
6502,
9330,
9331,
2556,
7421
] | None |
4,839 | 9 | Mitchell_Wand:mitchell wand mitchell wand computer science professor northeastern university received ph.d. massachusetts institute technology research centred programming languages member northeastern programming research lab also co-author daniel p. friedman christopher t. haynes essentials programming languages | [
8262,
1783,
6767,
10324,
9175,
11226
] | Validation |
4,840 | 9 | Maple_(software):maple software maple symbolic numeric computing environment also multi-paradigm programming language developed maplesoft maple also covers aspects technical computing including visualization data analysis matrix computation connectivity toolbox maplesim adds functionality multidomain physical modeling code generation users enter mathematics traditional mathematical notation custom user interfaces also created support numeric computations arbitrary precision well symbolic computation visualization examples symbolic computations given maple incorporates dynamically typed imperative-style programming language resembles pascal language permits variables lexical scope also interfaces languages c c fortran java matlab visual basic also interface excel maple supports mathml 2.0 w3c format representing interpreting mathematical expressions including display web pages maple based small kernel written c provides maple language functionality provided libraries come variety sources libraries written maple language viewable source code many numerical computations performed nag numerical libraries atlas libraries gmp libraries different functionality maple requires numerical data different formats symbolic expressions stored memory directed acyclic graphs standard interface calculator interface written java first concept maple arose meeting november 1980 university waterloo researchers university wished purchase computer powerful enough run macsyma instead decided would develop computer algebra system would able run lower cost computers first limited version appearing december 1980 maple demonstrated first conferences beginning 1982 name reference maple canadian heritage end 1983 50 universities copies maple installed machines 1984 research group arranged watcom products inc license distribute first commercially available version maple 3.3 1988 waterloo maple inc. founded company ’ original goal manage distribution software eventually company evolved r department maple development done today rest done university research labs worldwide including symbolic computation laboratory university waterloo ontario research centre computer algebra university western ontario 1989 first graphical user interface maple developed included version 4.3 macintosh x11 windows versions new interface followed 1990 maple v. 1992 maple v release 2 introduced maple worksheet combined text graphics input typeset output 1994 special issue newsletter created maple developers called mapletech published 1999 release maple 6 maple included nag numerical libraries 2003 current standard interface introduced maple 9 interface primarily written java although portions rules typesetting mathematical formulae written maple language java interface criticized slow improvements made later versions although maple 11 documentation recommends previous classic interface users less 500 mb physical memory mid 1995 2005 maple lost significant market share competitors due weaker user interface 2005 maple 10 introduced new document mode part standard interface developed following years september 2009 maple maplesoft acquired japanese software retailer cybernet systems features maple include sample imperative programming constructs simple functions also defined using maps arrow notation find answer compute determinant matrix series tanh x x=0,15 high order polynomial equation plot x*sin x x=-10..10 plot3d x^2+y^2 x=-1..1 y=-1..1 plots -animate subs k .5 f x=-30..30 t=-10..10 numpoints=200 frames=50 color=red thickness=3 plots -animate3d cos t*x *sin 3*t*y x=-pi..pi y=-pi..pi t=1..2 matrix 400,400,200 100,100 -400 1,1,1 datatype=float 8 plot3d 1 x=0..2*pi y=0..pi axes=none coords=spherical viewpoint= path=m f 1+a*t+b*t^2 *exp c*t find functions formula_17 satisfy integral equation maple engine used within several products maplesoft listed third-party commercial products longer use maple engine | [
9345,
1923,
7301,
3462,
8582,
1673,
5129,
7945,
3980,
2317,
6797,
15,
6160,
7950,
8079,
10510,
11406,
5783,
2457,
5148,
7580,
7326,
5677,
7341,
9133,
10413,
2045,
6962,
823,
10043,
4797,
6718,
2242,
963,
5830,
5703,
4808,
5833,
5450,
8262... | Validation |
4,841 | 2 | Comparison_of_Linux_distributions:comparison linux distributions technical variations linux distributions include support different hardware devices systems software package configurations organizational differences may motivated historical reasons criteria include security including quickly security upgrades available ease package management number packages available tables compare notable distribution latest stable release wide-ranging objective criteria cover operating system subjective merits branches marked unstable beta compare linux distributions operating systems table shows general information distributions creator producer release date latest version etc linux distributions endorsed free software foundation marked 100 free system distribution commitment column table shows default file system many linux distributions support ext2 ext3 ext4 btrfs reiserfs reiser4 jfs xfs gfs2 ocfs2 nilfs possible install linux onto file systems ext file systems namely ext2 ext3 ext4 based original linux file system file systems developed companies meet specific needs hobbyists adapted unix microsoft windows operating systems linux full support xfs jfs fat dos file system hfs main file system macintosh support microsoft windows nt ntfs file system developed comparable native unix file systems cds dvds blu-ray discs iso 9660 universal disk format udf supported unlike operating systems linux unix allow file system regardless medium stored whether medium magnetic disk optical disk cd dvd etc usb flash memory key even contained within file located another file system similarly many c compilers mainly gnu compiler collection gcc init systems mainly sysvinit desktop environments window managers widely supported linux kernel portability instruction set architectures x86 early feature added kernel information features distributions package numbers approximate distributions like debian tend separate tools different packages usually stable release development release documentation debug also counting source package number varies debian rpm based entries base produce binary packages total number packages number binary packages arch based entries additional e.g arch linux provides 11'000 47'000 packages i.e 58'000 packages | [
2560,
3073,
4611,
3079,
5644,
6669,
3089,
4113,
5139,
8209,
9237,
8214,
8727,
6680,
10780,
4637,
543,
11297,
546,
3618,
7204,
9253,
5670,
9762,
9257,
11305,
1584,
9266,
56,
3129,
4153,
59,
8248,
9276,
4673,
7234,
10817,
8772,
3142,
3654,
... | None |
4,842 | 1 | International_Merchant_Marine_Registry_of_Belize:international merchant marine registry belize international merchant marine registry belize immarbe body appointed government belize register ships belizean flag | [] | None |
4,843 | 4 | Cyberoam:cyberoam cyberoam technologies sophos company global network security appliances provider presence 125 countries company offers user identity-based network security firewalls/ unified threat management appliances allowing visibility granular control users activities business networks soho smb large enterprise networks ensures security built around network user protection apts insider threats malware hacker sophisticated network attacks cyberoam sales offices north america emea apac company customer support development centers india 550+ employees across globe channel-centric approach sales global network 4500+ partners company also conducts training programs customers partners cyberoam ’ product range offers network security solution firewall utm appliances centralized security management cyberoam central console appliances centralized visibility cyberoam iview cyberoam netgenie home small office networks cyberoam network security appliances include multiple features like firewall – vpn ssl vpn ipsec gateway anti-virus anti-spyware anti-spam intrusion prevention system ips content application filtering web application firewall application visibility control bandwidth management multiple link management load balancing gateway failover single platform cyberoam offers visibility control 2000+ key applications offers complete visibility applications accessed within organization user irrespective ports protocols stops sophisticated application-layer threats right network perimeter ensuring application security granular controls applications ensure qos critical applications cyberoam utm ’ on-appliance reporting gives details every type attack vector attacker details victim details also graphically represents general security trends organization cyberoam solutions aid compliance regulatory needs organizations cyberoam firewall technology eal4+ certified eal4+ certification security product firewall requires in-depth evaluation independent third-party test lab globally regarded decisive measure quality security product cyberoam gsmc global iso 20000 2011 certified post sales technical services global customers cyberoam cr series utm level 5 checkmark certified cyberoam firewall certified icsa labs firewall certification icsa labs firewall certification demands required icsa labs independent division cybertrust validating cyberoam ’ firewall capabilities effectively protecting customers ’ networks malicious internet threats cyberoam ‘ ipv6 ready ’ certified identify process ipv6 traffic ipv6 ready logo program driven ipv6 forum international testing program 3000 test cases product rigorously tested cyberoam patented layer 8 technology also known identity based security adds 8th layer human layer network protocol stack thereby considering user ’ identity part firewall rule matching criteria cyberoam attaches user identity security authenticating authorizing auditing aaa network allowing network administrator see control ‘ user ’ network instead ip address enables administrators identify users control internet activity users network set user based policies reporting username cyberoam launched global mission sign academies bridge demand-supply gap network security recently called cyberoam academy order propagate knowledge identity-based technology among upcoming networking students cyberoam tied nescot north east surrey college technology -its first master uk training academy nescot offers cyberoam certified security courses includes basic-level course namely 'ccnsp cyberoam certified security professional advanced-level course namely 'ccnse cyberoam certified security expert cyberoam threat research labs ctrl identifies security threats eventually raising resistance various vulnerabilities malware attacks publishing security upgrades research reports reports help users remain protected detailed guidance malware threat prevention advice using appropriate configuration parameters cyberoam appliances ctrl goes beyond finding emerging potential threats aims providing insightful investigation advanced threats engineered imagined around today ’ internet usage apps tor project researcher google software security engineer revealed july 2012 cyberoam appliances ssl traffic inspection capabilities using self-generated ca certificate default made possible intercept traffic victim cyberoam device cyberoam device indeed extract key device import dpi deep packet inspection devices use interception cyberoam issued over-the-air ota update unified threat management utm appliances order force devices use unique certificate authority ca ssl certificates intercepting ssl traffic corporate networks hotfix applied individual appliance required unique ca certificate | [
2213,
2118,
8998,
1961,
6762,
939,
3885,
10417,
3125,
5404,
8343,
10392,
1433,
7515,
4956,
2558,
9055
] | Test |
4,844 | 9 | HyperCard:hypercard hypercard software application development kit apple macintosh apple iigs computers among first successful hypermedia systems predating world wide web hypercard combines flat-file database graphical flexible user-modifiable interface hypercard includes built-in programming language called hypertalk manipulating data user interface combination features – database simple form layout flexible support graphics ease programming – suits hypercard many different projects rapid application development applications databases interactive applications database requirements command control systems many examples demoscene hypercard originally released 1987 49.95 included free new macs sold withdrawn sale march 2004 received final update 1998 upon return steve jobs apple hypercard runs classic environment ported mac os x. hypercard based concept stack virtual cards cards hold data would rolodex card-filing device card contains set interactive objects including text fields check boxes buttons similar common graphical user interface gui elements users browse stack navigating card card using built-in navigation features powerful search mechanism user-created scripts users build modify stacks adding new cards place gui objects cards using interactive layout engine based simple drag-and-drop interface also hypercard includes prototype template cards called backgrounds new cards created refer one background cards causes objects background copied onto new card way stack cards common layout functionality created layout engine similar concept form used rapid application development rad environments borland delphi microsoft visual basic visual studio database features hypercard system based storage state objects cards physical file representing stack database exist separate system within hypercard stack database engine similar construct exists instead state object system considered live editable time hypercard runtime perspective difference moving text field card typing operations simply change state target object within stack changes immediately saved complete typing field causes text stored stack physical file system operates largely stateless fashion need save operation common many database-oriented systems although somewhat different document-based applications final key element hypercard script single code-carrying element every object within stack script text field whose contents interpreted hypertalk language like property script object edited time changes saved soon complete user invokes actions gui like clicking button typing field actions translated events hypercard runtime runtime examines script object target event like button see script object contains event code called handler hypertalk engine runs handler runtime examines objects visual hierarchy concepts make majority hypercard system stacks backgrounds cards provide form-like gui system stack file provides object persistence database-like functionality hypertalk allows handlers written gui events unlike majority rad database systems era however hypercard combines features user-facing developer-facing single application allows rapid turnaround immediate prototyping possibly without coding allowing users author custom solutions problems personalized interface empowerment became catchword possibility embraced macintosh community phrase programming rest us anyone professional programmers combination features also makes hypercard powerful hypermedia system users build backgrounds suit needs system say rolodex use simple hypertalk commands provide buttons move place place within stack provide navigation system within data elements ui like text fields using features easy build linked systems similar hypertext links web unlike web programming placement browsing tool similar systems created html traditional web services considerably heavyweight hypercard contains object oriented scripting language called hypertalk hypertalk object classes predetermined hypercard environment although others added use externals weakly typed hypertalk supports standard programming structures if-then repeat hypertalk verbose hence ease use readability hypertalk code segments referred scripts term considered less daunting beginning programmers hypercard extended significantly use external command xcmd external function xfcn modules code libraries packaged resource fork integrate either system generally hypertalk language specifically early example plug-in concept unlike conventional plug-ins require separate installation available use included stack directly available scripts stack hypercard peak popularity late 1980s whole ecosystem vendors offered thousands externals hypertalk compilers graphing systems database access internet connectivity animation oracle offered xcmd allows hypercard directly query oracle databases platform superseded oracle card beehive technologies offered hardware interface allows computer control external devices connected via apple desktop bus adb instrument read state connected external switches write digital outputs multitude devices externals allow access macintosh toolbox contains many lower-level commands functions native hypertalk control serial adb ports hypercard created bill atkinson following lsd trip work began march 1985 name wildcard hence creator code wild 1986 dan winkler began work hypertalk name changed hypercard trademark reasons initially released august 1987 understanding atkinson would give hypercard apple company promised release free macs apple timed release coincide macworld conference expo boston massachusetts guarantee maximum publicity hypercard successful almost instantly apple programmer developer association apda said hypercard informational feeding frenzy august 1987 announced october phones never stopped ringing zoo within months release multiple hypercard books 50 disk set public domain stacks apple project managers found hypercard used huge number people internally externally bug reports upgrade suggestions continued flow demonstrating wide variety users since also free difficult justify dedicating engineering resources improvements software apple mainstream developers understood hypercard user empowerment could reduce sales ordinary shrink-wrapped products stewart alsop ii speculated hypercard might replace finder macintosh graphical user interface late 1989 kevin calhoun hypercard engineer apple led effort upgrade program resulted hypercard 2.0 released 1990 new version included on-the-fly compiler greatly increased performance computationally intensive code new debugger many improvements underlying hypertalk language time hypercard 2.0 developed separate group within apple developed 1991 released hypercard iigs version hypercard apple iigs system aimed mainly education market hypercard iigs roughly feature set 1.x versions macintosh hypercard adding support color graphics abilities iigs although stacks hypercard program documents binary-compatible translator program another hypercard stack allows moved one platform apple decided application software packages including hypercard would property wholly owned subsidiary called claris many hypercard developers chose stay apple rather move claris causing development team split claris attempted create business model hypercard could also generate revenues first freely-distributed versions hypercard shipped authoring disabled early versions claris hypercard contain easter egg typing magic message box converts player full hypercard authoring environment trick became nearly universal wrote new version hypercard player apple distributed macintosh operating system claris sold full version commercially many users upset pay use software traditionally supplied free many considered basic part mac even hypercard generating revenue claris little market development continued minor upgrades first failed attempt create third generation hypercard period hypercard began losing market share without several important basic features hypercard authors began moving systems supercard macromedia authorware nonetheless hypercard continued popular used widening range applications game manhole earlier effort creators myst corporate information services apple eventually folded claris back parent company returning hypercard apple core engineering group 1992 apple released eagerly anticipated upgrade hypercard 2.2 included licensed versions color tools addmotion ii adding support color pictures animations however tools limited often cumbersome use hypercard 2.0 lacks true internal color support several attempts made restart hypercard development returned apple product widespread use multimedia-authoring tool rolled quicktime group new effort allow hypercard create quicktime interactive qti movies started direction kevin calhoun qti extended quicktime core multimedia playback features provide true interactive facilities low-level programming language based 68000 assembly language resulting hypercard 3.0 first presented 1996 alpha-quality version shown developers apple annual apple worldwide developers conference wwdc leadership dan crow development continued late 1990s public demos showing many popular features color support internet connectivity ability play hypercard stacks special quicktime movies web browser development upon hypercard 3.0 stalled quicktime team focused away developing quicktime interactive streaming features quicktime 4.0. 1998 steve jobs disliked software atkinson chosen stay apple finish instead joining jobs next according atkinson sculley stink 2000 hypercard engineering team reassigned tasks jobs decided abandon product calhoun crow left apple shortly 2001 final release 1998 totally discontinued march 2004 hypercard runs natively classic mac os still used mac os x classic mode powerpc based machines g5 earlier last functional native hypercard authoring environment classic mode mac os x 10.4 tiger powerpc-based machines hypercard used range hypertext artistic purposes advent powerpoint hypercard often used general-purpose presentation program examples hypercard applications include simple databases choose adventure -type games educational teaching aids due rapid application design facilities hypercard also often used prototyping applications sometimes even version 1.0 implementations inside apple quicktime team one hypercard biggest customers hypercard lower hardware requirements macromedia director several commercial software products created hypercard notably original version interactive game narrative myst voyager company expanded books multimedia cd-roms beethoven ninth symphony cd-rom hard day night beatles voyager macbeth early electronic edition whole earth catalog implemented hypercard stored cd-rom prototype demo popular game n't know jack written hypercard french auto manufacturer renault used control inventory system quebec canada hypercard used control robot arm used insert retrieve video disks national film board cinérobothèque hypercard used prototype fully functional prototype sidoci one first experiments world develop integrated electronic patient record system heavily used montréal consulting firm dmr demonstrate typical day life patient get surgery would look like paperless age activision mainly game company saw hypercard entry point business market changing name mediagenic published several major hypercard-based applications notably danny goodman focal point personal information manager reports hypercard program nine five software allows users treat hypercard full database system robust information viewing printing features hypercard-inspired supercard included roadster plug-in allowed stacks placed inside web pages viewed web browsers appropriate browser plug-in even windows version plug-in allowing computers macintoshes use plug-in first hypercard virus discovered belgium netherlands april 1991 hypercard executed scripts stacks immediately opening also one first applications susceptible macro viruses merryxmas virus discovered early 1993 ken dunham two years concept virus viruses based hypercard overall impact minimal compute apple applications 1987 stated hypercard may make macintosh personal computer choice noting large memory requirement made best suited computers 2 mb memory hard drives magazine predicted smallest programming shop able turn stackware especially using cd-roms compute predicted 1988 future mac software would developed using hypercard using addictive developers wo n't able tear away long enough create anything else byte 1989 listed among excellence winners byte awards stating like first entry flaws magazine wrote hypercard opened new category software praised apple bundling every mac 2001 steve wozniak called hypercard best program ever written hypercard one first products made use popularized hypertext concept large popular base users jakob nielsen pointed hypercard really hypermedia program since links started regions card text objects actual html-style text hyperlinks possible later versions awkward implement seldom used deena larsen programmed links hypercard marble springs bill atkinson later lamented realized power network-oriented stacks instead focusing local stacks single machine hypercard could become first web browser hypercard saw loss popularity growth world wide web since web could handle deliver data much way hypercard without limited files local hard disk hypercard significant impact web inspired creation http influence tim berners-lee colleague robert cailliau javascript whose creator brendan eich inspired hypertalk also key inspiration violawww early web browser pointing-finger cursor used navigating stacks later used first web browsers hyperlink cursor myst computer game franchise initially released hypercard stack included bundled macs example performa 5300 still lives making hypercard facilitating technology starting one best-selling computer games time according ward cunningham inventor wiki wiki concept traced back hypercard stack wrote late 1980s 2017 internet archive established project preserve emulate hypercard stacks allowing users upload gui prototype apple wizzy active lifestyle telephone based hypercard hypercard influenced development web late 1990 influence robert cailliau assisted developing tim berners-lee first web browser javascript inspired hypertalk although hypercard stacks operate internet 1988 least 300 stacks publicly available download commercial compuserve network connected official internet yet system link phone numbers user computer together enable dial numbers without modem using less expensive piece hardware hyperdialer sense like web form association-based experience information browsing via links though operating remotely tcp/ip protocol like web also allows connections many different kinds media companies offered versions four products available offer hypercard-like abilities past products include addition many basic concepts original system later re-used forms apple built system-wide scripting engine applescript language similar hypertalk often used desktop publishing dtp workflow automation needs 1990s facespan provided third-party graphical interface applescript also native graphical programming front-end called automator released mac os x tiger april 2005 one hypercard strengths handling multimedia many multimedia systems like macromedia authorware macromedia director based concepts originating hypercard appware originally named serius developer sometimes seen similar hypercard rapid application development rad systems appware sold early 90s worked mac windows systems | [
6657,
10755,
9732,
1542,
9736,
2571,
1549,
3598,
4111,
7697,
11289,
6171,
9757,
7713,
8225,
10791,
6186,
6700,
1074,
8754,
9780,
4661,
3639,
1592,
9784,
8253,
576,
5696,
8262,
8783,
4180,
10838,
1623,
6231,
8281,
3167,
3681,
2658,
9826,
5... | Test |
4,845 | 6 | SQX:sqx sqx-archiver open free data compression archival format used one applications free charge license royalty free homepage provides sdk source compiled dlls likewise unencumbered license costs format designed speedproject squeez also supported tugzip | [
10817,
11076,
7718,
5096,
1801,
3114,
3659,
10857,
237,
4174,
2095,
10317,
4561,
722,
10575,
950,
4406,
3804
] | Test |
4,846 | 9 | Matthew_Flatt:matthew flatt matthew flatt american computer scientist professor university utah school computing salt lake city also member core development team racket programming language flatt received phd rice university 1999 direction matthias felleisen dissertation mechanics first-class modules mixin classes work triggered research ml community mutually recursive modules object-oriented community mixins traits flatt served one four editors revised^6 report scheme programming language report influenced design racket especially module system exception system record system macro system library links | [
4992,
10752,
11269,
3334,
5751,
6919,
7562,
2062,
9231,
1301,
9749,
9877,
8728,
4633,
6556,
3869,
10012,
2335,
6047,
8226,
4516,
5031,
9128,
5803,
2225,
10547,
11255,
311,
2105,
7867,
6717,
4799,
5569,
6594,
8771,
4550,
7880,
8908,
1613,
... | None |
4,847 | 7 | Semantic_web_data_space:semantic web data space semantic web data space container domain specific portable data provided human and/or machine friendly structures data data space referenced identifier linked data across spaces domains thus viewed object-oriented fashion underlying paradigm brings together ideas technologies various sources approach applied web based systems desktop-based systems data data spaces linked across spaces domains enhance meaning internal data supports work linked data project part semantic web effort benefit useful point querying information across domains assists development web data data space fully supportive data portability advocated dataportability project means object data space movable also ability referenced using identifier uniform resource identifier | [
6629,
8201,
3052,
11674,
10452,
2901,
53,
119,
10938,
4797,
479
] | Test |
4,848 | 4 | Joint_Cyber-Defence_Command:joint cyber-defence command joint cyber-defence command mccd spanish cyber defence service defence staff responsible planning execution actions related cyber defence networks information telecommunications systems ministry defense others might entrusted well contributing adequate response cyberspace threats aggressions may affect national defense sense mccd directs coordinates matter cyber defense activity centers response incidents security information different branches armed forces exercises timely legitimate proportionate response cyberspace threats aggressions may affect national defense defines directs coordinates awareness training specialized training area addition responsible development detail information security policies information telecommunications systems seginfosit direction execution control compliance policies within scope ministry defense mccd created february 19 2013 defence ministry order 10/2013 joint cyber-defence command created current chief commander mccd divisional general rafael garcía hernández functions joint cyber defence command joint cyber defense command composed following bodies | [
1373
] | Validation |
4,849 | 6 | Unrar:unrar unrar name two different command-line applications extracting rar file archives source-available freeware windows command-line version unrar created rarlab company created commercial winrar software software extract newer rar v5.0 file archives supported competitors free software linux version unrar based old version rarlab unrar permission author eugene roshal licensed gpl support rar3 format | [
11547,
894,
10623
] | Test |
4,850 | 2 | Shell_builtin:shell builtin computing shell builtin command function called shell executed directly shell instead external executable program shell would load execute shell builtins work significantly faster external programs program loading overhead however code inherently present shell thus modifying updating requires modifications shell therefore shell builtins usually used simple almost trivial functions text output nature operating systems functions systems must necessarily implemented shell builtins notable example codice_1 command changes working directory shell since executable program runs separate process working directories specific process loading codice_1 external program would affect working directory shell loaded widely used shell-builtin codice_3 function terminates session function different names depending shell | [
515,
9733,
9735,
2568,
521,
6664,
6674,
8729,
7196,
2599,
8236,
5706,
3659,
4174,
7266,
1647,
8306,
5759,
5256,
6281,
4750,
2198,
4248,
6812,
7325,
7847,
178,
7356,
10428,
2245,
1741,
1750,
10967,
9946,
3804,
10484,
8954,
6396,
3856,
4369... | Test |
4,851 | 9 | Richard_Wexelblat:richard wexelblat richard l. wexelblat aka dick wexelblat american artisanal woodturner former computer scientist wexelblat received bsee msee cs ph.d. cs moore school electrical engineering university pennsylvania 6/1959 6/1961 12/1965 respectively doctorate believed many reported acm first ever awarded formally recognized computer science department note first cs doctorate first awarded cs department andy van dam share distinction completed cs dissertation essentially time left computer field become artisanal woodturner said originator wexelblat scheduling algorithm choose two good fast cheap stated bob rosin said originated 'm sure also credited first refer occam razor 'the law least astonishment sons alan david brother paul also computer scientists although paul mostly retired david halfway law school | [] | Validation |
4,852 | 7 | Pacemaker_(software):pacemaker software pacemaker open-source high availability resource manager software used computer clusters since 2004 2007 part linux-ha project split project implements several apis controlling resources preferred api purpose open cluster framework resource agent api pacemaker generally used corosync cluster engine linux-ha heartbeat | [
7812,
10917,
11428,
5612,
7983,
3927,
11135
] | None |
4,853 | 9 | PeachPie:peachpie peachpie open-source php language compiler runtime .net .net core frameworks built top microsoft roslyn compiler platform based first-generation phalanger project peachpie compiles source code written php cil byte-code peachpie takes advantage jit compiler component .net framework order handle beginning compilation process purpose generate optimize native code rather compile php scripts .net assemblies containing cil code meta-data july 2017 project became member .net foundation peachpie architecture similar phalanger project originally started coursework charles university prague czechia implemented microsoft .net compiler platform called roslyn utilizing roslyn api since 2016 czech company iolevel leading development peachpie peachpie several advantages phalanger result roslyn api reworked architecture compiler phalanger able target full .net framework ran windows cross-platform capabilities achieved targeting mono peachpie also allows compilation .net core thus cross-platform default benchmarks published date point performance improvements peachpie compared predecessor project contains advanced semantic analysis allows compiler generate c -like symbols enhanced interoperability features similarities peachpie facebook hhvm compiler executes php specially designed virtual machine however facebook announced late 2017 version 3.24 hhvm would last release compatible php project would focus exclusively supporting facebook proprietary extension php called hack leaves peachpie project kind aspiration compatible past future versions php project receives considerable support microsoft invited present virtual conference .net conf featured microsoft .net well .net rocks podcast since july 2017 peachpie member .net foundation december 2018 iolevel received european innovation council horizon2020 grant pursue work peachpie compiler project lists several main goals 2019 officially tested supported applications include wordpress mediawiki software runs wikipedia page codeigniter addition number php frameworks programs confirmed work workarounds members open source community e.g laravel woocommerce magento | [
10624,
2948,
4231,
1034,
6154,
6797,
9614,
1935,
3997,
4384,
2465,
8609,
11559,
2603,
2348,
9263,
823,
190,
5952,
6338,
1347,
1348,
2372,
8644,
1353,
6474,
4171,
7421,
9434,
10587,
11357,
2145,
2401,
3553,
7785,
5612,
3821,
2804,
3573,
11... | None |
4,854 | 2 | Jar_Launcher:jar launcher jar launcher program mac os x launches java jar files aqua/java runtime environment jar file double clicked jar launcher also launches class manner jar launcher execute java files rather passes java virtual machine jvm appropriate parameters java programs without gui run command line may properly execute without pseudo terminal jar launcher located codice_1 part apple computer java implementation installed default mac os x 10.11 see link | [
5677,
7983
] | Test |
4,855 | 7 | Tolino:tolino tolino brand name e-readers tablets marketed leading booksellers germany austria switzerland cooperation deutsche telekom since 2014 e-reader also available belgium netherlands italy purchased january 2017 rakuten kobo inc german bookstores hugendubel thalia weltbild founded along deutsche telekom tolino-allianz tolino alliance deutsche telekom functions alliance technology partner responsible entire software hardware element platform well marketing tolino library digital e-books despite alliance book stores remain competition one-another motivation founding tolino alliance provide e-reading solution german e-book readers prevent migration german users international competitors notably amazon kindle however closed nature amazon ecosystem proprietary azw e-book format makes difficult return customers german booktrade first negotiations four german book stores took place spring 2012 summer 2012 tolino alliance formed tolino brand constructed march 2013 introduction brand public tolino first e-book reader tolino shine come november 2013 tolino shine complemented two tablets tolino tab 7 tolino tab 8.9 january 2014 co-founding member group weltbild filed bankruptcy dissolved paragon partners shortly march 2014 deutsche telekom introduced e-book shop pageplace tolino second improved e-reader tolino vision introduced market april 2014 october 2014 frankfurt bookfair bookwholesaler libri announced would become part tolino alliance following 1,000 independent bookstores removed tolino products shelves connected online shops tolino cloud new partner goal become comprehensive alternative digital reading entire german bookmarket likewise autumn 2014 belgium producer standaard boekhandel joined tolino alliance italian bookstore ibs italy became yet another partner ibs offered books ibs.it libraccio.it new improved tolino vision 2 introduced november 2014 featured water-resistant shell tap2flip tolino tab 8 tablet complemented introduction e-reader september 2015 announced bookstores mayersche osiander new partners tolino alliance tolino alliance prominence increased induction netherlandic bookstore libris.nl also blz.nl group frankfurt book festival october 2015 tolino introduced two new e-readers immediately thereafter two made available purchase tolino vision 3 hd became new model tolino-vision line aimed high-end market tolino shine 2 hd lower-end cheaper model serves improved version previous tolino shine november 2015 another italian online shop introduced italian tolino-partners ibs ever since indie-book.it marketed tolino products italy previously announced direct group bertelsmann founding member firm club bertelsmann derclub.de ceased operation end 2015 2015 tolino brand voted readers lesen.net e-reader provider year tolino followed amazon kindle 45 product line 35 previous two years tolino secured first place 34 2013 37 2014 tolino chosen e-reader brand year allese-book.de 2015 tolino received 44.3 votes kobo 27.7 amazon 17.8 previous year survey tolino ranked fourth capturing 17.7 voters | [
9408,
196,
6408,
5869,
2258,
8627,
3828,
10838,
8921
] | Test |
4,856 | 3 | Pac-Land:pac-land diverging previous pac-man titles pac-land side-scrolling platform game large characters colorful backgrounds closer gameplay style nintendo super mario bros. would released following year includes parallax scrolling pac-land split trips trips objective get fairy kept pac-man hat fairyland also return home pac-man house majority trip involves moving left right avoiding various obstacles enemy ghosts water spurts quicksand traps trip divided number rounds end provides pac-man bonus points depending much time left also position jumping end round player runs time finishing round sue purple ghost speed rapidly final round trip ends pac-man entering fairyland returning fairy hat fairy queen return fairy queen gives pac-man magic boots final round trip pac-man travel right left back home assistance uses magic boots allow jump repeatedly mid-air pac-man completes trip greeted ms. pac-man baby pac-man us release game pac-man cat dog cartoon series sour puss chomp-chomp also welcome pac-man home pac-man begins next trip following objectives although difficulty increases original pac-man fruit appear eat bonus points power pellets turn ghosts blue vulnerable hidden item sometimes accidentally dropped ghosts flagship galaxian rewards 7650 points collected reference namco goroawase number 765 galaxian flagship long running cameo appears bandai namco-made pac-man games also hidden bonuses game eating ghosts certain order give extra time pushing fire hydrant opposite direction give extra lives invincibility balloons collect points warps arcade cabinet version game unique instead joystick six plastic buttons three player although two players would alternate turns two-player game two buttons moved pac-man right left third made jump pictographs cabinet showed images pac-man moving right left jumping turbografx-16 version game made attempt emulate offering type-b control scheme switched pac-man movements buttons controller rather thumb-pad also famicom version uses b run d-pad jump contrast majority famicom games use d-pad run jump b attack japanese release namco pac-man sprite resembles official artwork character longer nose pac-man-shaped eyes game tyrolean hat feather american release pac-land bally midway characters appearances based designs pac-man animated series produced hanna-barbera promote animated series well video game series addition versions feature main background music jingles aforementioned series midway version also features faster game play namco pac-land ported commodore 64 amiga atari lynx atari st turbografx-16 zx spectrum amstrad cpc msx famicom board game handheld lcd game pac-land also produced pac-land republished 1996 part namco museum volume 4 playstation 2012 namco released pac-land namco arcade app iphone ipad pac-land one games included pac-man museum ports home consoles computers released inside outside japan based namco version game namco arcade application version game based midway version non-japanese versions application namco version japanese version pac-land released wii u virtual console game also appears stage super smash bros. wii u super smash bros ultimate rob swan reviewed atari lynx version august 1991 issue cvg magazine gave game score 80 100 robert a. jung also reviewed lynx version giving score 7 10 raze magazine reviewed lynx version also gave score 74 | [
8355,
8484,
9732,
8199,
6539,
9006,
10287,
1776,
9951,
10931,
4311,
4152,
9627,
95,
3039
] | Test |
4,857 | 2 | Lxrun:lxrun unix computing lxrun compatibility layer allow linux binaries run unixware sco openserver solaris without recompilation created mike davidson open source software project since 1997 available mozilla public license sco sun microsystems began officially supporting lxrun 1999 according official lxrun website lxrun maintenance mode meaning longer actively developed reasons cited declining interest lxrun include wide availability real linux machines availability capable emulation systems sco linux kernel personality lkp opensolaris brandz various virtual machine solutions newer linux applications host operating systems officially supported lxrun | [
9665,
11363,
8671,
7983,
9839,
5492,
823,
2424,
3487
] | Test |
4,858 | 2 | JumpStart_(Solaris):jumpstart solaris jumpstart computer network installation tool set used solaris operating system jumpstart used manage operating system installation many information technology environments corporate otherwise solaris operating system computers widely used provide easier installation minor setup central server one command installation client system start installing also allows completely consistent system installation many systems time install exactly system configuration software tools alternatively different types systems installed different purposes case consistent installations given defined type tools used manipulate jumpstart include jet jumpstart enterprise toolkit created thomas fritz 1994 sun jumpstart consists two main parts network booting system network installation network booting proceeds similarly solaris standard network booting capabilities jumpstart network booting server set local network system installed technically network boot install servers separate functions typically system client system begins jumpstart process accesses operating system component software packages stored jumpstart server usually exclusively using network file system packages optionally additional tools applications automatically installed system rebooted additional configuration may manually performed system configuration may set completely automatically | [
5280,
6049,
9665,
11363,
5335,
6445,
366,
7983,
8077,
11506,
4309,
2967,
5240,
4858,
381,
9343
] | Test |
4,859 | 2 | Thompson_shell:thompson shell thompson shell first unix shell introduced first version unix 1971 written ken thompson simple command interpreter designed scripting nonetheless introduced several innovative features command-line interface led development later unix shells name shell command-line interpreter concept making shell user program outside operating system kernel introduced unix precursor multics early feature thompson shell compact syntax input/output redirection multics redirecting input output command required separate commands start stop redirection unix one could simply add argument command line consisting symbol followed filename input symbol output shell would redirect i/o duration command syntax already present release first version unix 1971 later addition concept pipes suggestion douglas mcilroy redirection syntax expanded output one command could passed input another command original pipe syntax described version 3 manual syntax proved ambiguous easily confused redirection files—the system tell command2 command command2 file command2 version 4 syntax changed use symbols denote pipes produces exactly result symbol changed would put output command1 file1 thompson shell syntax redirection piping proven durable adopted unix shells command shells several operating systems notably dos os/2 microsoft windows shell design intentionally minimalistic even goto statements essential control program flow implemented separate commands result 1975 release version 6 unix becoming clear thompson shell inadequate serious programming tasks time developers programmer workbench unix distribution notably john mashey began modifying thompson shell make suitable programming result known pwb shell mashey shell included advanced flow-control mechanisms introduced shell variables remained limited necessity remain compatible thompson shell finally thompson shell replaced main unix shell bourne shell version 7 unix c shell 2bsd released 1979 since virtually modern unix unix-like systems descended v7 2bsd thompson shell generally longer used however available open-source part several ancient unix source distributions ported modern unices historical exhibit | [
6797,
5397,
1435,
3488,
5156,
7983,
11442,
8499,
9151,
10304,
9027,
9298,
2132,
6369,
2786,
8675,
9444,
5492,
6772
] | None |
4,860 | 4 | Cybereason:cybereason cybereason cyber security company specializing endpoint detection response software company based boston massachusetts cybereason founded 2012 tel aviv israel former cyber security experts israel defense forces unit 8200 company moved headquarters boston 2014 december 2016 cybereason released free consumer software product prevention ransomware 2014 cybereason raised series funding charles river ventures total cybereason reports raised 88.6m funding rounds receiving 59m series c round softbank 2015 august 2019 cybereason raised 200 million new financing softbank group affiliates cybereason offers endpoint detection response software “ hybrid sensors endpoints communicate ‘ hunting engine ’ cloud | [
9488,
10539
] | Test |
4,861 | 1 | Postgres-XL:postgres-xl postgres-xl distributed relational database management system rdbms software based postgresql aims provide feature parity postgresql distributing workload cluster name postgres-xl stands extensible lattice postgres-xl based postgres-xc earlier distributed postgresql system developed ntt data enterprisedb 2012 cloud database startup stormdb adopted postgres-xc developed proprietary extensions improvements 2013 stormdb acquired translattice improved software open-sourced name postgres-xl 2014 since 2015 postgres-xl development also supported 2ndquadrant postgres-xl provides cluster-wide consistent transaction snapshots via central global transaction manager gtm node requires fast interconnect nodes postgres-xl suited geographically distributed clusters larger queries split parallelized multiple nodes individual database tables chosen fully replicated across cluster usually smaller tables sharded separate nodes write scalability | [
3784,
9386,
10737,
2901,
1142,
1049,
8539,
10201
] | Test |
4,862 | 2 | IUCV:iucv iucv inter user communication vehicle data transfer mechanism ibm vm line operating systems introduced vm/sp release 1 1980 allows establishment point point communication channels either two virtual machines virtual machine hypervisor services effect iucv provides form message-based interaction virtual machines anticipated client/server interaction network connected physical machines emerged later distributed systems iucv implemented cp vm hypervisor controls aspects session establishments message passing flow control virtual machine use iucv service must first indicate address area within address space cp able store information regarding pending information status therefore codice_1 method must invoked first iucv terminology session two end points called path identified end path id relevant virtual machine owns session end path always connected channel meaning connectionless paths establish path initiating virtual machine must invoke codice_2 method specify path target identity either another virtual machine name name cp system service start '* character valid character within virtual machine name provided target initialized iucv target notified pending incoming path connection may either use codice_3 method complete path establishment codice_4 method effectively closes pending path path established messages may passed two path endpoints iucv messages bounded beginning end one message pending path endpoint iucv merge messages messages sent path using codice_5 method end point receive message using codice_6 method original message also requested reply receiving end point use codice_7 method send reply multiple messages may made pending path number messages allowed pending path specified path establishment exceed 65535 attempting send message path reached pending message limit result error data transfer may temporarily suspended using codice_8 method path suspended message transfers allowed path codice_9 method invoked virtual machine initially suspended path virtual machine may poll iucv notifications using codice_10 codice_11 methods nothing pending virtual machine waits information available either end point issues codice_4 method path enters severed closing state end point notified point new messages allowed path end point may still retrieve pending messages end point also issues codice_4 method path effectively dismantled path may implicitly closed either cases end path behavior identical explicit path termination iucv methods invoked using 'b2f0 x instruction instruction must invoked virtual supervisor state example guest supervisor operation exception program interrupt generated instruction interpreted cp iucv request iparml iucv parameter list control block describes method invoked well method parameters upon completion b2f0 instruction fields altered cp indicate status b2f0 instruction completion cp notifies virtual machine pending message status information making external interrupt code x'4000 pending virtual machine interrupt occurs information regarding pending status made available address location specified codice_1 method cp specific macro iucv generates appropriate code including instruction filling iparml details regarding parameters method defaulted checked conflict cms made handle iucv application requests cms set iucv macros cmsiucv allow multiple applications share iucv facility within virtual machine access iucv functions controlled statements cp directory list virtual machines specifications virtual machine permitted accept communications virtual machines via codice_16 directory statement establish communication path virtual machine via codice_17 statement also possible allow virtual machine issue path connection requests specific virtual machines specifying virtual machine name iucv statement example codice_18 default user always allowed connect iucv statement controls cp-imposed access control iucv connections addition virtual machine impose access control rejecting attempt connect cp system services iucv end points virtual machines allow virtual machine perform hypervisor functions asynchronously access specific hypervisor facilities examples gcs group control system vm uses iucv perform maintenance shared memory areas virtual machines using implicit path termination gcs recovery virtual machine ensure locks held shared area virtual machine entered group left unexpectedly properly released vm tcp/ip tcp/ip stack vm uses iucv either allow virtual machine perform socket operations allow virtual machine act network interface pass whole frames datagrams tcp/ip stack s/390 z/architecture implementation linux uses facility implement network interface vm tcp/ip stack vmcf virtual machine communication facility | [
7607,
4996,
553,
7217,
823,
11673,
3323
] | None |
4,863 | 4 | Man-in-the-middle_attack:man-in-the-middle attack cryptography computer security man-in-the-middle attack mitm attack attacker secretly relays possibly alters communications two parties believe directly communicating one example mitm attack active eavesdropping attacker makes independent connections victims relays messages make believe talking directly private connection fact entire conversation controlled attacker attacker must able intercept relevant messages passing two victims inject new ones straightforward many circumstances example attacker within reception range unencrypted wireless access point wi-fi could insert man-in-the-middle aims circumvent mutual authentication mitm attack succeed attacker impersonates endpoint sufficiently well satisfy expectations cryptographic protocols include form endpoint authentication specifically prevent mitm attacks example tls authenticate one parties using mutually trusted certificate authority suppose alice wishes communicate bob meanwhile mallory wishes intercept conversation eavesdrop optionally deliver false message bob first alice asks bob public key bob sends public key alice mallory able intercept mitm attack begin mallory sends alice forged message appears originate bob instead includes mallory public key alice believing public key bob encrypts message mallory key sends enciphered message back bob mallory intercepts deciphers message using private key possibly alters wants re-enciphers using public key intercepted bob originally tried send alice bob receives newly enciphered message believes came alice example shows need alice bob way ensure truly using public keys rather public key attacker otherwise attacks generally possible principle message sent using public-key technology variety techniques help defend mitm attacks mitm attacks prevented detected two means authentication tamper detection authentication provides degree certainty given message come legitimate source tamper detection merely shows evidence message may altered cryptographic systems secure mitm attacks provide method authentication messages require exchange information public keys addition message secure channel protocols often using key-agreement protocols developed different security requirements secure channel though attempted remove requirement secure channel public key infrastructure transport layer security may harden transmission control protocol mitm attacks structures clients servers exchange certificates issued verified trusted third party called certificate authority ca original key authenticate ca subject mitm attack certificates issued ca may used authenticate messages sent owner certificate use mutual authentication server client validate communication covers ends mitm attack though default behavior connections authenticate server attestments verbal communications shared value zrtp recorded attestments audio/visual recordings public key hash used ward mitm attacks visual media much difficult time-consuming imitate simple data packet communication however methods require human loop order successfully initiate transaction corporate environment successful authentication indicated browser green padlock always imply secure connection remote server corporate security policies might contemplate addition custom certificates workstations web browsers order able inspect encrypted traffic consequence green padlock indicate client successfully authenticated remote server corporate server/proxy used ssl/tls inspection http public key pinning hpkp sometimes called certificate pinning helps prevent mitm attack certificate authority compromised server provide list pinned public key hashes first transaction subsequent transactions require one keys list must used server order authenticate transaction dnssec extends dns protocol use signatures authenticate dns records preventing simple mitm attacks directing client malicious ip address latency examination potentially detect attack certain situations long calculations lead tens seconds like hash functions detect potential attacks parties check discrepancies response times example say two parties normally take certain amount time perform particular transaction one transaction however take abnormal length time reach party could indicative third party interference inserting additional latency transaction quantum cryptography theory provides tamper-evidence transactions no-cloning theorem protocols based quantum cryptography typically authenticate part classical communication unconditionally secure authentication scheme e.g wegman-carter authentication captured network traffic suspected attack analyzed order determine whether attack determine source attack important evidence analyze performing network forensics suspected attack includes notable non-cryptographic mitm attack perpetrated belkin wireless network router 2003 periodically would take http connection routed would fail pass traffic destination instead responded intended server reply sent place web page user requested advertisement another belkin product outcry technically literate users 'feature removed later versions router firmware 2011 security breach dutch certificate authority diginotar resulted fraudulent issuing certificates subsequently fraudulent certificates used perform mitm attacks 2013 nokia xpress browser revealed decrypting https traffic nokia proxy servers giving company clear text access customers encrypted browser traffic nokia responded saying content stored permanently company organizational technical measures prevent access private information 2017 equifax withdrew mobile phone apps following concern mitm vulnerabilities notable real-life implementations include following | [
3072,
513,
7683,
10756,
517,
510,
10245,
9227,
3088,
9233,
9744,
10772,
1046,
8726,
9242,
9761,
2083,
10279,
9256,
9771,
3629,
1589,
10806,
7736,
10297,
3643,
5179,
7739,
9791,
1088,
9281,
4163,
4165,
1608,
3657,
8264,
10831,
4689,
11345,
... | Test |
4,864 | 7 | HP_Information_Management_Software:hp information management software hp information management software software hp software division used organize protect retrieve acquire manage maintain information hp software division also offers information analytics software amount data companies deal grown tremendously past decade making management information difficult university california berkeley claims amount information produced globally increases 30 percent annually april 2010 information management article cited survey nearly 90 percent businesses blame poor performance data growth survey concluded many businesses applications databases growing 50 percent annually making difficult manage rapid expansion information information explosion companies created technology solutions help businesses manage ever-expanding data hp software division offers many information management analytics software products hp autonomy business resulting acquisition autonomy corporation 2011 autonomy provided capabilities managing unstructured data acquisition vertica 2011 added information analytics managing structured data june 2013 hp announced analytics platform managing big data—consisting structured unstructured data april 2011 hp software division announced refresh upgrade hp information management software portfolio including enhancements hp trim records management system hp data protector integrated archive platform database archiving hp storage essentials number consulting professional services designed help customers integrate deploy information management solutions across lifecycle including capture monitor protect retain find portfolio included methodology technology services companies government organizations create holistic approach information management 6 acquisition autonomy corporation hp information management analytics software portfolio includes data protection ediscovery information analytics unified information access information archiving enterprise content management marketing optimization 2013 hp announced cloud services support support marketing call center applications hp data protection software includes server virtual server remote branch office endpoint device data protection products include hp connected backup hp livevault hp data protector hp data protector software automates high-performance backup recovery disk tape enable 24x7 business continuity software used size business grows single server environment largest distributed enterprise infrastructure thousands clients many 100,000 sessions daily hp ediscovery solutions help companies meet requirements legal electronic discovery compliance regulations meet electronic discovery reference model edrm 5 capturing classifying preserving finding analyzing recovering information hp ediscovery part hp autonomy legal compliance performance suite detecting acting new signals risk understanding protecting governing collaborating information maintaining compliance local federal international regulations information analytics collection analysis data use powerful computers identify patterns trends data set new greatly enhanced past years result quality output high enough used tool decision-making process based hp idol intelligent data operating layer hp information analytics solutions help organizations extract meaning forms human information audio text video hp idol uses advanced pattern-matching technology understand key concepts forms information including free text video audio image social media web unlike traditional keyword-dependent systems hp idol retrieves relevant information conceptually related query going beyond search help users discover information may know look hp sells archiving products delivered enterprise-class software premises cloud hybrid model hp offers autonomy ecm suite enterprise content management hp autonomy ecm organizations access understand almost data type system well control leverage take action information concert internal regulatory policies current version 9.0 released january 2013 october 2013 hp extream solutions joined hp autonomy business within hp software division adding new content management capabilities portfolio hp exstream customer communications management system hp autonomy marketing optimization solutions include contact center management marketing analytics rich media management web experience management web optimization search engine marketing october 2013 hp announced hp digital marketing hub dynamically identifying customer segments building prescriptive models match segments targeted campaigns engaging customers real-time across advertising contact center mobile print social web touch points grid-based column-oriented hp vertica analytics platform designed manage large fast-growing volumes data provide fast query performance used data warehouses query-intensive applications june 2013 hp announced platform analyzing finding meaning big data—petabytes structured unstructured information also aims identify information needed placed low cost storage even dumped uses open source hadoop software technologies hp acquired autonomy vertica arcsight actual user group itrc online forum hp software solutions products new user group hp software solutions community officially launched publicly april 2010 includes former software-related communities june 2011 hp software announced new discover performance community online resource center designed serve executives cios retrieved | [
5571
] | Test |
4,865 | 9 | Embeddable_Common_Lisp:embeddable common lisp embeddable common lisp ecl small implementation ansi common lisp programming language used stand-alone embedded extant applications written c. creates os-native executables libraries i.e executable linkable format elf files unix common lisp code runs platforms support c compiler ecl runtime dynamically loadable library use applications distributed free open-source software gnu lesser public license lgpl 2.1+ includes runtime system two compilers bytecode interpreter allowing applications deployed c compiler expected intermediate language type compiles common lisp c efficient runtime latter also features native foreign function interface ffi supports inline c part common lisp inline c ffi combined common lisp macros custom lisp codice_1 expansions compiler-macros yield compile-time preprocessor | [
10752,
11269,
2062,
9231,
9749,
8728,
4633,
4122,
8226,
9780,
2105,
6201,
6717,
8258,
8771,
8262,
1613,
9299,
3675,
7267,
8293,
3176,
2666,
2667,
5751,
7805,
9345,
9865,
6797,
9877,
4779,
5803,
2225,
8883,
7867,
4799,
7880,
8908,
205,
789... | None |
4,866 | 3 | Bridging_model:bridging model computer science bridging model abstract model computer provides conceptual bridge physical implementation machine abstraction available programmer machine words intended provide common level understanding hardware software engineers successful bridging model one efficiently implemented reality efficiently targeted programmers particular possible compiler produce good code typical high-level language term introduced leslie valiant 1990 paper bridging model parallel computation argued strength von neumann model largely responsible success computing whole paper goes develop bulk synchronous parallel model analogous model parallel computing | [
1952,
6950
] | Test |
4,867 | 9 | Shriram_Krishnamurthi:shriram krishnamurthi shriram krishnamurthi computer scientist currently professor computer science brown university member core development group racket programming languages responsible creation software packages including debugger frtime package networking library since 2006 krishnamurthi leading contributor bootstrap curriculum project integrate computer science education grades 6–12 krishnamurthi received phd rice university 2000 direction matthias felleisen dissertation linguistic reuse macro systems presence first-class modules starting topic krishnamurthi moved software engineering working topics access control modularization verification web-based interactive programming recent effort novel time-oriented programming language called flapjax support asynchronous web programming krishnamurthi also authored textbook programming language design 2012 krishnamurthi became inaugural winner robin milner young researcher award given sigplan researcher whose research career began within 20 years nomination date award citation describes krishnamurthi prolific researcher brings programming language theory bear many disciplines thus exposing foundational value | [
4992,
10752,
11269,
3334,
5751,
6919,
7562,
2062,
9231,
1301,
9749,
9877,
8728,
4633,
6556,
3869,
10012,
2335,
6047,
8226,
4516,
5031,
9128,
5803,
2225,
10547,
11255,
311,
2105,
7867,
6717,
4799,
5569,
6594,
8771,
4550,
8262,
7880,
8908,
... | Test |
4,868 | 3 | Qorivva:qorivva qorivva line power isa 2.03-based microcontrollers freescale built around one powerpc e200 cores within line number products specifically targeted functional safety applications hardware-based fault detection correction features found within line include dual cores may run lock-step full-path ecc automated self-testing memory logic peripheral redundancy monitor/checker cores freescale selected following families mpc5xxx processors inclusion program targeting automotive commercial industrial aerospace applications wherein assurances correctness safety primary requirements mpc57xx family intended manufacturer support achievement system compliance functional safety standards iso 26262 particular freescale safeassure functional safety program includes members family within program mpc57xx primary microcontrollers targeted safety-critical automotive applications product family features matched pair e200 cores intended primary computation also incorporate least one e200 core support role e.g. interface coprocessor safety checker support attainment higher levels fault tolerance expected context asil paired e200 cores may configured operate dual lockstep processors exception mpc5748g whose cores may lock-stepped intended manufacturer support attainment less critical asil b notably mpc5777m embodies three e200z7 cores 300 mhz computational shell two may operated lock step fourth core e200z4 used peripheral control additional built-in hardware mechanisms particular family products families embody one e200 cores usually different versions family mpc567xk mpc564xl mpc560xp identified part freescale safeassure functional safety program mcp5643l features lock-step cores member family explicitly offered support iso 26262 mpc5643l notable freescale claims first automotive microcontroller certified independent accredited assessor exida compliant relevant mcu requirements automotive functional safety standard iso 26262. exida confirms freescale microcontroller mpc5643l assessed per relevant requirements regarding microcontroller development verification validation iso 26262 2011 parts 2 4 5 7 8 9 10 extent applicable meets requirements providing systematic integrity asil d. freescale related press release states mpc5643l suitable use automotive safety integrity levels asil including stringent level asil | [
6914,
7299,
10501,
1158,
3846,
4743,
6663,
5642,
3467,
1548,
1933,
7302,
6415,
3472,
4881,
7305,
2073,
7065,
1563,
1309,
3493,
6949,
6311,
8102,
1321,
9391,
10543,
4017,
5297,
11314,
11447,
8120,
8761,
1722,
6715,
9020,
1725,
1983,
1985,
... | None |
4,869 | 7 | Accellion:accellion accellion inc. palo alto california-based private cloud solutions company focused secure file sharing collaboration users able access edit share enterprise content device maintaining compliance security accellion software supports deployment on-premises off-premises public private hybrid cloud fips 140-2 certified environment accellion founded 1999 singapore mohan nikhil jhingan originally focused providing distributed file storage management backup technology beginning 2001 company moved headquarters palo alto ca concentrated business file transfer technology 2009 2012 company grew increasingly focused security compliance aspects file sharing september 2000 accellion raised 33 million venture funding barings private equity later april 2012 raised additional 12 million riverwood capital bringing company total funding 45 million gartner 2014 magic quadrant report accellion named leader enterprise file synchronization sharing year accellion named leader mobile content management aragon research accellion positioned gartner leaders quadrant 2015 according wall street journal accellion valued 500 million 2014 accellion released first file transfer appliance may 2005 physical on-premises appliance ogilvy mather accellion ’ first enterprise customer computerworld ’ premier 100 leaders 2005 best class award implementation accellion file transfer march 2011 accellion released secure collaboration product industry research firm 451 group characterized accellion grown collaboration market file-transfer roots 2012 company introduced accellion mobile file sharing packages enterprise business individuals packages included synchronization feature called kitedrive early demand company file transfer applications came organizations needed transfer large files including advertising marketing firms healthcare universities accellion provided email attachment application reducing email storage improving email performance offloading file transfers email company also provided clients mobile product called accellion mobile productivity suite let users create edit collaborate microsoft word excel powerpoint files mobile devices january 2014 accellion launched kiteworks secure mobile file-sharing product enables users work files projects remotely software integrates sharepoint documentum open text home drive windows file shares dropbox box onedrive google drive november 2014 accellion introduced secure mobile platform kiteworks suite allows employees securely access share content third-party providers laptops smartphones tablets wearable devices | [
10185,
4623,
10161,
5650,
7891,
2267
] | Validation |
4,870 | 2 | 4DOS:4dos 4dos command-line interpreter jp software designed replace default command interpreter codice_1 dos windows 95/windows 98/windows 98se/windows 4os2 4nt replace codice_2 os/2 windows nt respectively 4dos written rex c. conn tom rawson first released 1989 programs also initiated command line and/or called scripts 4dos often used ms-dos-windows 95 stream operating systems also used windows nt type machines ibm pc dos dr-dos versions since windows nt-2000 includes codice_1 codice_2 4dos 4nt derivatives installed earlier versions 4os2 run windows nt os/2 run two dos windows nt shells three used windows nt-type machines os/2 multiple boot machines among many commands statements functions 4dos lacking ms-dos/windows 95/98 codice_1 reading keyboard input simpler method working colors screen text default file extension 4dos scripts .btm graphical version 4dos 4os2 4nt called take command released feature set corresponding version 4dos 5.5 4os2 4nt 2.5 updated development line stopped corresponding text mode versions graphical program take command/16 windows 3.1 4os2 similar replacement ibm os/2 command interpreter first released time 4dos version 4 similar feature set like 4dos released open source appeared feature set 2011 ecomstation 2.10 freeware os2free project 4nt first released 4dos windows nt versions 1.x 2.x became 4nt restructure version 8 program recompilation 4os2 continues features os/2 command processor codice_2 running rexx scripts extproc support corresponding take command/32 exists version 1 corresponding 4nt 2.5 4nt take command/32 released ansi windows 9x unicode windows nt forms ansi version dropped version 5 new win32 program tabbed command interface tci released time 4nt version 7 program allowed one attach thereby reducing screen clutter detach tabbed consoles single window program requires windows xp later new version take command extends original tabbed command interface expanded extra windows allow input composed graphically navigate directories files extra features 4nt bundled take command console light feature-reduced version tcc released free download jp software released released versions 9 12.1 corresponding underlying 4nt/tcc version 4dos features number enhancements compared codice_1 originally distributed shareware 4dos later released unsupported freeware currently source code available modified mit license may used commercial product without written permission rex c. conn may compiled use operating system freedos qualify open source defined open source initiative last update jp software version 7.50.130 released august 2004 15-year history 4dos underwent numerous updates significant versions norton utilities dos included modified copies 4dos called ndos last version ndos bundled norton utilities 8 corresponded 4dos 4.03 | [
6148,
2181,
6921,
6797,
3856,
8976,
10387,
8729,
7325,
2462,
292,
7847,
3496,
7983,
178,
9166,
5840,
10068,
1237,
9953,
2786,
6498,
621,
7795,
4727
] | Test |
4,871 | 3 | TinyLinux:tinylinux tinylinux project started matt mackall 2003 reduce size linux kernel memory usage binary filesize purpose make compact linux system embedded devices development sponsored ce linux forum also known -tiny tree 2006 project mostly abandoned received new attention 2007 sponsorship celf seen minimal activity since 2007 tinylinux consists set patches linux kernel make certain features optional add system monitoring measurement optimization take place made mergeable mainline kernel many patches merged date features include ability disable elf core dumps reduce number swap files use slob memory allocator ability disable bug measuring accounting features include ability kmalloc/kfree allocations monitored /proc/kmalloc measurement inline usage kernel compiling tinylinux requires intel 80386 better run embeddable linux kernel subset elks | [
11431,
11603,
5390,
823
] | Test |
4,872 | 3 | Socket_C32:socket c32 amd socket c32 server processor socket amd current single-cpu dual-cpu opteron 4000 series cpus successor socket am3 single-cpu servers successor socket f lower-end dual-cpu servers high-end dual-cpu servers use socket g34 socket c32 supports two ddr3 sdram channels based socket f uses similar 1207-land lga socket physically electrically compatible socket f due use ddr3 sdram instead ddr2 sdram socket f platforms use socket c32 launched june 23 2010 part san marino platform four six-core opteron 4100 lisbon processors socket c32 also supports bulldozer-based six- eight-core valencia opterons introduced november 2011 like socket g34 also uses amd sr5690 sr5670 sr5650 chipsets socket c32 also used ultra-low-power adelaide platform sr5650 chipset ht1 interconnects instead ht3.1 | [
3586,
9475,
3588,
8452,
3464,
7058,
10260,
7963,
4767,
2463,
7712,
9122,
1322,
2094,
11183,
1329,
3892,
8629,
9400,
6978,
11331,
9157,
3783,
7247,
9551,
7122,
9427,
7132,
2525,
4451,
5859,
1260,
7788,
7151,
1137,
1651
] | None |
4,873 | 4 | Enterprise_information_security_architecture:enterprise information security architecture enterprise information security architecture eisa part enterprise architecture focusing information security throughout enterprise name implies difference may exist small/medium-sized businesses larger organizations enterprise information security architecture eisa practice applying comprehensive rigorous method describing current and/or future structure behavior organization security processes information security systems personnel organizational sub-units align organization core goals strategic direction although often associated strictly information security technology relates broadly security practice business optimization addresses business security architecture performance management security process architecture well enterprise information security architecture becoming common practice within financial institutions around globe primary purpose creating enterprise information security architecture ensure business strategy security aligned enterprise information security architecture allows traceability business strategy underlying technology enterprise information security architecture first formally positioned gartner whitepaper called “ incorporating security enterprise architecture process ” published 24 january 2006 since publication security architecture moved silo based architecture enterprise focused solution incorporates business information technology picture represents one-dimensional view enterprise architecture service-oriented architecture also reflects new addition enterprise architecture family called “ security ” business architecture information architecture technology architecture used called bit short security part architecture family become bits security architectural change imperatives include things like practice enterprise information security architecture involves developing architecture security framework describe series current intermediate target reference architectures applying align programs change frameworks detail organizations roles entities relationships exist exist perform set business processes framework provide rigorous taxonomy ontology clearly identifies processes business performs detailed information processes executed secured end product set artifacts describe varying degrees detail exactly business operates security controls required artifacts often graphical given descriptions whose levels detail vary according affordability practical considerations decision makers provided means make informed decisions invest resources realign organizational goals processes policies procedures support core missions business functions strong enterprise information security architecture process helps answer basic questions like implementing enterprise information security architecture generally starts documenting organization strategy necessary details operates process cascades documenting discrete core competencies business processes organization interacts external parties customers suppliers government entities documented organization strategy structure architecture process flows discrete information technology components wherever possible related explicitly organization strategy goals operations enterprise information security architecture document current state technical security components listed well ideal-world desired future state reference architecture finally target future state result engineering tradeoffs compromises vs. ideal essentially result nested interrelated set models usually managed maintained specialised software available market exhaustive mapping dependencies notable overlaps metadata general sense itil concept configuration management database maintaining accuracy data significant challenge along models diagrams goes set best practices aimed securing adaptability scalability manageability etc systems engineering best practices unique enterprise information security architecture essential success nonetheless involve things componentization asynchronous communication major components standardization key identifiers successful application enterprise information security architecture requires appropriate positioning organization analogy city-planning often invoked connection instructive intermediate outcome architecture process comprehensive inventory business security strategy business security processes organizational charts technical security inventories system interface diagrams network topologies explicit relationships inventories diagrams merely tools support decision making sufficient must living process organization must design implement process ensures continual movement current state future state future state generally combination one enterprise information security architecture frameworks subset enterprise architecture frameworks simplify conceptual abstraction enterprise information security architecture within generic framework picture right would acceptable high-level conceptual security architecture framework open enterprise architecture frameworks enterprise information security architecture key component information security technology governance process organization significant size companies implementing formal enterprise security architecture process support governance management however noted opening paragraph article ideally relates broadly practice business optimization addresses business security architecture performance management process security architecture well enterprise information security architecture also related security portfolio management metadata enterprise sense | [
2090,
4107,
2092,
7979,
11320,
7802,
5373
] | Test |
4,874 | 5 | Kerberized_Internet_Negotiation_of_Keys:kerberized internet negotiation keys kerberized internet negotiation keys kink protocol defined rfc 4430 used set ipsec security association sa similar internet key exchange ike utilizing kerberos protocol allow trusted third parties handle authentication peers management security policies centralized fashion motivation given rfc 3129 alternative ike peers must use x.509 certificates authentication use diffie–hellman key exchange dh encryption know implement security policy every peer connect authentication x.509 certificates either pre-arranged using dns preferably dnssec utilizing kerberos kink peers must mutually authenticate appropriate authentication server key distribution center kdc turn controlling distribution keying material encryption therefore controlling ipsec security policy kink command/response protocol create delete maintain ipsec sas command response contains common header along set type-length-value payloads type command response constrains payloads sent messages exchange kink stateless protocol command response require storage hard state kink contrast ike uses main mode first establish internet security association key management protocol isakmp sa followed subsequent quick mode exchanges kink uses kerberos mechanisms provide mutual authentication replay protection establishing sas kink provides confidentiality payloads follow kerberos ap-req payload design kink mitigates denial service attacks requiring authenticated exchanges use public key operations installation state kink also provides means using kerberos user-to-user mechanisms key shared server kdc typically limited case ipsec peers using pkinit initial authentication kink directly reuses quick mode payloads defined section 5.5 ike minor changes omissions cases kink exchanges single command response optional third message required creating sas responder rejects first proposal initiator wants contribute keying materials kink also provides rekeying dead peer detection kink message includes following fields kink payloads defined following payloads defined following open source implementations kink currently available | [
10908,
9383,
6064,
6098,
8760,
732,
11133,
3742
] | Validation |
4,875 | 2 | Partitioning_Communication_System:partitioning communication system partitioning communication system computer communications security architecture based information flow separation policy pcs extends four foundational security policies mils multiple independent levels security software architecture network pcs leverages software separation enable application layer entities enforce manage control application layer security policies manner application layer security policies result communications architecture allows software separation kernel pcs share responsibility security application pcs invented ois ois collaborated extensively requirements pcs | [
4914,
7887
] | Validation |
4,876 | 4 | Collateral_freedom:collateral freedom collateral freedom anti-censorship strategy attempts make economically prohibitive censors block content internet achieved hosting content cloud services considered censors important block using encryption prevent censors identifying requests censored information hosted among content forcing censors either allow access censored information take entire services | [
3781,
4194,
3629,
4224
] | Test |
4,877 | 9 | Jensen's_Device:jensen device jensen device computer programming technique exploits call name devised danish computer scientist jørn jensen worked peter naur regnecentralen worked gier algol compiler one earliest correct implementations algol 60 algol 60 used call name jensen device exploits call name side-effects call name argument passing convention delays evaluation argument actually used procedure consequence copy rule procedures algol introduced call name classic example jensen device procedure computes sum series formula_1 procedure index variable codice_1 summation term codice_2 passed name call name enables procedure change value index variable execution codice_3 loop call name also causes codice_2 argument reevaluated iteration loop typically codice_2 depend upon changing side-effected codice_1 example code compute sum first 100 terms real array codice_7 would execution codice_8 actual argument codice_9 increment step codice_3 loop procedure evaluations codice_2 use current value codice_9 access successive array elements codice_13 jensen device general double summation done codice_8 function employed arbitrary functions merely employing appropriate expressions sum integers desired expression would codice_15 sum squares integers codice_16 slight variation would suitable initiating numerical integration expression method similar codice_8 evaluation codice_2 implemented thunk essentially subroutine environment thunk closure arguments time procedure needs value formal argument simply calls thunk thunk evaluates actual argument scope calling code scope procedure absence pass-by-name facility would necessary define functions embodying expressions passed according protocols computer language create compendium function along arrangement select desired expression usage another example gps general problem solver described d. e. knuth j. n. merner algol 60 confidential following single statement finds m-th prime using gps jensen device relies call name call name subtle problems consequently call name available languages knuth comments algol 60 express codice_20 procedure increases argument one call codice_21 expected action codice_9 functional changes access knuth says use 'macro definition facilities extend language instead relying solely procedures purpose results satisfactory running program others point call name procedure swaps argument subtle problems obvious swapping procedure procedure right thing many arguments invocation codice_23 problematic using copy rule leads assignments problem second assignment changes codice_9 codice_25 third assignment probably array element start hand procedure coded way around b saved temp instead desired action would result unless invoked codice_26 | [
512,
898,
9315,
10568,
3529,
1610,
8587,
2798,
5040,
10043,
11003
] | Test |
4,878 | 6 | WebDFS:webdfs open source distributed file system used behind http server apache lighttpd hiawatha cherokee etc implement highly scalable dfs storing images etc webdfs mostly based algorithms algorithms come family algorithms known rush family replication scalable hashing built correctly system built rush algorithms following characteristics text taken algorithm whitepaper | [
865,
9125,
9285,
7983,
823,
2395
] | Test |
4,879 | 3 | Macintosh_Quadra_900:macintosh quadra 900 macintosh quadra 900 personal computer designed manufactured sold apple computer inc. october 1991 may 1992 introduced alongside quadra 700 first computers quadra family macintosh computers using motorola 68040 processor also first computer apple housed 18.6 inch 47 cm tall mid-tower form factor 1991 gained momentum pc manufacturers suitable design departmental servers quadra 900 short lifespan discontinued six months first shipments favor powerful quadra 950 quadra 900 expandable quadra 700 cost us 7,200 quadra 900 could upgraded 256 megabytes ram astronomical amount time typical midrange system would come equipped 2–4 mb standard as-shipped configuration 900 4 mb high ram storage capacity along expandability five nubus 90 slots fast 25 mhz processor made useful computer scientific design work mid-tower case design features single 5.25-inch drive bay initially intended hold tape backup drive often repurposed hold cd-rom syquest drive model operational lifespan featuring 16 slots 30-pin simms installed groups four quadra 900s full complements ram exceedingly rare due high cost many thousands dollars simms time new three-mode key-lock system front panel set secure set machine ca n't powered secure mode floppy drive adb port disabled offering degree local protection system 7.0.1 included supports mac os 8.1 earliest macintosh model ability run mac os 8 power macintosh upgrade card installed quadra 900 runs name reported system profiler power macintosh 900 | [
7697,
4114,
6165,
11289,
7706,
8222,
1057,
6183,
1576,
4139,
7211,
8253,
1090,
4180,
10838,
10840,
9312,
8806,
6258,
10357,
4220,
10365,
10878,
6783,
4741,
7305,
8842,
6283,
7824,
147,
7830,
6807,
4258,
7842,
7844,
7869,
8893,
8896,
4807,
... | None |
4,880 | 3 | Kilocore:kilocore kilocore rapport inc. ibm high-performance low-power multi-core microprocessor 1,025 cores contains single powerpc processing core 1,024 eight-bit processing elements running 125 mhz dynamically reconfigured connected shared interconnect allows high performance parallel processing rapport first product market kc256 256 8-bit processing elements kc256 started shipping 2006 elements grouped 16 stripes 16 processing elements stripe able dedicated particular task thousand core products kc1024 kc1025 due 2008 1024 8-bit processing elements 32 x 32-stripe configuration kc1025 powerpc cpu kc1024 processing elements ibm says kilocore1025 enable streaming live- high-definition video low-power mobile device 5 10 times speed existing processors | [
8931,
1776,
10675,
3323,
8700,
10493
] | Validation |
4,881 | 3 | RHPPC:rhppc rhppc radiation hardened processor based powerpc 603e technology licensed motorola freescale manufactured honeywell rhppc equivalent commercial powerpc 603e processor minor exceptions phase locked loop pll processor version register pvr rhppc processor compatible powerpc architecture book i-iii powerpc 603e programmers interface also supported common powerpc software tools embedded operating systems like vxworks rhppc processor generates 190 mips dhrystone mix core clock 100 mhz i.e rhppc processor completes 1.9 instructions per cycle rhppc runs 25 33.3 40 50 mhz 60x bus clock sysclk generated based pci clock 60x bus clock de-skewed on-chip pll also multiplied rhppc processor superscalar machine five execution units system register unit integer unit load/store unit floating point unit branch processing unit dispatch unit issue two instructions per cycle floating point unit three level deep pipeline order execution supported use shadow rename registers completion unit complete two instructions per cycle order copying results rename registers real registers independently branch processing unit complete branch cycle thus theory rhppc processor complete three instructions per cycle within rhppc processor 16 kb instruction 16 kb data l1 caches 4 way set associative support write copy-back protocol cache line fixed eight words rhppc processor fabricated honeywell ’ soi-v 0.35 µm four level metal process standard cells custom drop-ins used packaged hermetic aluminium oxide 21 x 21 mm grid array package 255 16 x 16 leads leads 1.27 mm centers lead either solder balls solder columns short pins attached standard die attach wire bond die interconnect used | [
6914,
4868,
10501,
3846,
4743,
5642,
1548,
1933,
6926,
3472,
1563,
1309,
8606,
6815,
3493,
6949,
6311,
8102,
1321,
9391,
10543,
4017,
5297,
1461,
8120,
9020,
1725,
1983,
10180,
8530,
3540,
342,
9302,
7514,
11613,
6878,
1635,
10214,
10985,
... | Validation |
4,882 | 4 | Void_pantograph:void pantograph security printing void pantograph refers method making copy-evident tamper-resistant patterns background document normally invisible eye become obvious document photocopied typically spell void copy invalid indicator message void pantographs work exploiting limitations features copying equipment scanner photocopier act low-pass filter original image blurring edges slightly also perfectly aligned directions document causing aliasing features smaller resolution also reproduced addition human vision sensitive luminance contrast ratio means grey region consists grid small dark dots filtering produce lighter grey region larger dots affected differently big-dot-little-dot makes possible see pattern invisible numerous variations exist including printing marks using raster lines one direction background lines another direction using fine line patterns alias visible moire pattern copied | [
10163,
6324
] | Test |
4,883 | 4 | Botnet:botnet botnet number internet-connected devices running one bots botnets used perform distributed denial-of-service attack ddos attack steal data send spam allows attacker access device connection owner control botnet using command control c c software word botnet combination words robot network term usually used negative malicious connotation botnet logical collection internet-connected devices computers smartphones iot devices whose security breached control ceded third party compromised device known bot created device penetrated software malware malicious software distribution controller botnet able direct activities compromised computers communication channels formed standards-based network protocols irc hypertext transfer protocol http botnets increasingly rented cyber criminals commodities variety purposes botnet architecture evolved time effort evade detection disruption traditionally bot programs constructed clients communicate via existing servers allows bot herder person controlling botnet perform control remote location obfuscates traffic many recent botnets rely existing peer-to-peer networks communicate p2p bot programs perform actions client-server model require central server communicate first botnets internet used client-server model accomplish tasks typically botnets operate internet relay chat networks domains websites infected clients access predetermined location await incoming commands server bot herder sends commands server relays clients clients execute commands report results back bot herder case irc botnets infected clients connect infected irc server join channel pre-designated c c bot herder bot herder sends commands channel via irc server client retrieves commands executes clients send messages back irc channel results actions response efforts detect decapitate irc botnets bot herders begun deploying malware peer-to-peer networks bots may use digital signatures someone access private key control botnet see e.g gameover zeus zeroaccess botnet newer botnets fully operate p2p networks rather communicate centralized server p2p bots perform command distribution server client receives commands avoids single point failure issue centralized botnets order find infected machines bot discreetly probes random ip addresses contacts another infected machine contacted bot replies information software version list known bots one bots version lower initiate file transfer update way bot grows list infected machines updates periodically communicating known bots botnet originator known bot herder bot master controls botnet remotely known command-and-control c c program operation must communicate via covert channel client victim machine zombie computer irc historically favored means c c communication protocol bot herder creates irc channel infected clients join messages sent channel broadcast channel members bot herder may set channel topic command botnet e.g message codice_1 bot herder alerts infected clients belonging channel begin ddos attack website www.victim.com example response codice_2 bot client alerts bot herder begun attack botnets implement custom versions well-known protocols implementation differences used detection botnets example mega-d features slightly modified smtp implementation testing spam capability bringing mega-d smtp server disables entire pool bots rely upon smtp server computer science zombie computer computer connected internet compromised hacker computer virus trojan horse used perform malicious tasks one sort another remote direction botnets zombie computers often used spread e-mail spam launch denial-of-service attacks owners zombie computers unaware system used way owner tends unaware computers metaphorically compared zombies coordinated ddos attack multiple botnet machines also resembles zombie horde attack many computer users unaware computer infected bots process stealing computing resources result system joined botnet sometimes referred scrumping botnet command control c c protocols implemented number ways traditional irc approaches sophisticated versions telnet botnets use simple c c botnet protocol bots connect main command server host botnet bots added botnet using scanning script scanning script run external server scans ip ranges telnet ssh server default logins login found added infection list infected malicious infection line via ssh scanner server ssh command run infects server commands server ping control server becomes slave malicious code infecting servers infected server bot controller launch ddos attacks high volume using c c panel host server types botnets used take large websites like xbox playstation network known hacking group called lizard squad irc networks use simple low bandwidth communication methods making widely used host botnets tend relatively simple construction used moderate success coordinating ddos attacks spam campaigns able continually switch channels avoid taken however cases merely blocking certain keywords proven effective stopping irc-based botnets rfc 1459 irc standard popular botnets first known popular botnet controller script maxite bot using irc xdcc protocol private control commands one problem using irc bot client must know irc server port channel use botnet anti-malware organizations detect shut servers channels effectively halting botnet attack happens clients still infected typically lie dormant since way receiving instructions mitigate problem botnet consist several servers channels one servers channels becomes disabled botnet simply switches another still possible detect disrupt additional botnet servers channels sniffing irc traffic botnet adversary even potentially gain knowledge control scheme imitate bot herder issuing commands correctly since botnets using irc networks domains taken time hackers moved p2p botnets c c way make harder taken also used encryption way secure lock botnet others time use encryption public-key cryptography presented challenges implementing breaking many large botnets tend use domains rather irc construction see rustock botnet srizbi botnet usually hosted bulletproof hosting services one earliest types c c zombie computer accesses specially-designed webpage domain serves list controlling commands advantages using web pages domains c c large botnet effectively controlled maintained simple code readily updated disadvantages using method uses considerable amount bandwidth large scale domains quickly seized government agencies without much trouble effort domains controlling botnets seized also easy targets compromise denial-of-service attacks fast-flux dns used way make difficult track control servers may change day day control servers may also hop dns domain dns domain domain generation algorithms used create new dns names controller servers botnets use free dns hosting services dyndns.org no-ip.com afraid.org point subdomain towards irc server harbors bots free dns services host attacks provide reference points often hard-coded botnet executable removing services cripple entire botnet calling back large social media sites github twitter reddit instagram xmpp open source instant message protocol tor hidden services popular ways avoiding egress filtering communicate c c server example illustrates botnet created used malicious gain newer bots automatically scan environment propagate using vulnerabilities weak passwords generally vulnerabilities bot scan propagate valuable becomes botnet controller community computers co-opted botnet execute malicious software accomplished luring users making drive-by download exploiting web browser vulnerabilities tricking user running trojan horse program may come email attachment malware typically install modules allow computer commanded controlled botnet operator software downloaded call home send reconnection packet host computer re-connection made depending written trojan may delete may remain present update maintain modules cases botnet may temporarily created volunteer hacktivists implementations low orbit ion cannon used 4chan members project chanology 2010 china great cannon china allows modification legitimate web browsing traffic internet backbones china create large ephemeral botnet attack large targets github 2015 botnet controller community features constant continuous struggle bots highest overall bandwidth high-quality infected machines like university corporate even government machines botnets often named malware created multiple botnets typically use malware operated different entities botnets used many electronic scams botnets used distribute malware viruses take control regular users computer/software taking control someone personal computer unlimited access personal information including passwords login information accounts called phishing phishing acquiring login information victim accounts link victim clicks sent email text survey verizon found around two-thirds electronic espionage cases come phishing geographic dispersal botnets means recruit must individually identified/corralled/repaired limits benefits filtering computer security experts succeeded destroying subverting malware command control networks among means seizing servers getting cut internet denying access domains due used malware contact c c infrastructure cases breaking c c network response c c operators resorted using techniques overlaying c c networks existing benign infrastructure irc tor using peer-to-peer networking systems dependent fixed servers using public key encryption defeat attempts break spoof network norton antibot aimed consumers target enterprises and/or isps host-based techniques use heuristics identify bot behavior bypassed conventional anti-virus software network-based approaches tend use techniques described shutting c c servers null-routing dns entries completely shutting irc servers bothunter software developed support u.s. army research office detects botnet activity within network analyzing network traffic comparing patterns characteristic malicious processes researchers sandia national laboratories analyzing botnets behavior simultaneously running one million linux kernels—a similar scale botnet—as virtual machines 4,480-node high-performance computer cluster emulate large network allowing watch botnets work experiment ways stop detecting automated bot attacks becoming difficult day newer sophisticated generations bots getting launched attackers example automated attack deploy large bot army apply brute-force methods highly accurate username password lists hack accounts idea overwhelm sites tens thousands requests different ips world bot submitting single request every 10 minutes result 5 million attempts per day cases many tools try leverage volumetric detection automated bot attacks ways circumventing triggers volumetric detection one techniques detecting bot attacks known signature-based systems software attempt detect patterns request packet attacks constantly evolving may viable option patterns ca n't discerned thousands requests also behavioral approach thwarting bots ultimately trying distinguish bots humans identifying non-human behavior recognizing known bot behavior process applied user browser network levels capable method using software combat virus utilize honeypot software order convince malware system vulnerable malicious files analyzed using forensic software july 15 2014 subcommittee crime terrorism committee judiciary united states senate held hearing threats posed botnets public private efforts disrupt dismantle first botnet first acknowledged exposed earthlink lawsuit notorious spammer khan c. smith 2001 purpose bulk spam accounting nearly 25 spam time around 2006 thwart detection botnets scaling back size | [
3072,
10242,
5636,
1541,
10245,
10756,
5131,
9227,
9233,
535,
9242,
9761,
4133,
4648,
9256,
9771,
46,
10297,
1083,
3643,
7739,
1087,
1088,
9791,
2114,
4165,
10309,
3145,
8779,
5199,
81,
4689,
8789,
10331,
9824,
6241,
2147,
10852,
1125,
26... | None |
4,884 | 2 | Intel_Memory_Model:intel memory model computing intel memory model refers set six different memory models x86 cpu operating real mode control segment registers used default size pointers four registers used refer four segments 16-bit x86 segmented memory architecture ds data segment cs code segment ss stack segment es extra segment another 16-bit register act offset given segment logical address platform written segment offset typically hexadecimal notation real mode order calculate physical address byte memory hardware shifts contents appropriate segment register 4 bits left effectively multiplying 16 adds offset example logical address 7522 f139 yields 20-bit physical address note process leads aliasing memory given physical address may multiple logical representations means comparison pointers different segments complicated process pointer formats known near far huge memory models protected mode segment writable executable therefore implementing tiny memory model code segment register must point physical address limit data segment register defeated one features 80286 makes sure data segments never executable code segments never writable means self-modifying code never allowed however 80386 paged memory management unit possible protect individual memory pages writing memory models limited 16-bit programs possible use segmentation 32-bit protected mode well resulting 48-bit pointers exist c language compilers support however segmentation 32-bit mode allow access larger address space single segment would cover unless segments always present memory linear address space used cache larger segmented virtual space allows better protection access various objects areas 1 mb long benefit one-byte access protection granularity versus coarse 4 kib granularity offered sole paging therefore used specialized applications like telecommunications software technically flat 32-bit address space tiny memory model segmented address space reigns four segment registers contain one value x86-64 platform total seven memory models exist majority symbol references 32 bits wide addresses known link time opposed position-independent code affect pointers used always flat 64-bit pointers values accessed via symbols placed | [
4424,
5065,
9911,
5356,
5040,
499,
6868,
5911,
5080,
3386,
1915,
7421,
1247
] | Test |
4,885 | 9 | LabWindows/CVI:labwindows/cvi labwindows/cvi cvi short c virtual instrumentation ansi c programming environment test measurement developed national instruments program originally released labwindows dos 1987 soon revisioned renamed microsoft windows platform current version labwindows/cvi commonly referred cvi 2019 labwindows/cvi uses libraries data-acquisition modules better known national instrument product labview thus highly compatible labview targeted domain experts scientists cvi towards software engineers comfortable text-based linear languages c. starting labview 8.0 major versions released around first week august coincide annual national instruments conference ni week followed bug-fix release following february 2009 national instruments started name releases year released bug-fix called service pack instance 2009 service pack 1 released february 2010 | [
6338,
6154,
6797,
7341,
303,
7983,
10478,
7355,
2045,
6910
] | None |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.