node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
4,886 | 3 | Ivy_Bridge_(microarchitecture):ivy bridge microarchitecture ivy bridge codename third generation intel core processors core i7 i5 i3 ivy bridge die shrink 22 nanometer manufacturing process based 32 nanometer sandy bridge second generation intel core see tick–tock model name also applied broadly 22 nm die shrink sandy bridge microarchitecture based finfet 3d tri-gate transistors also used xeon core i7 ivy bridge-ex ivytown ivy bridge-ep ivy bridge-e microprocessors released 2013 ivy bridge processors backwards compatible sandy bridge platform systems might require firmware update vendor specific 2011 intel released 7-series panther point chipsets integrated usb 3.0 complement ivy bridge volume production ivy bridge chips began third quarter 2011 quad-core dual-core-mobile models launched april 29 2012 may 31 2012 respectively core i3 desktop processors well first 22 nm pentium announced available first week september 2012 ivy bridge earliest intel microarchitecture officially support windows 10 64-bit ivy bridge cpu microarchitecture shrink sandy bridge remains largely unchanged like predecessor sandy bridge ivy bridge also primarily developed intel israel branch located haifa israel notable improvements include mobile desktop ivy bridge chips also include significant changes sandy bridge compared predecessor sandy bridge ivy bridge temperatures reportedly 10 °c higher compared sandy bridge cpu overclocked even default voltage setting impress pc watch japanese website performed experiments confirmed earlier speculations intel used poor quality perhaps lower cost thermal interface material thermal paste tim chip heat spreader instead fluxless solder previous generations mobile ivy bridge processors affected issue use heat spreader chip cooling system enthusiast reports describe tim used intel low-quality par premium cpu speculation design encourage sales prior processors analyses caution processor damaged void warranty home users attempt remedy matter tim much lower thermal conductivity causing heat trap die experiments replacing tim higher-quality one heat removal methods showed substantial temperature drop improvements increased voltages overclocking sustainable ivy bridge chips intel claims smaller die ivy bridge related increase thermal density expected result higher temperatures cpu overclocked intel also stated expected likely improve future revisions ivy bridge processors one two four cores report cpuid model 0x000306a9 built four different configurations differing number cores l3 cache gpu execution units ivy bridge-e family follow-up sandy bridge-e using cpu core ivy bridge processor lga 2011 lga 1356 lga 2011-1 packages workstations servers ivy bridge-e family made three different versions number cores three market segments basic ivy bridge-e single-socket processor sold core i7-49xx available six-core s1 stepping versions limited four active cores ivy bridge-en xeon e5-14xx v2 xeon e5-24xx v2 model single- dual-socket servers using lga 1356 10 cores ivy bridge-ep xeon e5-16xx v2 xeon e5-26xx v2 xeon e5-46xx v2 scales four lga 2011 sockets 12 cores per chip fact three die flavors ivy bridge-ep meaning manufactured organized differently according number cores ivy bridge-ep cpu includes ivy bridge-ex 15 cores scales 8 sockets 15-core die organized three columns five cores three interconnect rings connecting two columns per ring five-core column separate l3 cache processor supposed new run sure technology speculated odd number cores involve keeping one reserve processors featuring intel hd 4000 graphics hd p4000 xeon set bold processors feature hd 2500 graphics hd graphics unless indicated n/a list announced desktop processors follows suffixes denote additional high-end server processors based ivy bridge architecture code named ivytown announced september 10 2013 intel developer forum usual one year interval consumer server product releases ivy bridge-ep processor line announced september 2013 12 cores 30 mb third level cache rumors ivy bridge-ex 15 cores increased third level cache 37.5 mb although early leaked lineup ivy bridge-e included processors maximum 6 cores core-i7 xeon versions produced xeon versions marketed xeon e5-1400 v2 act drop-in replacements existing sandy bridge-en based xeon e5 xeon e5-2600 v2 versions act drop-in replacements existing sandy bridge-ep based xeon e5 core-i7 versions designated i7-4820k i7-4930k i7-4960x released september 10 2013 remaining compatible x79 lga 2011 hardware intermediate lga 1356 socket intel launched xeon e5-2400 v2 codenamed ivy bridge-en series january 2014 10 cores new ivy bridge-ex line marketed xeon e7 v2 corresponding predecessor using sandy bridge microarchitecture instead followed older westmere-ex processors suffixes denote intel demonstrated haswell architecture september 2011 began release 2013 successor sandy bridge ivy bridge | [
3459,
5380,
3973,
8325,
9095,
5386,
9611,
4108,
9741,
6926,
8719,
5649,
7313,
5523,
6804,
8851,
8855,
3352,
9111,
9369,
5883,
10658,
1832,
2088,
10669,
2094,
2350,
9391,
7601,
10675,
4276,
1461,
10548,
2237,
5309,
6463,
8125,
833,
8126,
6... | Test |
4,887 | 3 | Bodhi_Linux:bodhi linux bodhi linux lightweight linux distribution based ubuntu uses moksha window manager philosophy distribution provide minimal base system users populate software want thus default includes software essential linux users including file browser pcmanfm web browser midori terminal emulator terminology include software features developers deem unnecessary make populating systems software easy bodhi linux developers maintain online database lightweight software installed one click via apturl addition standard version bodhi linux intel-compatible processors alpha release version tablet devices arm processors based debian tablet device version bodhi officially supported anymore amount time needed keep date package image updates rarely made future system requirements include 256 mb ram 4 gb hard disk space 500 mhz processor 32 bit processors without pae capability supported terms pae-enabled ones difference bodhi versions older kernel used using enlightenment dr17-based fork called moksha desktop bodhi provides rich desktop effects animations require high end computer hardware rationale forking project dr17 due established performance functionality e19 possessed optimizations break existing features users enjoy use per jeff hoogland statement enlightenment window manager well tools developed specifically bodhi linux written c programming language python bodhi linux derived ubuntu long term support releases 14.04 16.04 18.04 ... support follows pattern security bug fixes released daily basis throughout five-year period opposed ubuntu bodhi short term support installed bodhi linux upgraded latest state via command line package manager releases numbered x.y.z major release x.y.z e.g version 2.y.z 3.0.0 follows ubuntu long term support delay months goal deliver new major release july every year following new ubuntu lts expected april new functionality added release bodhi linux 3.0.0 branch released february 2015 additional legacy version older hardware update/point release x.y.z e.g version 2.3.z 2.4.0 similar point releases ubuntu 12.04.1 12.04.2 ... frequent used delivering new software versions improvements related security beginning version 2.4.0 update frequency reduced three times year every four months january may september new update come bodhi linux 2.4.0 planned release august 2013 appeared little late mid-september ready bug fix release x.y.z e.g version 2.4.0 2.4.1 meant correcting errors default configuration r_pi bodhi linux build built directly top raspbian incorporates changes improvements produce optimized ″hard float″ code raspberry pi armhf arm hf technically r_pi bodhi linux built compilation settings adjusted produce optimized ″hard float″ code raspberry pi armhf arm hf hard float application binary interface arm11 32-bit risc microprocessor arm architecture armv6 architectural additions provides enormous performance gains many use cases however required significant effort port elements debian wheezy armv6 cpu official builds require armv7 significantly enhance performance applications make heavy use floating point arithmetic operations previous less efficient soft float settings native armv6 architecture floating point arithmetic operations simulated software effort build working release armhf release officially supported anymore moment jack germain linuxinsider wrote positive review bodhi linux 5.0.0 noting bodhi linux elegant lightweight distribution productive computing platform | [
4611,
3079,
3089,
4113,
8209,
8727,
543,
11297,
7204,
9253,
11305,
56,
3129,
4153,
59,
8248,
9276,
3649,
4673,
3654,
5190,
3147,
2125,
1107,
1110,
89,
5721,
4192,
3685,
10860,
5742,
2671,
11388,
2692,
8837,
9353,
9873,
11410,
659,
8857,
... | Validation |
4,888 | 2 | HomeKit:homekit homekit software framework apple lets users set ios device configure communicate control smart-home appliances designing rooms items actions homekit service users enable automatic actions house simple voice dictation siri apps homekit first released ios 8 september 2014 homekit support also included macos mojave used devices siri manufacturers homekit-enabled devices required mfi program homekit products required encryption co-processor later changed ios 11 added support software authentication equipment manufactured without homekit support enabled use gateway product hub connects devices homekit service | [
10755,
9732,
4615,
1549,
5647,
7697,
1042,
11289,
6186,
4139,
6700,
3629,
4657,
1074,
8754,
9784,
8253,
576,
9802,
8783,
5713,
4180,
3670,
1623,
3672,
4184,
10838,
2141,
4702,
3681,
9826,
2149,
5733,
8806,
3691,
8303,
2673,
6771,
2676,
62... | Test |
4,889 | 4 | Zeobit:zeobit zeobit llc stylized zeobit technology software company formed 2009 ceo slava kolomiychuk located sunnyvale california company specialized computer security software internet security december 2016 longer business zeobit best known bundled utility software mackeeper software received mixed reviews reviewers divided effectiveness product zeobit llc incorporated september 2009 us state california slava kolomiychuk zeobit management headquarters sunnyvale california partnership offices europe asia house developers customer support march 2010 first product mackeeper macos released september 2010 pckeeper microsoft windows released may 13 2010 first beta version mackeeper version 0.8 released october 4 2010 pckeeper mackeeper equivalent windows pcs version 1.1.48 released october 26 2010 zeobit released mackeeper 1.0 january 30 2012 mackeeper 2.0 released updates security data control cleaning optimization 2014 pennsylvania woman filed class action lawsuit zeobit llc claiming company computer security program identifies problems n't exist generates false error messages scare users purchasing upgrade see holly yencha et al v. zeobit llc case 2:13-cv-00578 u.s. district court western district pennsylvania according complaint filed us district court installed mackeeper prompts user conduct diagnostic scan mackeeper class action lawsuit says scan purportedly detects errors lead problems identified zeobit marketing materials i.e. performance issues security privacy threats —problems mackeeper supposedly designed fix however zeobit class action lawsuit alleges diagnostic scan completed mackeeper reports identified thousands issues cause computer critical condition trial version mackeeper purports fix limited number issues customers encouraged purchase full registered version security software fully repair computer yencha alleges neither free trial full versions mackeeper perform reliable diagnostic testing computer instead zeobit intentionally designed mackeeper invariably ominously report user mac needs repair at-risk due harmful fabricated errors privacy threats computer problems regardless computer actual condition class action lawsuit alleges class action settled 2015 admission wrongdoing customers given refunds mackeeper utility software macos claims provide tools security cleaning optimization data control mackeeper zeobit official sponsors macworld iworld expo san francisco california 2011 2012 acquired kromtech alliance corp may 2013 mackeeper often criticized unethical marketing tactics including pop-up advertising buying domain names similar names antivirus programs zeobit claims affiliates responsible advertising accused unethical mackeeper sometimes referred potentially unwanted program detected antivirus programs pckeeper bundle important system utilities performing different tasks pс antivirus data control optimization tools drive clean-up utilities much according virus bulletin pckeeper scored 91.9 rap test listed number 6 antivirus world acquired kromtech alliance corp may 2013 zeodisk project cloud storage solution also integrated existing zeobit products 2011 zeobit partnered avira integrate virus database technology mackeeper pckeeper internet security features partnership allowed zeobit offer internet security options macos windows linux freebsd openbsd solaris computing platforms zeobit member better business bureau f rating due complaints advertising quality products zeobit microsoft silver certified developer zeobit official opswat partner | [
9771,
6797,
3342,
9488,
4659,
2611,
823,
1242,
6683
] | Test |
4,890 | 2 | Xiaomi_Mi_A2:xiaomi mi a2 xiaomi mi a2 re-branded xiaomi mi 6x phone co-developed google part android initiative—and xiaomi runs android operating system phone features 5.99 inches full hd+ 1080 x 2160 pixels resolution 403ppi pixel density display unimetal body corning gorilla glass 5 protection powered qualcomm snapdragon 660 processor adreno 512 gpu.and 2.0 type-c 1.0 reversible connector dual rear camera primary camera 12mp sony imx486 sensor 1.25μm pixel size f1.75 aperture secondary 20mp sony imx376 sensor 2.0μm pixel size f1.75 aperture front camera 20mp sony imx 376 sensor 2.0μm pixel size f2.2 aperture battery 3010 mah supports qualcomm quick charge 4.0+ xiaomi mi a2 part android one program software updates provided directly google preinstalled android 8.1.0 oreo board upgraded android 9.0 pie due part android one program mi a2 providing pure/stock android experience ui highly similar google pixel ui xiaomi mi a2 re-branded xiaomi mi 6x phone xiaomi mi 6x first released april 2018 a2 released july 2018 | [
10393,
10658,
196,
9863,
11082,
5100,
5755,
8719,
1776,
2259,
7835,
9913,
1400,
8921,
8794,
1083,
7548,
10303
] | None |
4,891 | 5 | Secure_Neighbor_Discovery:secure neighbor discovery secure neighbor discovery send protocol security extension neighbor discovery protocol ndp ipv6 defined rfc 3971 updated rfc 6494 neighbor discovery protocol ndp responsible ipv6 discovery network nodes local link determine link layer addresses nodes find available routers maintain reachability information paths active neighbor nodes rfc 4861 ndp insecure susceptible malicious interference intent send provide alternate mechanism securing ndp cryptographic method independent ipsec original inherent method securing ipv6 communications send uses cryptographically generated addresses cga new ndp options icmpv6 packet types used ndp send updated use resource public key infrastructure rpki rfc 6494 rfc 6495 define use send certificate profile utilizing modified rfc 6487 rpki certificate profile must include single rfc 3779 ip address delegation extension concerns algorithm agility vis-à-vis attacks hash functions used send expressed rfc 6273 cga currently uses sha-1 hash algorithm pkix certificates provide support alternative hash algorithms | [
5472,
10144,
8482,
6724,
649,
3742,
4687,
10461,
5437,
5470,
10303
] | Test |
4,892 | 4 | Runtime_application_self-protection:runtime application self-protection runtime application self-protection rasp security technology uses runtime instrumentation detect block computer attacks taking advantage information inside running software technology differs perimeter-based protections firewalls detect block attacks using network information without contextual awareness rasp technology said improve security software monitoring inputs blocking could allow attacks protecting runtime environment unwanted changes tampering rasp-protected applications rely less external devices like firewalls provide runtime security protection threat detected rasp prevent exploitation possibly take actions including terminating user session shutting application alerting security personnel sending warning user rasp aims close gap left application security testing network perimeter controls neither enough insight real-time data event flows either prevent vulnerabilities slipping review process block new threats unforeseen development rasp integrated framework module runs conjunction program codes libraries system calls technology also implemented virtualization application security solutions rasp technology used conjunction dynamic application security testing dast technology create interactive application security testing security product rasp solutions deployed two different ways monitor protection mode monitor mode rasp solution reports web application attacks block attack protection mode rasp solution reports blocks web application attacks | [
899,
5636,
10756,
9607,
9356,
9488,
3473,
8978,
10392,
5373,
5404,
2975,
2084,
2213,
8998,
939,
3629,
9646,
3887,
7855,
1970,
5433,
7739,
3262,
9791,
3525,
2558,
7368,
9160,
5325,
2262,
6360,
9688,
7515,
4956,
3941,
6373,
107,
11244,
2041... | Test |
4,893 | 8 | HTTP+HTML_form-based_authentication:http+html form-based authentication http+html form-based authentication typically presently colloquially referred simply form-based authentication technique whereby website uses web form collect subsequently authenticate credential information user agent typically web browser note phrase form-based authentication ambiguous see form-based authentication explanation steps technique http+html form-based authentication arguably prevalent user-authentication technique employed world wide web today approach choice essentially wikis forums banking/financial websites e-commerce websites web search engines web portals common web-server applications popularity apparently due webmasters employers wanting fine-grained control presentation behavior solicitation user credentials default pop-up dialog boxes http basic access authentication digest access authentication many web browsers provide allow precise tailoring desired precision may motivated corporate requirements like branding implementation issues e.g. default configuration web applications like mediawiki phpbb drupal wordpress regardless rationale corporate branding user-experience adjustments must distract several security considerations authentication process | [
225,
5724,
3462,
7965,
5515,
10125,
119,
5433,
5435,
124,
4797,
8923,
4095
] | None |
4,894 | 3 | Elevator_Action:elevator action player assumes role agent 17 codename otto secret agent unspecified organization government otto enters 30-story building roof level must work way basement collecting secret documents whose locations marked red doors along way must use building elevator escalator systems move floor floor avoid kill enemy agents trying stop picking documents otto escape basement drive away waiting car end level player controls consist four-position joystick separate buttons control jumping firing otto move left right jump duck fire three shots time pistol otto elevator player push send higher lower floor however otto duck long inside run jump across empty shaft long elevator ride roof control motion cross side player push make otto ride escalator otto tries leave building without collecting documents transported highest floor still unopened red door must work way back addition takes long clear level alarm sound enemy agents become aggressive elevators slower respond player joystick movements building contains section lights making harder see approaching enemies floors otto temporarily disable lights shooting one overhead fixtures otto kill enemy agents shooting jump-kicking close range dropping light fixture heads crushing elevator shot crushed falls open shaft player loses one life background music levels changes hidden time limit expires otto lands first building rooftop start game chopin piano sonata 2 popularly known funeral march briefly heard elevator action ported zx spectrum amstrad cpc msx commodore 64 nintendo entertainment system game boy sega sg-1000 game boy version includes ability acquire different weapons machine gun fires rapidly port planned atari 2600 never released prototype game published cge services corp. sold classic gaming expo 2001 elevator action returns called elevator action ii north america official sequel released arcades 1994 elevator action ex updated version game released game boy color 2000 elevator action old new update game boy advance published 2002 revealed aou 2009 elevator action death parade lightgun shooter uses elevator doors changing scenarios later remake game square enix titled elevator action deluxe released playstation network august 31 2011 game contains single player multiplayer modes well original arcade version elevator action included compilations taito legends taito legends power march 5 2007 nes port elevator action released wii virtual console also released wii u virtual console japan | [
2436,
8709,
4043,
8492,
1773,
9006,
4690,
6390,
9501,
5275,
1693
] | None |
4,895 | 4 | Dual-homed:dual-homed dual-homed dual-homing refer either ethernet device one network interface redundancy purposes firewall technology one firewall architectures implementing preventive security example dual-homed devices enthusiast computing motherboards incorporate dual ethernet network interface cards ethernet lans dual-homing network topology whereby networked device built one network interface interface port connected network one connection active time connection activated primary connection fails traffic quickly rerouted backup connection event link failure feature designed provide telecommunications grade reliability redundancy ethernet networks multihoming general category referring device one network connection firewall dual-homing provides first-line defense protection technology keeping untrusted bodies compromising information security violating trusted network space dual-homed host dual-homed gateway system fitted two network interfaces nics sits untrusted network like internet trusted network corporate network provide secure access dual-homed general term proxies gateways firewalls server provides secured applications services directly untrusted network dual-homed hosts seen special case bastion hosts multi-homed hosts fall category application-based firewalls dual-homed hosts act firewalls provided forward ip datagrams unconditionally firewall architectures include network-layer firewall types screening router screened-host screened subnet | [
8998,
6024,
11502,
7151,
4435,
4725,
6262,
3930,
3323,
4287
] | Test |
4,896 | 5 | PAROLI:paroli paroli proprietary protocol used inside multi-shelf carrier routing system cisco stands parallel optical link used connect line-cards so-called line-card chassis switching fabric switch-fabric chassis traffic kinds chassis comparable data flows backplane single-shelf system required bandwidth high need reliability shelves interconnected using several fibre optic cables protocol/feature used multi-shelf cisco-crs systems find ios xr special high performance version cisco ios basically two types multi-shelf crs systems second option allows fault-tolerant system crs system although single shelf switch-fabric allows redundancy levels power fans management-cards switch-cards etc multi-shelf system based two switch-fabric cards least two line-card chassis continue run even one switch-fabric shelves completely four scc/2 lcc also gives optimal availability reliability without loss throughput case switch fabric module fails although different shelves multi-shelf routing system often placed directly next paroli system allows distance shelves want place different shelves different rooms e.g system two switch-fabris chassis one chassis 50 line-card chassis dataroom 1 rest system room 2 even fire one room system continue work possible long length fibre-optic canles n't exceed 100 meters 328 feet also allow move individual shelves system traffic coming multi-shelf crs system come via interface line card line-card shelf traffic sent switch-fabric shelf packet processed based destination course system-configuration data sent outgoing interface line-card line-card shelf inter shelf communication links therefore process kind data-volumes backplane normally carry single-shelf router allow speeds via external fibre optic cabling cisco designed special modules make possible multi-shelf system need three kind connections line-card chassis switch-fabric chassis management alarm external clock cabling allow management different shelves system different type management clock signalling options least one management cabling required general rp ethernet connection controller cabling cisco created special module use fabric card chassis 22 port shelf controller gigabit ethernet module sc-ge-22 lcc use two ethernet interfaces provided two rp chassis single sfc two lcc install sc-ge-22 modules single sfc interface rp connect twice single sfc 2 x 2 setup one ge port rp connects one sfc ge port connects sfc four sfc setup first rp connects sfc 1 3 rp shelf connects sfc 2 4 allow redundancy connect ethernetport0 interface rp port first fc-fe-22 interface 1 second sc-fe-22 allow communication two sc-fe-22 modules creating mesh-network connect port 22 sc-fe-22 dual sfc sc-fe-22 direct full mesh link 3 sc-fe-22 4 sfc system also create full-mesh network fc-fe-22 modules cabling means one sfc two lcc need 8+1 ethernet cables network control dual sfc need 14 cables 8xsc-lc 6 lcc mesh 4 sfc-2 lcc need 8 lc cables 28 sfc-sfc mesh cables finally need fabric cabling carry actual data payload line card chassis switch fabric chassis interconnection system uses 8 fabric planes numbered 0 7 combination uses 3 components stages packet arrives via interface linecard lcc ingress fcc stage 1 goes switch-fabric stage 2 destination line-card stage 3 .it course possible linecard ingress resides shelf egress line card 3 stage model used lcc use stage 1 3 cards s13 cards sfc stage 2 cards s2 single sfc setup 8 s2 cards reside single sfc multi sfc setupthe s2 cards distributed sfc communication based two line-card chassis need 72 fibres 3 s1,2,3 x 8 planes x 3 2xlcc+1fcc even one sfc still use 72 cables two sfc setup 50 fibres lcc connect sfc1 50 sfc2 similar 4 node system cables ordered lengths 10–100 meters steps 5 meters come sets 24 thus interconnect system need 3 sets required length future configurations two lcc supported currently multi-shelf configuration supports two line card chassis 1,2 3 switch fabric chassis | [
4896,
6834
] | Test |
4,897 | 3 | QUICC:quicc quicc abbreviation quad integrated communications controller original quicc 68k-based motorola 68360 followed powerpc-based powerquicc powerquicc ii powerquicc ii+ powerquicc iii early chips used separate risc engine control serial interfaces enhancing performance slower speed designs pq2+ pq3 designs first family offer gigabit ethernet speeds using conventional ethernet controllers without need risc co-processor exceptions 832x bridge chips chips many integrated devices/controllers directly targeted telecom industry still used applications well technology backbone many motorola cellular base stations pq2+ chips moved directions well many designs sata controllers san based applications networking always strength every current freescale pq cpu/board comes working linux environment freescale continues offer mqx true rtos ppc growing basis | [
869,
11447,
7065,
3319,
8700
] | Test |
4,898 | 4 | John_B._Ackerman:john b. ackerman john bevier ackerman april 29 1909 – june 13 1981 second vice director national security agency united states major general united states air force | [
289,
7137,
10305,
11302,
327,
266,
6668,
365,
9357,
4719,
7887,
2897,
1714,
10832,
4566,
2712,
6749
] | None |
4,899 | 0 | Bibliotheca_Polyglotta:bibliotheca polyglotta bibliotheca polyglotta norwegian database multilingualism project french language science per global history university oslo aim project according pages producing web corpus buddhist texts using multilingual lexicography generally texts used study sanskrit chinese tibetan | [
2901
] | Test |
4,900 | 9 | Work_Flow_Language:work flow language work flow language wfl wiffle process control language burroughs large systems including unisys clearpath/mcp series operating system master control program developed soon b5000 1961 wfl clearpath equivalent job control language jcl ibm mainframes shell scripts unix-like operating systems unlike jcl wfl high-level structured language complete subroutines procedures functions arguments high-level program control flow instructions wfl programs compiled binary executables like mcp subject wfl used high-level system operations running tasks moving copying files providing high-level recoverability thus general purpose language would use general computations open close files check attributes example however read change contents wfl – general purpose language invoke task wfl wfl high-level algol-like readable syntax none low-level assembler-like commands jcl like codice_1 etc order connect hardware devices open files programs wfl constructs deal high-level abstractions tasks files parameters also real hll parameters 1 2 ... style position parameters shell scripts wfl also instruction block command used give operators instructions needed run current job instructions displayed using 'ib operator command wfl compiled language medium systems os interfaces may change release release medium systems wfl code included copy source object file upon executing wfl job would check determine object compatible os version would trigger recompile object using source embedded object code | [
512,
1952,
8001,
1702,
7983,
2002,
5714,
9780,
5397,
10387,
3323
] | None |
4,901 | 7 | Google_Fusion_Tables:google fusion tables google fusion tables simply fusion tables web service provided google data management fusion tables used gathering visualising sharing data tables data stored multiple tables internet users view download website launched june 2009 announced alon halevy rebecca shapley web service provides means visualizing data pie charts bar charts lineplots scatterplots timelines geographical maps data exported comma-separated values file format service described scientific paper 2010 size uploaded data set limited 250 mb total limit 1 gb per user 2011 upgrade google docs fusion tables became default feature title tables beta december 2018 google announced would retire fusion tables 3 december 2019 | [
4096,
1409,
4995,
5892,
8455,
7816,
9610,
5262,
8719,
3600,
6800,
5522,
1427,
5524,
7700,
10645,
11408,
10009,
8858,
1435,
9244,
10393,
798,
10525,
288,
7841,
2978,
10020,
1959,
3499,
7595,
10284,
10286,
3633,
1203,
5431,
2875,
10045,
7359,... | None |
4,902 | 2 | Direct_Rendering_Infrastructure:direct rendering infrastructure direct rendering infrastructure dri framework allowing direct access graphics hardware x window system safe efficient way main use dri provide hardware acceleration mesa implementation opengl dri also adapted provide opengl acceleration framebuffer console without display server running dri implementation scattered x server associated client libraries mesa 3d direct rendering manager kernel subsystem source code free software classic x window system architecture x server process exclusive access graphics hardware therefore one actual rendering framebuffer x clients communicate x server dispatch rendering commands commands hardware independent meaning x11 protocol provides api abstracts graphics device x clients n't need know worry specifics underlying hardware hardware specific code lives inside device dependent x part x server manages type video card graphics adapter also often called video graphics driver rise 3d rendering shown limits architecture 3d graphics applications tend produce large amounts commands data must dispatched x server rendering amount inter-process communication ipc x client x server increased 3d rendering performance suffered point x driver developers concluded order take advantage 3d hardware capabilities latest graphics cards new ipc-less architecture required x clients direct access graphics hardware rather relying third party process saving ipc overhead approach called direct rendering opposed indirect rendering provided classical x architecture direct rendering infrastructure initially developed allow x client perform 3d rendering using direct rendering approach nothing prevents dri used implement accelerated 2d direct rendering within x client simply one need 2d indirect rendering performance good enough basic architecture direct rendering infrastructure involves three main components original dri architecture due memory size video cards time single instance screen front buffer back buffer also ancillary depth buffer stencil buffer shared dri clients x server rendered directly onto back buffer swapped front buffer vertical blanking interval time order render back buffer dri process ensure rendering clipped area reserved window synchronization x server done signals shared memory buffer called sarea access drm device exclusive dri client lock beginning rendering operation users device —including x server— blocked meantime wait lock released end current rendering operation even would n't conflict operations another drawback operations n't retain memory allocations current dri process released lock device data uploaded graphics memory textures lost upcoming operations causing significant impact graphics performance nowadays dri1 considered completely obsolete must used due increasing popularity compositing window managers like compiz direct rendering infrastructure redesigned x clients could also support redirection offscreen pixmaps direct rendering regular x clients already respected redirection separate pixmap provided x server render target —the so-called offscreen pixmap— dri clients continued rendering directly shared backbuffer effectively bypassing compositing window manager ultimate solution change way dri handled render buffers led completely different dri extension new set operations also major changes direct rendering manager new extension named dri2 although later version different extension even compatible original dri —in fact coexisted within x server long time dri2 instead single shared back buffer every dri client gets private back buffer —along associated depth stencil buffers— render window content using hardware acceleration dri client swaps false front buffer used compositing window manager one sources compose build final screen back buffer swapped vblank interval real front buffer handle new buffers direct rendering manager incorporate new functionality specifically graphics memory manager dri2 initially developed using experimental ttm memory manager later rewritten use gem chosen definitive drm memory manager new dri2 internal buffer management model also solved two major performance bottlenecks present original dri implementation dri2 allocation private offscreen buffers back buffer fake front buffer depth buffer stencil buffer ... window done x server dri clients retrieve buffers rendering window calling operations available dri2 extension internally dri2 uses gem names —a type global handle provided gem api allows two processes accessing drm device refer buffer— passing around references buffers thought x11 protocol reason x server charge buffer allocation render buffers window glx extension allows multiple x clients opengl rendering cooperatively window way x server manages whole lifecycle render buffers along entire rendering process knows safely recycle discard window resize performed x server also responsible allocating new render buffers matching new window size notifying change dri client rendering window using invalidatebuffers event would retrieve gem names new buffers dri2 extension provides core operations dri clients finding drm device driver use getting authenticated x server order able use rendering buffer facilities drm device presentation rendered buffers screen performed using requests used copy fake front buffer real front buffer n't provide synchronization vertical blanking interval cause tearing hand performs vblank-synchronized swap back front buffer supported buffers size copy blit otherwise although dri2 significant improvement original dri new extension also introduced new issues 2013 third iteration direct rendering infrastructure known dri3 developed order fix issues main differences dri3 compared dri2 buffer allocation client side breaks glx assumptions sense longer possible multiple glx applications render cooperatively window plus side fact dri client charge buffers throughout lifetime brings many advantages example easy dri3 client ensure size render buffers always match current size window thereby eliminate artifacts due lack synchronization buffer sizes client server plagued window resizing dri2 better performance also achieved dri3 clients save extra round trip waiting x server send render buffers dri3 clients especially compositor window managers take advantage keeping older buffers previous frames reusing basis render damaged parts window another performance optimization dri3 extension longer needs modified support new particular buffer formats since handled directly dri client driver drm kernel driver use file descriptors hand allows kernel perform safe cleanup unused gem buffer object —one reference technically dri3 consists two different extensions dri3 extension present extension main purpose dri3 extension implement mechanism share direct rendered buffers dri clients x server dri clients allocate use gem buffers objects rendering targets x server represents render buffers using type x11 object called pixmap dri3 provides two operations one create pixmap x server space gem buffer object dri client space reverse get gem buffer object x pixmap dri3 operations gem buffer objects passed dma-buf file descriptors instead gem names dri3 also provides way share synchronization objects dri client x server allowing serialized access shared buffer unlike dri2 initial operation —the first every dri client must request know drm device use— returns already open file descriptor device node instead device node filename required authentication procedure already performed advance x server dri3 provides mechanism show rendered buffers screen relies another extension present extension present named main task present buffers screen meaning handles update framebuffer using contents rendered buffers delivered client applications screen updates done proper time normally vblank interval order avoid display artifacts tearing present also handles synchronization screen updates vblank interval also keeps x client informed instant buffer really shown screen using events client synchronize rendering process current screen refresh rate present accepts x pixmap source screen update since pixmaps standard x objects present used dri3 clients performing direct rendering also x client rendering pixmap means example existing non-gl based gtk+ qt applications used double buffered pixmap rendering using xrender present extension also used applications achieve efficient non-tearing screen updates reason present developed separate standalone extension instead part dri3 apart allowing non-gl x clients synchronize vblank present brings advantages dri3 graphics performance better present efficient dri2 swapping buffers number opengl extensions n't available dri2 supported based new features provided present present provides two main operations x clients update region window using part contents pixmap set type presentation events related certain window client wants notified three presentation events window notify x client ongoing presentation operation —normally call — completed pixmap used operation ready reused window configuration —mostly window size— changes whether operation performs direct copy blit onto front buffer swap entire back buffer front buffer internal detail present extension implementation instead explicit choice x client dri2 several open source dri drivers written including ones ati mach64 ati rage128 ati radeon 3dfx voodoo3 voodoo5 matrox g200 g400 sis 300-series intel i810 i965 s3 savage via unichrome graphics chipsets nouveau nvidia graphics vendors written closed-source dri drivers including ati kyro various versions dri implemented various operating systems amongst others linux kernel freebsd netbsd openbsd opensolaris project started jens owen kevin e. martin precision insight funded silicon graphics red hat first made widely available part xfree86 4.0 part x.org server currently maintained free software community work dri2 started 2007 x developers summit kristian høgsberg proposal høgsberg wrote new dri2 extension modifications mesa glx march 2008 dri2 mostly done could n't make x.org server version 1.5 wait version 1.6 february 2009 dri2 extension officially included x11r7.5 release october 2009 first public version dri2 protocol 2.0 announced april 2009 since several revisions recent version 2.8 july 2012 due several limitations dri2 new extension called dri-next proposed keith packard eric anholt x.org developer conference 2012 extension proposed dri3000 linux.conf.au 2013 dri3 present extensions developed 2013 merged x.org server 1.15 release december 2013 first version dri3 protocol 1.0 released november 2013 | [
9604,
2955,
7309,
7442,
6813,
10016,
10658,
6694,
2730,
3883,
8621,
7983,
1842,
5171,
6069,
823,
11322,
700,
10176,
10051,
8266,
3033,
3162,
10971,
9054,
9567,
11487,
11363,
8685,
9455,
2804,
8438,
2045
] | None |
4,903 | 4 | Eva_Galperin:eva galperin eva galperin director cybersecurity electronic frontier foundation eff technical advisor freedom press foundation noted extensive work protecting global privacy free speech research malware nation-state spyware galperin became interested computers early age father computer security specialist 12 created desktop unix/solaris computer became active usenet discussion areas science fiction novels playing interactive text games later became active web development attended college san francisco state university political science international relations working unix system administrator various companies silicon valley galperin joined eff 2007 prior eff worked center us-china policy studies helped organize conferences researched chinese energy policy eff led threat lab project promoted eff director cybersecurity 2017 since 2018 focused eradication stalkerware spyware used domestic abuse industry working victims stalkerwares malicious applications marketed abusive spouses overbearing parents stalkers installed secretly mobile devices allowing owners monitor targets activities april 2019 convinced anti-virus provider kaspersky lab begin explicitly alerting users security threats upon detection stalkerware company android product also asked apple allow antivirus applications marketplace like kaspersky alert users mobile devices jailbroken rooted galperin stated due competition cybersecurity companies prompted follow suit meet heightened standard also called u.s. state federal officials arrest prosecute executives companies developing selling stalkerwares charges hacking | [
7809,
2634,
9227,
8172,
5492,
3350,
10392,
7515,
3996
] | Test |
4,904 | 4 | UK_Cyber_Security_Forum:uk cyber security forum uk cyber security forum social enterprise spanning united kingdom representing small medium-sized enterprises smes uk cyber sector divided 20 regional cyber clusters provide free membership events members forms part uk cyber security community forum praised uk government helping address cyber skills gap faced u.k concept providing regional cyber security clusters later supported laid u.k government cyber security strategy late 2014 national news reported effectiveness forum especially terms aiding collaboration uk cyber companies considerable coverage certain cyber clusters london cyber cluster featured heavily media currently 20 official cyber clusters u.k supported u.k government | [
6648,
2558,
10823
] | Validation |
4,905 | 2 | SubOS:subos computing subos may mean several related concepts | [
4972
] | None |
4,906 | 2 | WebSphere_Application_Server_for_z/OS:websphere application server z/os ibm websphere application server z/os one platform implementations ibm websphere application server family latest version version 9.0 open standard interfaces supported common across platforms provided version release levels aligned however functional implementation open standard specification line differs platforms allows specific attributes platform exploited without jeopardizing common programming interface specification level websphere application server z/os v7 product code directly exploit following attributes platform version 7.0 websphere application server z/os provides five functions informally known zdiff functions represent specific exploitation z/os platform functions websphere application server z/os v8 introduced ability configure application server behavior request level rather server level function built upon existing wlm classification file used assign wlm transaction classes identified requests v8 provided additional xml tags assign server behavior requests identified xml following xml tags apply different behavior may v8 apply identified individual requests websphere application server version 8.5 announced april 24 2012 component v8.5 liberty profile runtime model composable web container server runtime dynamic update capabilities liberty profile z/os several extensions designed take advantage specific z/os platform functions extensions br | [
4913,
2168,
7162,
3323,
3966
] | Test |
4,907 | 6 | Modes_(Unix):modes unix modes file system permissions given user group others classes access files unix shown listing files long format access control lists use using getfacl modes changed chmod traditional unix permissions setfacl access control lists traditional unix permissions symbolic mode composed three components combined form single string text references classes used distinguish users permissions apply references specified defaults except references explicitly specified final outcome masked umask value references represented one following letters chmod program uses operator specify modes file adjusted following operators accepted modes indicate permissions granted taken away specified classes three basic modes correspond basic permissions combination three components produces string understood chmod command multiple changes specified separating multiple symbolic modes commas example following command would used add read write permissions user group classes file directory named sample command removes permissions allowing one read write execute file named sample following command changes permissions user group read execute write permission sample | [
5120,
6669,
3598,
10257,
6677,
5142,
8214,
9762,
5158,
11323,
8772,
4708,
9836,
7789,
9333,
6263,
9335,
9343,
7818,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
5286,
10405,
7344,
2230,
5816,
1212,
8380,
10951,
9420,
3795,
4819,
8404,
... | Test |
4,908 | 2 | Nintendo_Switch_system_software:nintendo switch system software nintendo switch system software updatable firmware operating system used nintendo switch video game console nintendo released limited information switch internals public computer security researchers well developers nintendo 3ds emulator citra analyzed operating system found operating system internal name horizon evolution nintendo 3ds system software implements microkernel architecture drivers run userspace including nvidia driver security researchers described “ kind similar linux driver ” graphics driver features undocumented thin api layer called nvn “ kind like vulkan ” userspace processes use address space layout randomization sandboxed according nintendo switch system software licensing information code freebsd kernel utilized horizon horizon utilizes several components android stagefright multimedia framework according citra authors – also begun develop switch emulator called yuzu – “ nintendo re-purposed android graphics stack used switch rendering. ” rendering web content done via webkit although end-user web browser available console thus far webkit applet still accessible connecting network requires web login webkit applet also used several operating system functions nintendo eshop unlike previous consoles nintendo purposefully designed system software minimalist possible home menu running 200 kilobytes minimalism meant improve system performance launch games faster nintendo switch home screen battery internet time information top right corner grid showing software system downloaded physical underneath shortcuts os functions nintendo eshop settings sleep mode button news function nintendo switch software allows users read gaming news advertisements provided nintendo third-party developers news also displayed system locked news interface originally available 1.0.0 version software however new headlines transmitted 2.0.0 update released 3.0.0 update revamped news system adding multiple news channels different games users subscribe news headlines appear depend channels subscribed 4.0.0 update improved news screen updating layout nintendo eshop option home menu opens webkit-based interface allows games purchased downloaded nintendo eshop album stores captured screenshots videos pressing capture button controller supported software save screenshot either microsd card system memory album allows users view screenshots taken screenshots edited adding text shared facebook twitter addition supported games holding capture button briefly save last 30 seconds video album trimmed posted online 2.0.0 update added ability post screenshots facebook twitter within system ui making easier share screenshots 4.0.0 update added support saving 30 second videos compatible games controllers menu allows controllers paired disconnected reconnected 3.0.0 update added find controllers option allows nearby controllers paired remotely turned vibrated help find lost controllers settings option allows system settings changed includes functionality creating miis initial version system software nintendo switch launch day consoles updated day one patch 3 march 2017 console launch date update added online features previously missing original software official launch date notable features update access nintendo eshop well ability add friends friends list similar nintendo 3ds october 17th 2018 custom firmware named atmosphère first released many different custom firmwares system two popular reinx sx os | [
7552,
5506,
1927,
4745,
10761,
4364,
2061,
9743,
274,
7187,
8725,
9625,
1946,
4636,
5534,
10016,
1316,
2212,
10535,
1067,
684,
1839,
7983,
11698,
11573,
1718,
1080,
5177,
5819,
9151,
9153,
3651,
7748,
10436,
11459,
9927,
9033,
8266,
8395,
... | Test |
4,909 | 3 | Instruction_window:instruction window instruction window computer architecture refers set instructions execute out-of-order speculative processor particular conventional design instruction window consists instructions re-order buffer rob processor instruction within instruction window executed operands ready out-of-order processors derive name may occur out-of-order operands younger instruction ready older instruction instruction window finite size new instructions enter window usually called dispatch allocate instructions leave window usually called retire commit instructions enter leave instruction window program order instruction leave window oldest instruction window completed hence instruction window seen sliding window instructions become out-of-order execution within window speculative i.e. side-effects applied outside cpu committed order support asynchronous exception handling like interrupts paradigm also known restricted dataflow instructions within window execute dataflow order necessarily program order window occurs restricted finite size instruction window distinct pipelining instructions in-order pipeline instruction window conventionally understood sense execute order respect one another out-of-order processors usually built around pipelines many pipeline stages e.g. front-end instruction fetch decode stages considered part instruction window | [
6926,
785,
7313,
7699,
6815,
2210,
5798,
9126,
2345,
7218,
10675,
10746,
5948,
4286,
2113,
8514,
5956,
4423,
1480,
7497,
330,
1866,
9932,
5457,
4308,
2008,
2264,
2394,
731,
2140,
4194,
11618,
5223,
2536,
8810,
4205,
8815,
6774,
7802,
508,... | Train |
4,910 | 3 | Macintosh_Plus:macintosh plus macintosh plus computer third model macintosh line introduced january 16 1986 two years original macintosh little year macintosh 512k price tag us 2599 evolutionary improvement 512k shipped 1 mb ram standard expandable 4 mb external scsi peripheral bus among smaller improvements originally generally beige-colored case original macintosh pantone 453 1987 case color changed long-lived warm gray platinum color earliest macintosh model able run system 7 os bruce webster byte reported rumor december 1985 supposedly apple releasing big mac time column sees print said mac reportedly come 1 megabyte ram ... new 128k-byte rom ... double-sided 800k bytes disk drive standard mac box introduced macintosh plus first macintosh model include scsi port launched popularity external scsi devices macs including hard disks tape drives cd-rom drives printers zip drives even monitors scsi implementation plus engineered shortly initial scsi spec finalized 100 scsi-compliant scsi ports remained standard equipment macs introduction imac 1998 replaced apple legacy ports usb macintosh plus last classic mac phone cord-like port front unit keyboard well de-9 connector mouse models released macintosh plus would use adb ports mac plus first apple computer utilize user-upgradable simm memory modules instead single dip dram chips four simm slots provided computer shipped four 256k simms 1mb total ram replacing 1mb simms possible 4mb ram although 30-pin simms could support 16mb total ram mac plus motherboard 22 address lines connected 4mb maximum new -inch double-sided 800 kb floppy drive offering double capacity floppy disks previous macs along backward compatibility then-new drive controlled iwm chip previous models implementing variable speed gcr drive still completely incompatible pc drives 800 kb drive two read/write heads enabling simultaneously use sides floppy disk thereby double storage capacity like 400 kb drive companion macintosh 800k external drive available option however increased disk storage capacity combined 2-4x available ram external drive less necessity 128k 512k mac plus 128 kb rom motherboard double amount rom previous macs roms included software support scsi then-new 800 kb floppy drive hierarchical file system hfs uses true directory structure disks opposed earlier mfs macintosh file system files stored single directory one level pseudo-folders overlaid programmers fourth inside macintosh volume details use hfs rest mac plus new system software plus still include provision internal hard drive would nine months apple would offer scsi drive replacement slow hard disk 20 would well year apple would offer first internal hard disk drive macintosh compact mac plus 512×342 pixel monochrome display resolution 72 ppi identical previous macintosh models unlike earlier macs mac plus keyboard includes numeric keypad directional arrow keys previous macs one-button mouse fan making extremely quiet operation lack cooling fan mac plus led frequent problems overheating hardware malfunctions applications macpaint macwrite bundled mac plus august 1987 hypercard multifinder also bundled third-party software applications available included macdraw microsoft word excel powerpoint well aldus pagemaker microsoft excel powerpoint originally forethought actually developed released first macintosh similarly microsoft word 1 macintosh first time gui version software introduced personal computer platform time exclusive availability excel pagemaker macintosh noticeable drivers sales platform case design essentially identical original macintosh debuted beige labeled macintosh plus front macintosh plus 1 mb back denote 1 mb ram configuration shipped january 1987 transitioned apple long-lived platinum-gray color rest apple product line keyboard keycaps changed brown gray january 1988 reduced ram prices apple began shipping 2- 4- mb configurations rebranded simply macintosh plus among design changes included trademarked inlaid apple logo recessed port icons apple iic iigs essentially retained original design upgrade kit offered earlier macintosh 128k macintosh 512k/ enhanced includes new motherboard floppy disk drive rear case owner retained front case monitor analog board macintosh plus front upgraded units apple logo recessed bottom left hand corner front case however label back case reads macintosh plus 1mb new extended plus keyboard could also purchased unfortunately upgrade cost almost much new machine mac plus upgraded use third-party accelerators clipped soldered onto 68000 processor 32 mhz 68030 processor used 16 mb ram allows run mac os 7.6.1 program available called mini vmac emulate mac plus variety platforms including unix windows dos classic mac os macos pocket pc ios even nintendo ds although mac plus would become overshadowed two new macs macintosh se macintosh ii march 1987 remained production cheaper alternative introduction macintosh classic october 15 1990 made macintosh plus longest-produced macintosh ever sale 1,734 days 2nd generation mac pro introduced december 19 2013 surpassed record september 18 2018 continued supported versions classic mac os version 7.5.5 released 1996 additionally period general market relevance heavily discounted like 512k/512k e offered educational market badged macintosh plus ed due popularity long life introduction many features would become mainstays macintosh platform years plus common base model many software hardware products lack fan could cause life macintosh plus end early users power supply would heat solder joints inside would fracture causing many problems loss deflection monitor complete loss power early compact macs problem common yoke connector flyback transformer horizontal drive coupling capacitor fan also often added reduce heat machine upgraded full ram capacity 4 mb debut macintosh 128k macintosh plus various third-party cooling add-ons available help increase airflow unit apple reorganized compact macintosh case accommodate fan release macintosh se optionally included heat-generating internal hard disk plus went two rom revisions general market relevance initial rom replaced first two months serious bug prevented mac booting external scsi device powered second revision fixed problem scsi devices could send mac endless reset post | [
1549,
3598,
7697,
4114,
6165,
11289,
7706,
8222,
1057,
6183,
1576,
4139,
7211,
1592,
8253,
576,
1090,
4180,
10838,
10840,
9312,
7269,
8806,
6258,
10357,
4220,
10365,
10878,
6783,
4741,
137,
8842,
6283,
6797,
7824,
147,
7830,
6807,
4258,
7... | Test |
4,911 | 8 | Yandex.Metrica:yandex.metrica yandex.metrica free web analytics service offered yandex tracks reports website traffic yandex launched service 2008 made public 2009 2019 yandex.metrica third widely used web analytics service web yandex.metrica uses simple javascript tag webmaster implements website tag collects audience traffic behaviour data website metrica also linked yandex.direct online advertising platform collect ads conversion rate | [
3462,
6576,
5650,
5524,
1943
] | Train |
4,912 | 4 | Lattice-based_access_control:lattice-based access control computer security lattice-based access control lbac complex access control model based interaction combination objects resources computers applications subjects individuals groups organizations type label-based mandatory access control model lattice used define levels security object may subject may access subject allowed access object security level subject greater equal object mathematically security level access may also expressed terms lattice partial order set object subject greatest lower bound meet least upper bound join access rights example two subjects b need access object security level defined meet levels b another example two objects x combined form another object z assigned security level formed join levels x lbac also known label-based access control rule-based access control restriction opposed role-based access control rbac lattice based access control models first formally defined denning 1976 see also sandhu 1993 | [
1792,
3360,
3616,
5573,
8262,
8838,
9958,
2737,
210,
8210,
10580,
7260,
2558
] | Test |
4,913 | 2 | WebSphere_Optimized_Local_Adapters:websphere optimized local adapters ibm websphere optimized local adapters ola wola functional component ibm websphere application server z/os provides efficient cross-memory mechanism calls inbound z/os outbound z/os avoids overhead communication mechanisms capable high volume exchange messages wola extension existing cross-memory exchange mechanism z/os wola providing external interface z/os address spaces outside z/os server may participate cross-memory exchanges wola supports connectivity z/os server one following cics ims batch unix systems services alcs wola first made available z/os version 7 fixpack 4 7.0.0.4 functional enhancements appeared subsequent fixpacks documented article websphere optimized local adapters z/os wola ola short origins desire provide efficient inbound calling mechanism outside java ee environment exercise java ee assets requirement particularly pronounced z/os traditional batch processing sought use growing base programming assets based java ee ejb technology inbound solutions existed example respective strengths also particular shortcomings overhead latency difficulty construction deficiencies security transaction propagation model original design point optimized local adapters architects solution extended design include bi-directional invocations inbound z/os external address space outbound external address space architects solution chose leverage existing element z/os design called local communications cross-memory mechanism used websphere application server z/os since v4.x days optimized iiop traffic application servers lpar ola essentially externalization existing cross-memory mechanism address spaces outside z/os may connect exchange messages across shared memory space external address space programs access ola interface using set supplied apis java programs running z/os access ola interface implementation packaged standard jca resource adapter currently supported external address spaces supported z/os ola programming languages supported external address spaces java programming language used access z/os ola inside java ee containers z/os ibm websphere optimized adapters function support updated new versions fixpacks released function first made available z/os version 7 release 0 fixpack 4 level 7.0.0.4 wola introduced fixpack 4 z/os version 7 release 0 product application maintenance resulted new directory product file system provided wola modules shared objects jca resource adapter development class libraries shell script olainstall.sh created necessary unix symbolic links runtime environment product install file system functional supported offered 7.0.0.4 release fixpack 12 z/os version 7 release 0 provided two updates wola support websphere application server z/os version 8 release 0 continued support websphere optimized local adapters wola shipped incorporated product meant running olainstall.sh longer required create unix symbolic links product files addition following function updates provided function provides means detecting loss data resource attached jca connection factory automatically failing defined alternate jndi detection primary data resource recovery failback also element functional design resource failover design present websphere application server version 8 across platforms jdbc jca z/os version 8 provides support wola resource failover part general support jca resource failover invocation failover occurs configurable threshold number getconnection failures occur failover invoked new getconnection requests routed alternate connection factory connection pool failback occurs z/os determines failed primary data resource returned new getconnection requests processed primary connection factory common usage pattern function outbound cics target cics region routing region failover function provides ability architect multiple routing regions loss single routing region affect overall availability cics overall several connection pool custom properties added support resource failover failback mechanism note connection pool custom properties exist function search string cdat_dsfailover z/os infocenter complete listing note z/os 8.5.0.0 provides wola support functionally identical 8.0.0.1 fixpack 1 websphere application server z/os version 8 provided following functional updates wola prior 8.0.0.1 native api modules supplied 31-bit callable format modules four-character prefix bboa* associated module name 8.0.0.1 31-bit 64-bit callable api modules provided 31-bit modules retain four-character prefix bboa* module name 64-bit modules carry four-character prefix bbga* module name number apis remains 13 specific apis usage infocenter search cdat_olaapis z/os v7 wola support smf limited inbound calls inbound wola calls target ejbs z/os container identified iiop calls captured smf iiop calls indistinguishable iiop call normal z/os smf 120 subtype 9 record 120.9 shorthand notation used capture inbound call information z/os 8.0.0.0 smf 120.9 record capture function modified identify inbound wola calls separate inbound iiop calls z/os 8.0.0.1 smf 120.10 record created capture information outbound calls z/os smf 120.10 record eight sections one record created outbound request infocenter search rtrb_smfsubtype10 functional update provides ability distribute outbound calls across multiple external address spaces registered given z/os server using registration name common usage pattern would multiple cics regions stateless target program service deployed new environment variable created indicate type work distribution desired following illustrates usage function infocenter search cdat_olacustprop cross-memory nature wola communications implies z/os server external address space must z/os logical partition lpar z/os 8.0.0.1 provides proxy function allow wola callers wola targets located separately includes location operating system instances z/os function two formats proxy support outbound calls proxy support inbound calls provides mechanism java applications may use supplied wola jca resource adapter access target address space remote z/os example usage pattern would development test proposed application access cross-memory wola connection target z/os system provided supplied wola proxy application installed z/os server enabled wola following picture illustrates topology network flow application z/os system way iiop wola connection factory informed iiop flow proxy way several new custom properties connection pool proxy application z/os receives call forwards actual cross-memory wola connection named target service topology limitations compared outbound wola calls z/os lpar global transactions requiring two-phase commit propagated across iiop connection wola proxy user identity thread asserted target service z/os provides mechanism non-java applications external address space may make inbound calls target wola-enabled ejb remote instance either another z/os lpar distributed platform supplied wola proxy application installed local z/os instance required handle initial cross-memory wola call forward named target ejb remote instance following picture illustrates topology target wola-enabled ejb unaware proxy use inbound flow arrives iiop call cross-memory wola lpar used calling program must indicate flow use proxy service done parameter bboa1inv bboa1srq 2 requesttype parameter tells local proxy application treat requested service specified jndi name target ejb request invoke ejb using iiop requires local remote instances federated names spaces operate single cell jndi lookup succeed 8.0.0.3 8.5.0.1 wola support included ibm integration designer bpel processes 8.0.0.4 8.5.0.1 support updated include rrs transaction context assertion ims dependent regions wola fixpack 8.0.0.5 8.5.0.2 provided two functional enhancements 1 rrs transaction context assertion ims wola otma 2 enhanced support cics channels containers ims transaction enhanced support cics channels containers prior 8.0.0.5 8.5.0.2 cics channels containers support limited single fixed-name channel request response single container type bit char 8.0.0.5 8.5.0.2 optimized local adapters may categorized following components optimized local adapters implemented cics task related user exit true provides essential connectivity cics cross memory z/os address space addition link server task bbo link invocation task bbo supplied calls cics bbo /bbo link server task shields programming specifics cics programs ola call handled supplied tasks named cics program invoked standard exec cics link call named cics program remains unchanged unaware call came using ola target program cics must able invoked link call commarea channels/containers supported bboc transaction also supplied provide set control commands things manually start true pltpi stop true start stop link server well control management functions ola programming interface module library data set must concatenated cics region dfhrpl dd statement following picture summarizes wola cics support transaction propagation security assertion optimized local adapters implemented external subsystem ims usage supported message processing programs mpp batch message processing programs bmp ims fast path ifp batch dl/i applications calls ims use external subsystem attach facility esaf interface used subsystems db2 mq calls ims dependent region may done using otma directly program ims uses ola apis host service described otma provides ola transparency ims applications cost overhead using ola apis ims application reduces overhead results better performance throughput programming apis ims format syntax introduced originally updated aware ims running use esaf ola.rar file implements jca resource adapter must one shipped fixpack 7.0.0.12 later use ims method parameters updated ims support update made available re-installing ola.rar comes 7.0.0.12 following picture summarizes wola ims support transaction propagation security assertion external address space accesses ola mechanism supplied interface modules documented apis 13 apis present time categorized java programs running z/os environment wishing target invocation outside must implement ola interface stateless session bean using ola class files supplied development tooling support java program wishing initiate ola call outbound may implemented either servlet ejb java program codes supplied jca resource adapter ola.rar using class files supplied development tooling support external address spaces target outbound call must state ready accept call two basic models exist apis support modes synchronous provides simpler programming model program control returned calling program response received asynchronous provides architect opportunity process work without wait response coming back long running target process possible design ola-specific programming artifacts serve bridges ola interface existing assets serves minimize impact existing programming assets limits degree platform lock 13 apis categorized following categories infocenter full write-up along parameter lists return code rc reason codes rsn search cdat_olaapis common inbound api usage model would case bboa1reg api used register websphere application server z/os daemon group cell short name multiple invocations bboa1inv used invoke target ejb bboa1inv synchronous program control held ejb returns response api useful calling program knows size response message advance response message size unknown time call primitive apis bboa1srq send request bboa1rcl get response length bboa1get get message data would appropriate calling program determines finished work uses bboa1urg unregister daemon group target java program longer response interval asynchronous model likely better following picture illustrates asynchronous call would done using known primitive api bboa1srq async=1 parameter set picture illustrates asynchronous mode allows non-java program get control processing implies checking response future point bboa1rcl used purpose example bboa1rcl issued synchronously parameter async=0 response available bboa1rcl provide length program control returns program response available bboa1rcl holds program control one available bboa1rcl async=1 return x'ffffffff response available program control returned immediately illustrations outbound may found wp101490 document found ibm techdocs website note outbound cics would require api coding case supplied bbo /bbo link server transactions would processing link server transactions host service using internal constructs similar bboa1srv api outbound batch program would require use apis host service optimized local adapters support two-phase commit 2pc processing cics inbound advent maintenance 7.0.0.12 optimized local adapters also support two-phase commit outbound cics prior 7.0.0.12 transactional support cics limited sync return ims support transactional assertion inbound ims dependent regions provided fixpack 8.0.0.4 8.5.0.1 transaction assertion outbound ims wola/otma provided fixpack 8.0.0.5 transactional propagation supported inbound outbound batch uss airlines line control optimized local adapters capable asserting identity following circumstances z/os optimized local adapters used within given lpar cross-memory mechanism go lpars machine br | [
9988,
4906,
11024,
1235,
8502,
3323,
5598
] | None |
4,914 | 2 | Multiple_Independent_Levels_of_Security:multiple independent levels security multiple independent levels security/safety mils high-assurance security architecture based concepts separation controlled information flow implemented separation mechanisms support untrusted trustworthy components ensuring total security solution non-bypassable evaluatable always invoked tamperproof mils solution allows independent evaluation security components trusted composition mils builds older bell la padula theories secure systems represent foundational theories dod orange book mils system employs one separation mechanisms e.g. separation kernel partitioning communication system physical separation maintain assured data process separation mils system supports enforcement one application/system specific security policies authorizing information flow components security domain trustworthy security monitors e.g. access control guards downgraders crypto devices etc. properties convenient acronym characteristics neat 'trustworthy means component certified satisfy well defined security policies level assurance commensurate level risk component e.g. single level access control guards evaluated cc separation mechanisms evaluated high robustness two-level separation guards type crypto mils system 'untrusted means confidence system meets specification respect security policy following companies mils separation kernel products companies separation methods creating mils products | [
5247,
4067,
3652,
1350,
8904,
2761,
4875,
10962,
10170,
5373,
2975
] | None |
4,915 | 4 | Covenant_Aviation_Security:covenant aviation security covenant aviation security llc cas chicago company provides security services aviation industry michael bolles president since july 2012 covenant aviation security provides airport security services transportation security administration screening partnership program spp 2002 cas awarded multiple contracts providing commercial screening services tsa privatization pilot program initiated aviation transportation security act cas mobilized hired 1,200 screening personnel san francisco international airport tupelo regional airport within six weeks contract award 2005 cas awarded screening contract sioux falls regional airport first airport de-federalize workforce spp 2005 u.s. department homeland security designated cas airport passenger baggage screening services anti-terrorist technology support anti-terrorism fostering effective technologies act 2002 also year cas awarded screening contract sioux falls international airport fsd cas provides security services john f. kennedy international airport laguardia airport orlando international airport san francisco international airport security services include limited following passenger baggage screening direct access control personnel screening cargo screening cctv monitoring report management security assessments operate screening equipment x-ray explosive trace detection walk-through metal detector hand-held metal detector monitoring perimeter intrusion detection systems clients include federal government tsa port airport authorities select airlines covenant one largest providers security screening contract tsa screening partnership program tsa since awarded contracts nine airports formerly contracted covenant companies american association airport executives aaae – aaae world largest professional organization airport executives representing thousands airport management personnel public-use commercial general aviation airports aaae members represent 850 airports hundreds companies organizations support airports aaae serves membership results-oriented representation washington d.c. delivers wide range industry services professional development opportunities including training meetings conferences highly respected accreditation program airports council international – north america aci-na – aci-na represents local regional state governing bodies operate commercial airports united states canada aci-na members enplane 95 percent domestic virtually international airline passenger cargo traffic north america mission aci-na advocate policies provide services strengthen ability commercial airports serve passengers customers communities national safe skies alliance safeskies national safe skies alliance inc. safe skies non-profit organization works airports government industry maintain safe effective aviation security system since 1997 trusted resource decision makers seeking impartial information airport security technologies procedures november 2006 report department homeland security office inspector general found tsa officials collaborated cas san francisco international airport tip cas screeners undercover tests tests whether screeners properly inspecting passengers carry-on luggage security checkpoints august 2003 may 2004 precise physical descriptions undercover personnel way test checkpoints communicated screeners according san francisco chronicle report stated tsa officials covenant managers airport notified screening personnel advance tester approaching checkpoint provided descriptions officials airport screening control center tracked undercover testers surveillance cameras foot report said 'broadcast descriptions locations testers checkpoints assist supervisors identifying testers facilitate passing covert penetration tests article newspaper wrongful firing lawsuit related events reported according allegations lawsuit posing passengers decoys try take dummy bombs unloaded guns contraband airport security checkpoints lawsuit said covenant tracked decoys via closed-circuit television cameras tipped workers security gates expect test handing descriptions stopped january 2005 screeners still alerted whenever undercover operations undertaken despite report cas rehired 314 million four-year contract airport employees firm tsa disciplined none lost jobs occurrence security warned test reported orlando international airport regular warning different descriptions undercover agents time mississippi representative bennie thompson said report troubling observing public expected confidence screening systems managers game system november 2010 fox news reported representative john mica r-fla pushing airports use private contractors lieu tsa since 2006 received 1,700 gerald berry campaign contributions mica spokesman said contributions improperly influenced mica | [] | None |
4,916 | 3 | University_of_Edinburgh_School_of_Informatics:university edinburgh school informatics school informatics academic unit university edinburgh scotland responsible research teaching outreach commercialisation informatics created 1998 former department artificial intelligence centre cognitive science department computer science along artificial intelligence applications institute aiai human communication research centre research school informatics draws multiple disciplines school particularly known research areas artificial intelligence computational linguistics systems biology mathematical logic theoretical computer science also contributes many areas informatics school ranked 15th world latest 2014 research excellence framework ref successor research assessment exercise rae ranking school informatics ranked 12th world qs world university rankings 2014 school informatics awarded 5*a uk hefce 2001 rae computer science department country achieve highest possible rating 2008 rae school quality profile 35/50/15/0/0 means 100 full-time equivalent fte staff research outputs evaluated 35 found world-leading 4* 50 internationally excellent 3* figures interpreted number ways place school first volume tied second following cambridge 45/45/10/0/0 percentage research rated 3* 4* school generally considered world-leading standing foremost u.s. institutes particularly areas artificial intelligence natural language processing machine translation theoretical computer science school seven research institutes anc investigates theoretical empirical study brain processes artificial learning systems drawing neuroscience cognitive science computer science computational science mathematics statistics centre intelligent systems applications cisa basic applied research development knowledge representation reasoning artificial intelligence applications institute aiai technology transfer organisation promotes benefits application artificial intelligence research commercial industrial government organisations worldwide ilcc performs research aspects natural language processing drawing machine learning statistical modeling computational psychological linguistic theories communication among humans humans machines using text speech modalities icsa performs research architecture engineering future computing systems performance scalability innovative algorithms architectures compilers languages protocols ipab links computational action perception representation transformation generation processes real virtual worlds statistical machine learning computer vision mobile humanoid robotics motor control graphics visualization lfcs develops applies foundational understanding computation communication formal models mathematical theories software tools senior academic staff include alumni school informatics include edinburgh cowgate fire december 2002 destroyed number buildings including 80 south bridge housed around one third school renowned ai library space quickly made available university appleton tower replacement june 2008 school dispersed five sites three george square campus appleton tower buccleuch place forrest hill two king buildings james clerk maxwell building darwin building june july 2008 school research moved new home informatics forum building interaction designed bennetts associates reaich hall buro happold houses 500 researchers including staff graduate students construction began october 2005 forum completion july 2008 finally brought school researchers together one roof ten years inception august 2018 school gained another research space form bayes centre purpose-built data science artificial intelligence hub shared multiple data science informatics groups well university maxwell graduate institute encompassing phd research output mathematics departments edinburgh heriot-watt university | [
10049,
1890,
6306,
996,
9535,
6662,
10116,
4392,
5384,
8562,
9492,
10102,
5947,
415
] | None |
4,917 | 8 | Hitbox_(web_analytics):hitbox web analytics hitbox popular web counter web analytics product created websidestory taken omniture subsequently taken adobe originally adult entertainment websites widely used commercial organizations across variety industrial sectors complete integrated metrics solution monitoring web traffic driving marketing adobe plans completely phase moving clients flagship product sitecatalyst companies place javascript files web servers linked html script page code combination two makes request data collection servers page viewed user cookie placed users computer contains unique id unique id passed request data collection servers processing data hitbox ties together page views get perspective user moved site custom information passed request well information http header browser referrer browser details web analytics services declared spyware several anti-spyware organizations | [
3462,
10604,
6576,
8914,
2899,
119,
10392
] | None |
4,918 | 5 | Flow_control_(data):flow control data data communications flow control process managing rate data transmission two nodes prevent fast sender overwhelming slow receiver provides mechanism receiver control transmission speed receiving node overwhelmed data transmitting node flow control distinguished congestion control used controlling flow data congestion actually occurred flow control mechanisms classified whether receiving node sends feedback sending node flow control important possible sending computer transmit information faster rate destination computer receive process happen receiving computers heavy traffic load comparison sending computer receiving computer less processing power sending computer stop-and-wait flow control simplest form flow control method message broken multiple frames receiver indicates readiness receive frame data sender waits receipt acknowledgement ack every frame specified time called time receiver sends ack let sender know frame data received correctly sender send next frame ack frame ack lost transmission frame re-transmitted re-transmission process known arq automatic repeat request problem stop-and wait one frame transmitted time often leads inefficient transmission sender receives ack transmit new packet time sender channel unutilised pros advantage method flow control simplicity cons sender needs wait ack every frame transmits source inefficiency particularly bad propagation delay much longer transmission delay stop wait also create inefficiencies sending longer transmissions longer transmissions sent likely chance error protocol messages short errors likely detected early inefficiency created single messages broken separate frames makes transmission longer method flow control receiver gives transmitter permission transmit data window full window full transmitter must stop transmitting receiver advertises larger window sliding-window flow control best utilized buffer size limited pre-established typical communication sender receiver receiver allocates buffer space n frames n buffer size frames sender send receiver accept n frames without wait acknowledgement sequence number assigned frames order help keep track frames receive acknowledgement receiver acknowledges frame sending acknowledgement includes sequence number next frame expected acknowledgement announces receiver ready receive n frames beginning number specified sender receiver maintain called window size window less equal buffer size sliding window flow control far better performance stop-and-wait flow control example wireless environment data rates low noise level high waiting acknowledgement every packet transferred feasible therefore transferring data bulk would yield better performance terms higher throughput sliding window flow control point point protocol assuming entity tries communicate current data transfer complete window maintained sender indicates frames send sender sends frames window waits acknowledgement opposed acknowledging every frame sender shifts window corresponding sequence number thus indicating frames within window starting current sequence number sent automatic repeat request arq algorithm used error correction negative acknowledgement nak causes retransmission word error well next n–1 words value n usually chosen time taken transmit n words less round trip delay transmitter receiver back therefore buffer needed receiver normalized propagation delay tp length l propagation velocity v tt bitrate r framerate f get utilization must define window size n n greater equal 2a 1 utilization 1 full utilization transmission channel less 2a 1 equation must used compute utilization selective repeat connection oriented protocol transmitter receiver window sequence numbers protocol maximum number messages sent without acknowledgement window becomes full protocol blocked acknowledgement received earliest outstanding message point transmitter clear send messages section geared towards idea comparing stop-and-wait sliding window subsets go back n selective repeat error free formula_1 errors formula_2 define throughout average number blocks communicated per transmitted block convenient calculate average number transmissions necessary communicate block quantity denote 0 determine equation formula_3 transmit flow control may occur transmission rate may controlled network dte requirements transmit flow control occur independently two directions data transfer thus permitting transfer rates one direction different transfer rates direction transmit flow control flow control performed common rs-232 pairs control lines usually referred hardware flow control hardware flow control typically handled dte master end first raising asserting line command side example hardware flow control half-duplex radio modem computer interface case controlling software modem computer may written give priority incoming radio signals outgoing data computer paused lowering cts modem detects reception conversely xon/xoff usually referred software flow control open-loop flow control mechanism characterized feedback receiver transmitter simple means control widely used allocation resources must prior reservation hop-to-hop type open-loop flow control inherent problems maximizing utilization network resources resource allocation made connection setup using cac connection admission control allocation made using information already old news lifetime connection often over-allocation resources reserved unused capacities wasted open-loop flow control used atm cbr vbr ubr services see traffic contract congestion control open-loop flow control incorporates two controls controller regulator regulator able alter input variable response signal controller open-loop system feedback feed forward mechanism input output signals directly related increased traffic variability also lower arrival rate system higher loss rate open control system controllers operate regulators regular intervals assurance output variable maintained desired level may cheaper use model open-loop model unstable closed-loop flow control mechanism characterized ability network report pending network congestion back transmitter information used transmitter various ways adapt activity existing network conditions closed-loop flow control used abr see traffic contract congestion control transmit flow control described form closed-loop flow control system incorporates basic control elements sensor transmitter controller regulator sensor used capture process variable process variable sent transmitter translates variable controller controller examines information respect desired value initiates correction action required controller communicates regulator action needed ensure output variable value matching desired value therefore high degree assurance output variable maintained desired level closed-loop control system feedback feed forward system feedback closed-loop system feed-back mechanism directly relates input output signals feed-back mechanism monitors output variable determines additional correction required output variable value fed backward used initiate corrective action regulator control loops industry feedback type feed-forward closed loop system measured process variable input variable measured signal used fashion feedback system closed-loop model produces lower loss rate queuing delays well results congestion-responsive traffic closed-loop model always stable number active lows bounded sliding window | [
1154,
1541,
1030,
3847,
2327,
5529,
5146,
5531,
2203,
9251,
10924,
5945,
7865,
9020,
5439,
5825,
835,
1478,
10696,
5071,
2640,
4692,
1893,
2793,
10864,
5118
] | Test |
4,919 | 6 | Apache_Subversion:apache subversion apache subversion often abbreviated svn command name svn software versioning revision control system distributed open source apache license software developers use subversion maintain current historical versions files source code web pages documentation goal mostly compatible successor widely used concurrent versions system cvs open source community used subversion widely example projects apache software foundation free pascal freebsd gcc sourceforge codeplex previously common host subversion repositories subversion created collabnet inc. 2000 top-level apache project built used global community contributors collabnet founded subversion project 2000 effort write open-source version-control system operated much like cvs fixed bugs supplied features missing cvs 2001 subversion advanced sufficiently host source code february 2004 version 1.0 released november 2009 subversion accepted apache incubator marked beginning process become standard top-level apache project became top-level apache project february 17 2010 release dates extracted apache subversion codice_1 file records release history subversion offers two types repository storage original development subversion used berkeley db package subversion limitations berkeley db usage program accesses database crashes terminates forcibly data loss corruption occurs repository remains offline berkeley db replays journal cleans outstanding locks safest way use subversion berkeley db repository involves single server-process running one user instead shared filesystem 2004 new storage subsystem developed named fsfs works faster berkeley db backend directories large number files takes less disk space due less logging beginning subversion 1.2 fsfs became default data store new repositories etymology fsfs based subversion use term filesystem repository storage system fsfs stores contents directly within operating system filesystem rather structured system like berkeley db thus subversion filesystem atop filesystem new file system called fsx development remove limitations fsfs version 1.9 considered production-ready access subversion repositories take place three means access fsfs berkeley db repositories 1.x version client work 1.x server newer clients servers additional features performance capabilities fallback support older clients/servers internally subversion system comprises several libraries arranged layers performs specific task allows developers create tools desired level complexity specificity one view subversion filesystem two-dimensional two coordinates used unambiguously address filesystem items revision subversion filesystem root used access contents revision files stored links recent change thus subversion repository quite compact system consumes storage space proportional number changes made number revisions subversion filesystem uses transactions keep changes atomic transaction operates specified revision filesystem necessarily latest transaction root changes made either committed becomes latest revision aborted transaction actually long-lived filesystem object client need commit abort transaction rather also begin transaction exit re-open transaction continue using potentially multiple clients access transaction work together atomic change though existing clients expose capability one important feature subversion filesystem properties simple name value pairs text properties occur filesystem entries i.e. files directories versioned like changes filesystem subversion client reserves 'svn prefix built-in properties names used define custom properties subversion also uses properties revisions like properties filesystem entries names completely arbitrary subversion client using certain properties prefixed 'svn however properties versioned changed later allowed pre-revprop-change hook subversion uses inter-file branching model perforce implement branches tagging branch separate line development tagging refers labeling repository certain point time easily found future subversion difference branches tags used new branch tag set using svn copy command used place native operating system mechanism copied directory linked original repository preserve history copy takes little extra space repository versions branch maintain history file point copy plus changes made since one merge changes back trunk branches known problem subversion affects implementation file directory rename operation subversion implements renaming files directories copy new name followed delete old name names change data relating edit history remains subversion still use old name older revisions tree however subversion may become confused move conflicts edits made elsewhere regular commits merging branches subversion 1.5 release addressed scenarios others remained problematic subversion 1.8 release addressed problems making moves first-class operation client still treated copy+delete repository subversion lacks repository-administration management features instance someone may wish edit repository permanently remove historical records certain data subversion built-in support achieve simply subversion stores additional copies data local machine become issue large projects files developers work multiple branches simultaneously versions prior 1.7 .svn directories client side could become corrupted ill-advised user activity like global search/replace operations starting version 1.7 subversion uses single centralized .svn folder per working area subversion store modification times files file checked subversion repository 'current date instead modification time repository file checked repository date check-in instead modification time file checked might always wanted mitigate third-party tools exist allow preserving modification time filesystem meta-data however giving checked files current date important well — tools like make 1 take notice changed file rebuilding subversion uses centralized revision control model ben collins-sussman one designers subversion believes centralised model would help prevent insecure programmers hiding work team members users version control systems see centralised model detrimental famously linus torvalds attacked subversion model developers subversion often deal well filename normalization performed hfs+ filesystem cause problems files accented characters names added repository non-hfs+ filesystem repository used hfs+ revision numbers difficult remember version-control system reason systems offer symbolic tags user-friendly references subversion feature documentation recommends use instead different nature instead implementing tags references points history subversion recommends making snapshot copies well-known subdirectory codice_2 space repository tree predefined references available head base prev committed history-to-space projection multiple issues 1 snapshot taken system assign special meaning name tag/snapshot difference copy reference revision recorded snapshot accessed url makes operations less convenient others impossible instance naïve codice_3 work slightly complicated achieve requiring user know input url/paths snapshots instead names codice_4 operations like instance codice_5 impossible 2 two ideally independent object types live repository tree fight top ensue words often difficult decide level create codice_2 subdirectory 3 tags conventional definition read-only light-weight repository client subversion copies read-only light-weight repository incredibly heavy-weight client address issues posters subversion mailing lists suggested new feature called labels aliases svn labels would closely resemble tags systems cvs git fact subversion global revision numbers opens way simple label → revision implementation yet 2013 progress made symbolic tags list wanted features collabnet continued involvement subversion project runs independent open source community november 2009 project accepted apache incubator aiming become part apache software foundation efforts since march 2010 project formally known apache subversion part apache top-level projects october 2009 wandisco announced hiring core subversion committers company moved become major corporate sponsor project included hyrum wright president subversion corporation release manager subversion project since early 2008 joined company lead open source team subversion open-source community provide binaries potential users download binaries volunteers subversion project include official graphical user interface gui use subversion third parties developed number different guis along wide variety additional ancillary software work announced 2009 included subversionj java api implementation obliterate command similar provided perforce enhancements sponsored wandisco subversion committers normally least one two new features active development one time 1.7 release subversion october 2011 included streamlined http transport improve performance rewritten working-copy library | [
6154,
10764,
6161,
1047,
8217,
9245,
5663,
11303,
5677,
1594,
9789,
7742,
7233,
7750,
4171,
7261,
11357,
8799,
8294,
8810,
2163,
6774,
11389,
2689,
1668,
5768,
10377,
8860,
7326,
3744,
2222,
6338,
198,
1222,
4294,
6352,
8408,
8425,
747,
7... | Test |
4,920 | 9 | River_Trail_(JavaScript_engine):river trail javascript engine river trail also known parallel javascript open-source software engine designed intel executing javascript code using parallel computing multi-core processors river trail announced intel developer forum september 2011 demonstrated using firefox extension developed intel brendan eich original author javascript promised would promote river trail within ecma international saying demo shows 15x speedup serial javascript lights ridiculously parallel hardware modern cpus gpus audio video image processing automated voice response computer vision 3d gaming etc – written memory-safe clean functional javascript without threads data races deadlocks river trail leverages intel opencl sdk exploit multiple cpu cores well data parallel instructions ex avx sse speedup greater cpu core count would imply native implementation river trail firefox spidermonkey javascript engine announced september 2012 added nightly firefox builds april 2013 january 2015 code removed firefox use engine scripts uses special api based three pillars type called codice_1 several methods prototype codice_1 elementary functions | [
8068,
3462,
6791,
1802,
6154,
8605,
6176,
10145,
803,
5031,
1203,
10675,
438,
8126,
7871,
5311,
833,
5067,
339,
5078,
4056,
9560,
9561,
8923,
8289,
9195,
5101,
10991,
10739,
10744
] | None |
4,921 | 9 | Adin_Falkoff:adin falkoff adin d. falkoff 19 december 1921 – 13 august 2010 engineer computer systems programming systems designer mostly known work programming language apl systems ibm falkoff born new jersey received bachelor engineering b.ch.e city college new york 1941 master degree m.a mathematics yale university 1963 researcher manager ibm research since 1955 forty years retiring collaborated ken iverson 1960 1980 design development use apl programming language interactive environment special note landmark article formal description system/360 describing new ibm system/360 computer system formally apl programming notation falkoff visiting member faculty ibm systems research institute taught computer science yale university one researchers established managed ibm philadelphia scientific center received many awards work especially apl | [
9993,
10508,
1178,
8987,
667,
10668,
9019,
1099,
7630,
2519,
1883,
11099,
9825,
11625,
4331,
2670,
8695,
505,
3323
] | Validation |
4,922 | 9 | Eltron_Programming_Language:eltron programming language eltron programming language epl epl2 printer control language used produce printed paper labels various eltron zebra model printers newer printers support also zebra programming language zpl epl2 markup line-at-a-time language suitable printing media reduced space although supports bitmaps therefore arbitrary images use usually labels including barcode information epl2 line starts one letters indicating command may followed one comma-separated arguments commands arguments case-sensitive arguments numeric belong fixed set options see i.e reverse argument inlined string set variable values must surrounded double-quotes see i.e text argument although epl2 language quite lengthy complete number commands basic original author r team led eddy lee main author steven huang | [
8763
] | Test |
4,923 | 0 | Juergen_Pirner:juergen pirner juergen pirner born 1956 german creator jabberwock chatterbot 2003 loebner prize pirner created jabberwock modelling jabberwocky lewis carroll poem name initially jabberwock would give rude fantasy-related answers years pirner programmed better responses 2007 taught 2.7 million responses pirner lives hamburg germany | [
6208
] | Test |
4,924 | 3 | J.B._Harold_Murder_Club:j.b. harold murder club j.b. harold murder club known j.b. harold jikenbo 1 murder club japan 1986 murder mystery adventure game developed riverhillsoft released nec pc-98 msx ms-dos nec turbografx-cd turboduo nintendo ds platforms turbografx-cd version featured still photographs text audio voices well option select language english japanese first entry j.b. harold series released various platforms sold 20 million copies 2011 horrible murder taken place sleepy little town liberty bill robbins wealthy man known wild womanizing ways victim list possible suspects keeps growing j.b. harold must figure case solve mystery need travel various locations interview people search clues game laid grid map displays various locations though game mainly presented form still photos j.b. harold murder club first japanese j b. harold series murder mystery graphic adventure games includes manhattan requiem 1987 kiss murder 1988 d.c connection 1989 blue chicago blues 1995 j.b harold murder club first title series released united states series sold 20 million copies ios version second game manhattan requiem released western world 2008 enhanced remake game released japanese nintendo ds title keiji j.b. harold jikenbo satsujin club game reviewed 1991 dragon 176 hartley patricia kirk lesser role computers column reviewers gave game 4 5 stars wrote great game mystery fans thinking game well worth money video games computer entertainment critic donn nauert praised game sound graphics playability giving overall score 9 10 defunct games stated type game doubt appeal gamers love good murder mystery perfect denying best game kind type game n't see much anymore real shame j.b harold lot fun gave game score 70 gamespot included game list titles deserve enhanced remake stating one difficult games ever made memorable voice acting time day n't much quite like compared recent titles adventure games shenmue 1999 shadow memories 2001 well role-playing video game 2003 stating similarly features character interaction major gameplay element similar type multiple phrase response game generated controversy reference fictional unsolved rape donn nauert stated n't think subject american public comfortable video game even though dealt graphically ... review game dragon also criticized including warning box mature subject matter game reference unsolved rape case | [
8355,
6797,
9166,
9006,
4924
] | Test |
4,925 | 6 | /dev/full:/dev/full linux freebsd always full device special file always returns error code meaning space left device writing provides infinite number zero bytes process reads similar device usually used testing behaviour program encounters disk full error support always-full device linux documented early 2007 native support added freebsd 11.0 release 2016 previously supported optional module called lindev | [
8065,
701,
4423,
823
] | None |
4,926 | 2 | Prefetcher:prefetcher prefetcher component microsoft windows introduced windows xp component memory manager speed windows boot process shorten amount time takes start programs accomplishes caching files needed application ram application launched thus consolidating disk reads reducing disk seeks feature covered us patent 6,633,968 since windows vista prefetcher extended superfetch readyboost superfetch attempts accelerate application launch times monitoring adapting application usage patterns periods time caching majority files data needed memory advance accessed quickly needed readyboost enabled uses external memory like usb flash drive extend system cache beyond amount ram installed computer readyboost also component called readyboot replaces prefetcher boot process system 700 mb ram windows system boots components many files need read memory processed often different parts file e.g registry hives loaded different times result significant amount time spent 'jumping file file back multiple times even though single access would efficient prefetcher works watching data accessed boot process including data read ntfs master file table recording trace file activity boot prefetcher continue watch activity 30 seconds user shell started 60 seconds services finished initializing 120 seconds system booted whichever elapses first future boots use information recorded trace file load code data efficient fashion i.e re-ordering disk reads minimise eliminate need access file multiple times thus minimising disk head movements application prefetching works similar fashion instead localized single application startup first 10 seconds activity monitored prefetcher stores trace files prefetch folder inside windows folder typically codice_1 name boot trace file always codice_2 application trace files concatenation application executable name hyphen hexadecimal representation hash path file resides .pf extension applications host components i.e microsoft management console dllhost name loaded component included computed hash well results different trace files created component note task scheduler process responsible parsing trace data collected prefetcher writing files prefetcher directory result prefetcher operate correctly task scheduler service started improve access times task scheduler calls windows disk defragmenter every three days machine idle lists files directories referenced boot process application startups processed processed result stored codice_3 prefetch directory subsequently passed disk defragmenter instructing re-order files sequential positions physical hard drive improve performance minimising distance hard drive heads moved one file next possible trigger re-ordering running defrag.exe systemdrive -b command line without running full defragmentation system installed solid-state drive superfetch disabled regular prefetching left enabled prefetcher configuration stored windows registry codice_4 enableprefetcher value set one following recommended value 3 values higher 3 increase performance changing value 2 make windows boot faster often found internet /prefetch:1 application tweak valid misunderstood switch used distinguish different operating modes executable case different modes would significantly different prefetch traces second myth user delete prefetch folder contents speed computer done windows need re-create prefetch files thereby slowing windows boot program starts prefetch files created—unless prefetcher disabled windows maintains prefetch files prefetch folder 128 recently launched programs | [
8328,
1577,
651,
10091,
6797,
8080,
2193,
1106,
11667,
823,
9593,
2778,
2811
] | Test |
4,927 | 8 | Ping.fm:ping.fm ping.fm advertising-supported social networking micro-blogging web service enabled users post multiple social networks simultaneously making update ping.fm pushed update number different social websites allowed individuals using multiple social networks update status without update social media individually ping.fm grouped services three categories – status updates blogs micro-blogs – updates could sent group separately ping.fm shut 5 july 2012 replaced seesmic ping seesmic later acquired hootsuite ping.fm created intent making easy possible post updates multiple social networking sites simultaneously free service discontinued six months closed beta announcement made 2 september 2008 would longer require private invite beta codes used register use service launch open beta covered outlets like wired mashable ping.fm compared favorably websites similar functionality like hellotxt shut august 2012 ping.fm powered lamp linux apache mysql php .net used core software api allows programmers apply application key order develop third party applications users must apply api key user profile user configure ping.fm account aggregate content following services note google buzz discontinued google december 15 2011 4 january 2010 seesmic announced would acquiring ping.fm may 2012 seesmic announced blog ping.fm would closed june 2012 september 2012 seesmic acquired hootsuite | [
865,
2945,
8644,
10020,
7022,
3573,
823
] | Test |
4,928 | 3 | Prefetch_input_queue:prefetch input queue fetching instruction opcodes program memory well advance known prefetching served using prefetch input queue piq .the pre-fetched instructions stored data structure namely queue fetching opcodes well advance prior need execution increases overall efficiency processor boosting speed processor longer wait memory access operations subsequent instruction opcode complete architecture prominently used intel 8086 microprocessor pipelining brought forefront computing architecture design 1960s due need faster efficient computing pipelining broader concept modern processors load instructions clock cycles execute achieved pre-loading machine code memory prefetch input queue behavior applies von neumann computers harvard architecture computers run self-modifying code sort instruction pipelining nearly modern high-performance computers fulfill three requirements usually prefetching behavior piq invisible programming model cpu however circumstances behavior piq visible needs taken account programmer x86-processor changes mode realmode protected mode vice versa piq flushed else cpu continue translate machine code written last mode piq flushed processor might translate codes wrong generate invalid instruction exception executing self-modifying code change processor code immediately front current location execution might change processor interprets code already loaded piq simply executes old copy already loaded piq instead new altered version code ram and/or cache behavior piq used determine code executed inside emulator directly hardware real cpu emulators probably never simulate behavior piq-size zero changes code always affect state processor immediately deduced either code executed emulator processor invalidates piq upon writes addresses loaded piq a.k erlang 1878-1929 first conceived queue solution congestion telephone traffic different queueing models proposed order approximately simulate real time queuing systems analysed mathematically different performance specifications queuing models represented using kendall notation generally applications like prefetch input queue m/m/1 model popularly used limited use queue features model accordance microprocessors user takes role execution unit server bus interface unit processor executes program fetching instructions memory executing usually processor execution speed much faster memory access speed instruction queue used prefetch next instructions separate buffer processor executing current instruction four stage pipeline rate instructions executed four times sequential execution processor usually two separate units fetching instructions executing instructions implementation pipeline architecture possible bus interface unit execution unit independent execution unit decoding executing instruction require use data address buses bus interface unit fetches instruction opcodes memory process much faster sending address reading opcode decoding executing fetching next instruction current instruction decoded executed called pipelining 8086 architecture six-byte prefetch instruction pipeline execution unit executing current instruction bus interface unit reads six bytes opcodes advance memory six byte long queue chosen maximum number bytes required instruction 8086 long exception encountered execution unit encounters branch instruction i.e either jump call instruction case entire queue must dumped contents pointed instruction pointer must fetched memory processors implementing instruction queue prefetch algorithm rather technically advanced cpu design level complexity processors much higher regular processors primarily need implement two separate units biu eu operating separately complexity chips increases cost also increases processors relatively costlier counterparts without prefetch input queue however disadvantages greatly offset improvement processor execution time introduction prefetch instruction queue 8086 processor successive processors incorporated feature code_starts_here self-modifying program overwrite jmp to_the_end two nops encoded 0x9090 jump jmp near to_the_end assembled two bytes machine code two nops overwrite jump nothing else jump replaced do-nothing-code machine code jump already read piq probably also already executed processor superscalar processors execute several instructions pretend n't need backward compatibility change code change execution flow example nasm-syntax self-modifying x86-assembly language algorithm determines size piq code basically changes execution flow determines brute force large piq far away change code front affect near already piq update effect far enough change code affect program program found size processor piq code executed multitasking os context switch may lead wrong value | [
7173,
9739,
2066,
7699,
5655,
10779,
10781,
10786,
6181,
8231,
10796,
3630,
6705,
7218,
2623,
2113,
7234,
2638,
3175,
8815,
6268,
3197,
7313,
6815,
5793,
6818,
6821,
7852,
9391,
2224,
2226,
7858,
9911,
8890,
4286,
2250,
9932,
5329,
10966,
... | None |
4,929 | 2 | Multiboot_specification:multiboot specification multiboot specification open standard describing boot loader load x86 operating system kernel specification allows compliant boot loader implementation boot compliant operating system kernel thus allows different operating systems boot loaders work together interoperate without need operating system–specific boot loaders result also allows easier coexistence different operating systems single computer also known multi-booting specification originally created 1995 developed free software foundation gnu hurd vmware esxi xen l4 microkernels need booted using method gnu grub reference implementation used gnu operating system operating systems latest version multiboot specification 0.6.96 defined 2009 incompatible second iteration uefi support multiboot2 specification later introduced lastest version multiboot2 2.0 defined 2016 multiboot defines header struct needs present image file whole multiboot2 fields group fields type tag allows omitted multiboot2 header within os image file header must first 8192 2^13 bytes multiboot 32768 2**15 bytes multiboot2 loader searches magic number find header magic 0x1badb002 multiboot 0xe85250d6 multiboot2 header codice_1 points code control handed os allows different executable file formats os kernel elf file linux kernel omitted multiboot2 elf format common open source world field codice_2 containing entry point jumping os entry point boot loader must provide boot information structure tell os left system form multiboot struct multiboot2 every field group type tag size | [
10813,
6012,
6153,
2762,
5596,
7983,
499,
2811,
3068,
4637,
671
] | None |
4,930 | 9 | Frances_E._Allen:frances e. allen frances elizabeth fran allen born august 4 1932 american computer scientist pioneer field optimizing compilers allen first female ibm fellow 2006 became first woman win turing award achievements include seminal work compilers program optimization parallelization since 2002 fellow emerita ibm allen grew farm peru new york graduated new york state college teachers part state university new york albany suny b.sc mathematics 1954 began teaching school peru new york two years enrolled university michigan earned m.sc degree mathematics 1957 deeply debt joined ibm research poughkeepsie ny programmer 1957 taught incoming employees basics fortran planned return teaching student loans paid ended staying ibm entire 45-year career allen assigned harvest project code breaking national security agency 1959 worked programming language called alpha managed compiler-optimization team harvest stretch project 1960s contributed acs-1 project 1970s pl/i 1970 1971 spent sabbatical new york university acted adjunct professor years afterwards another sabbatical brought stanford university 1977 allen became first female ibm fellow 1989 retired ibm 2002 remains affiliated corporation fellow emerita 2007 ibm ph.d. fellowship award created honor a.m. turing award citation reads publications include allen fellow institute electrical electronics engineers ieee association computing machinery acm 2000 made fellow computer history museum contributions program optimization compiling parallel computers elected national academy engineering 1987 american philosophical society 2001 national academy sciences 2010 nominated fellow american academy arts sciences 1994 received ieee computer society charles babbage award 1997 computer pioneer award ieee computer society 2004 1997 allen inducted witi hall fame 2002 augusta ada lovelace award association women computing 2004 allen winner abie award technical leadership anita borg institute allen recognized work high-performance computing 2006 turing award became first woman recipient forty-year history award considered equivalent nobel prize computing given association computing machinery interviews following award hoped would give opportunities women science computing engineering 2009 awarded honorary doctor science degree mcgill university pioneering contributions theory practice optimizing compiler techniques laid foundation modern optimizing compilers automatic parallel execution allen married nyu professor jacob t. schwartz 1972 divorced ten years later children | [
7048,
11020,
3854,
1952,
10668,
2482,
8502,
6967,
1976,
2620,
4799,
4800,
10049,
70,
8262,
3529,
7887,
1883,
7775,
9315,
10469,
11242,
2283,
2798,
3960,
3323,
511
] | Test |
4,931 | 9 | HyperFun:hyperfun hyperfun hyperdimensional functions programming language software used create visualize fabricate volumetric 3d higher-dimensional models team maintaining hyperfun project freely associated group researchers students different countries world uk russia france japan norway usa others called digital materialization group digitalmaterial.org hyperfun allows users easily model objects quality found reality nature system based new mathematical framework geometry function representation frep provides uniform method model surface geometry internal composition simultaneously also compact precise framework represent objects unlimited complexity properties compared traditional modeling systems hyperfun able digitally describe create modify models real imagined object environment technically complex geometric objects hyperfun constructed simple primitives various operations performed object three-dimensional space defined function point coordinates f x z continuous real function positive inside object negative outside takes zero value surface similarly multidimensional object defined function several variables f x1 x2 x3 ... xn example object changing time defined f x z representing time attributes color material density also defined corresponding functions constitutes new paradigm procedural function-based volume modeling rendering object shape properties locally evaluated request using black box procedures | [
5612,
7983
] | Test |
4,932 | 3 | Jesus_(video_game):jesus video game game name refers space station called j.e.s.u.s. named central christian figure jesus ship shaped like double-edged sword la book revelation inhabitants go fight mysterious demonic alien halley comet game takes place 2061 halley comet approaching mars quite time nations earth send mission investigate comet form life detected inside gas musou hayao stationed space lab jesus speaks commanding officer station requests track members two crews sent comet give access cards using spaceships hayao meets 7 different crew members time chinese doctor german captain soviet captain american xenobiologist french mathematician italian computer engineer brazilian astronomer mathematician also hayao love interest eline share heartfelt goodbye boarding different ships mission depart two weeks apart another eline ship leaving comet first eline happens talented musician well mathematician plays song wrote leaves meeting crew cuts hayao ship arrived halley comet hayao sent investigate first ship finds crew missing eline intelligent robot pet fojii found ship docking bay updating data offers hayao assistance tracking missing crew members unfortunately many found dead beginning die whispering dire vague warnings hayao something else board crew member tells hayao fire hurt none dead crew display physical signs harm except small pinprick one fingers hayao collects key cards missing murdered crew access journal entries video recordings showing xenomorph-like creature attacking ship recordings also say eline fled alien creature hid giving hayao hope may still alive ship investigating eline hayao fojii eventually come face-to-face monster first fleeing way harming eventually attacking freeze gun looted armory 4th floor ship manage kill slowing movements ensure chase eline soon found hiding one engine rooms hayao reunites asking happened arrived tells eline crew died make plans use shuttlepods escape spaceship shuttles take one passenger eline uses first shuttle hayao following shortly leaves encounters alien monster leaves behind piece skin body hayao contacts xenobiologist requests bring back sample study back first ship xenobiologist carson begins research alien monster soon enough sample monster breaks free hides ship hayao carson suspect alien able regrow sample much like worm cut half searching ship clues hayao discovers happenings eerily reminiscent second ship previous crew doctor cryogenic pod used access astronomer favourite food hamburgers found littered one storage bays briefing room tape recording eline song found starts playing randomly comms player explores ship abruptly stop upon returning room tape containing eline song crushed suddenly carson attacked monster missing presumably dead hayao commanding officer jesus arrives aid capturing killing monster costs hayao eline board commander vessel plan next attempt locate ultimately destroy monster carson manages send signal first ship hayao goes back investigate however upon returning commander vessel monster also boarded ship breaks nearby vent hayao eline manage escape due commander sacrifice closes door behind pushing two safety primary ship hide cryo-pods fearful alien next moves hayao finds way communicate jesus carson pod carson hooked pod comm system main labs midst sending distress call jesus alien monster evolved begins speak strange language eline notes language sounds like many human languages mangled together fojii begins decrypting speech able communicate alien speech combination chinese german russian english italian portuguese making clear alien taken knowledge memories crew members killed using dna stole bodies evolve monster informs hayao taken control ship plans head jesus order conquer mankind killing sake advanced evolution alien mentions longer harmed hayao freeze rays shown earlier confrontations developing resistance hayao eline try bargaining alien avail hayao bluffs claims remote detonator use destroy ship alien meet lure alien ship considering options searching sort weapon harm fojii helps hayao recall happened tape eline song started playing monster one crushed tape finding harmony unbearable foreign biology takes eline synthesizer confronts alien front airlock plays eline song monster disabled long enough hayao jettison creature space hearing telepathically voices crew members killed tell hayao eline memories live inside alien creature one although long gone assure two humanity strength fight new breed monster even returns attempt destroy mankind day suspect hayao eline hold one another ship staring void space knowing tell tales fallen colleagues prepare earth future confrontation halley comet returns game proceeds linear adventure game player chooses action perform action actions vary based room situation although game implies danger various points seem possible lose three main sections game although first section mostly introduction characters game largely presented anime style although art fairly bright positive style first section game changes sections atmosphere game music game music composed koichi sugiyama dragon quest fame overworld theme dragon quest another game enix present pc-8801 version game sequel titled jesus ii ジーザス2 jīzasu tsū released 1991 nec pc-8801 nec pc-9801 sharp x68000 home computers | [
7023
] | Test |
4,933 | 2 | Dictionary_(software):dictionary software dictionary application developed apple inc. part macos application provides definitions synonyms various dictionaries wikipedia articles glossary apple-related terms dictionary introduced os x 10.4 new oxford american dictionary oxford american writer thesaurus well wikipedia apple sections 10.5 added japanese dictionaries 10.7 added british oxford dictionary english 10.8 added french german spanish chinese os x progenitor openstep nextstep provided similar functionality called digital webster providing dictionary thesaurus definitions webster ninth new collegiate dictionary webster collegiate thesaurus termed first digital edition openstep services provide lookup applications dictionary first introduced mac os x v10.4 tiger provided definitions new oxford american dictionary 2nd edition mac os x 10.7 lion dictionary updated third edition new oxford american dictionary british oxford dictionary english added words entered search bar typing first letters application perform incremental search show matching headwords forms try bypass spelling errors clicking word definition searches word dictionary almost word clickable except pronunciations phonetic characters numerals preferences allow user select three different pronunciation schemes either us english diacritical ipa british english ipa dictionary thesaurus dictionary xml format make use precompiled binary index files access xml file directly therefore lexicon easily modified however user add new words macos system-wide spell checker uses lexicon mac os x 10.5 leopard added japanese-language dictionary daijisen progressive english japanese progressive japanese english dictionaries 25,000-entry thesaurus provided japanese publisher shogakukan japanese dictionaries show default must enabled preferences os x 10.8 mountain lion japanese dictionaries replaced super daijirin wisdom english-japanese dictionary addition dictionaries also added french multidictionnaire de la langue française macs sold europe les éditions québec amérique macs sold america german duden spanish vox chinese standard dictionary contemporary chinese software dictunifier used add dictionaries application although dictionary entries purport neutral entries apple dictionary application criticised exhibiting various forms bias complaint filed 2013 entry gay included informal definition foolish stupid unimpressive making students wait light kind gay rule definition since amended label offensive addition writers dictionary exhibit gender bias definitions political apolitical definition political associates word man political man example apolitical associates word woman interested involved politics former apolitical housewife form gender bias documented many dictionaries | [
4615,
5647,
1042,
6700,
4657,
1074,
576,
9802,
5713,
3670,
4184,
2141,
4702,
2149,
8303,
6771,
2676,
9343,
3719,
10888,
11402,
8852,
1686,
7318,
3228,
2207,
1699,
5292,
8877,
1710,
3766,
2232,
9912,
9406,
1729,
6849,
713,
9418,
3790,
9430... | None |
4,934 | 3 | Kernel_relocation:kernel relocation kernel relocation may refer linux feature kernel compiled bootable variety different memory addresses instead fixed address used connection kexec crash recovery | [
10063,
823
] | None |
4,935 | 4 | Manu_propria:manu propria also found several ancient documents front writer signature end document richly decorated manu propria signs frequently used medieval dignitaries literates verify authenticity handwritten documents mppria commonly used 18th century however used latin documents later official documents routinely accompanied abbreviation example declaration war serbia emperor franz joseph 1914 ends m.p. ordinary personal cheques frequently include abbreviation end signature line countries still regularly use manu propria include | [
9576,
5433,
1821
] | Test |
4,936 | 4 | NIST_Cybersecurity_Framework:nist cybersecurity framework nist cybersecurity framework provides policy framework computer security guidance private sector organizations united states assess improve ability prevent detect respond cyber attacks framework translated many languages used governments japan israel among others provides high level taxonomy cybersecurity outcomes methodology assess manage outcomes version 1.0 published us national institute standards technology 2014 originally aimed operators critical infrastructure used wide range businesses organizations helps shift organizations proactive risk management 2017 draft version framework version 1.1 circulated public comment version 1.1 announced made publicly available april 16 2018 version 1.1 still compatible version 1.0 changes include guidance perform self-assessments additional detail supply chain risk management guidance interact supply chain stakeholders security framework adoption study reported 70 surveyed organizations see nist framework popular best practice computer security many note requires significant investment includes guidance relevant protections privacy civil liberties 2017 nist published nist baldrige cyber security excellence builder leverages 2014 framework includes simpler self-assessment questions divided six areas results section nist cybersecurity framework designed individual businesses organizations use assess risks face framework divided three parts core profile tiers framework core contains array activities outcomes references aspects approaches cybersecurity framework implementation tiers used organization clarify partners views cybersecurity risk degree sophistication management approach framework profile list outcomes organization chosen categories subcategories based needs risk assessments organization typically starts using framework develop current profile describes cybersecurity activities outcomes achieving develop target profile adopt baseline profile tailored sector e.g infrastructure industry type organization define steps switch current profile target profile nist cybersecurity framework organizes core material five functions subdivided total 23 categories category defines number subcategories cybersecurity outcomes security controls 108 subcategories subcategory also provides informative resources referencing specific sections variety information security standards including cobit nist sp 800-53 ansi/isa-62443 council cybersecurity critical security controls ccs csc managed center internet security special publications sp aside informative references requires paid membership purchase access respective guides cost complexity framework resulted bills houses congress direct nist create cybersecurity framework guides accessible small medium businesses functions categories along unique identifiers definitions stated category column spreadsheet view core standard develop organizational understanding manage cybersecurity risk systems assets data capabilities develop implement appropriate safeguards ensure delivery critical infrastructure services develop implement appropriate activities identify occurrence cybersecurity event develop implement appropriate activities take action regarding detected cybersecurity event develop implement appropriate activities maintain plans resilience restore capabilities services impaired due cybersecurity event | [
3552,
9049,
1897,
399,
8881,
3447,
6360,
3897,
3994,
10717,
2558
] | Test |
4,937 | 4 | GCHQ_Bude:gchq bude gchq bude also known gchq composite signals organisation station morwenstow abbreviated gchq cso morwenstow uk government satellite ground station eavesdropping centre located north cornwall coast cleave camp small villages morwenstow coombe operated british signals intelligence service officially known government communications headquarters commonly abbreviated gchq located part site former world war ii airfield raf cleave site gchq bude morwenstow northernmost parish cornwall world war ii location developed used royal air force raf raf cleave conceived housing target target support aircraft firing ranges along north cornwall coast land acquired cleave manor 1939 became home two flights 1aac 1943 639 squadron established site remainder war airfield put maintenance april 1945 staying government ownership early 1960s developments occurred appear prompted establishment facility known gchq bude 1962 satellite receiving station commercial communication satellites intelsat established goonhilly downs hundred kilometres south-southwest morwenstow downstream link intelsat satellites could easily intercepted placing receiver dishes nearby satellites 'footprint land cleave allotted ministry public buildings works 1967 construction satellite interception station began 1969 two dishes appeared first followed smaller dishes ensuing years station originally signposted 'csos morwenstow 'csos standing composite signals organisation station 2001 third large dish appeared station eventually became known 'gchq bude inception station anglo-american co-operative project united states national security agency nsa paid infrastructure technology running costs like payments staff paid gchq also provided land intelligence collected bude satellite station shared among nsa gchq also jointly processed another sign close cooperation countries sir leonard hooper gchq director late 1960s wrote nsa counterpart regarding two large dishes suggested naming 'pat 'louis nsa director marshall 'pat carter deputy louis tordella 2010 national security agency paid gchq £15.5m redevelopments site 1963 tat-3 undersea cable linking united kingdom united states laid tuckerton new jersey us widemouth bay cornwall south site cleave camp british general post office gpo routinely monitored communications passing along tat-3 cable forwarding messages felt relevant security services site cleave camp presented opportunity monitor submarine cable traffic nearby landing points time intercepting communications meant commercial satellite ground station goonhilly downs tat-14 undersea cable landing bude identified one assets critical infrastructure key resources us foreign territory diplomatic cable leaked wikileaks gchq bude station comprises twenty one satellite antennae various sizes including three diameter could theoretically cover main frequency bands l band c band k band x band k band v band calculated basis position elevation compass azimuth angle antennae generally orientated towards satellites intelsat intersputnik inmarsat communications networks atlantic ocean africa indian ocean well towards middle east mainland europe somewhere 2011 2013 torus antenna installed able receive signals thirty-five satellites simultaneously antenna covered radome staff drawn gchq uk nsa u.s. station operated ukusa agreement gathering data echelon signals intelligence sigint network comparable stations operation include raf menwith hill uk sugar grove station west virginia u.s. yakima washington u.s. sabana seca puerto rico misawa air base japan pine gap australia geraldton australia gcsb waihopai new zealand gcsb tangimoana new zealand cover intelsat areas south america pacific ocean activities gchq bude usually remain classified however partly response concerns expressed european union eu member states morwenstow responsible industrial espionage interception civilian communications report european parliament referenced made public 2001 provides details station intelligence services act 1994 grants gchq power 'to monitor interfere electromagnetic acoustic emissions equipment producing emissions obtain provide information derived related emissions equipment includes blackberry messenger bbm audio messages 1 june 2007 gchq bude designated protected site purposes section 128 serious organised crime police act 2005 effect act make specific criminal offence person trespass site early 2014 gchq careers website page gchq bude said employs digital communications experts play important role formulating united kingdom government response issues involving national security military operations serious crime web page mentioned site adjacent coastal footpath part south west coast path elsewhere website job applicants warned subject developed vetting security clearance could take nine months proceed 2016 gchq careers website 'life gchq page 'bude section page describes working gchq bude little mentions gym restaurant boasting sea view within facility also describes range social outdoor sporting events employees take part june 2013 guardian newspaper using documents leaked former national security agency nsa contractor edward snowden revealed existence operation codenamed tempora whereby gchq able tap data flows along undersea cables store 30 days assess analyse article refers three-year trial set gchq bude mid 2011 probing 200 internet connections guardian report december 2013 stated eavesdropping efforts target charities german government buildings israeli prime minister eu commissioner centred activities run gchq bude gchq bude featured extensively 3 september 2014 bbc two horizon television programme programme estimated 25 internet traffic travels cornwall england dr joss wright university oxford internet institute explained mirror images signals running submarine ethernet cables used gather analyse data programme claimed procedure involves optical tap device inserted submarine cable repeater station second copy data travels gchq original carries intended journey gchq claimed three days replay data stated everything comes across internet theoretically accessed including emails websites bittorrent downloads films watched etc wright added internal documents show 2011 200 10-gigabit cables coming cornwall tapped gchq dr wright said entire digitised contents british library could transferred set cables 40 seconds programme tim berners-lee explained huge volumes data analysed gchq computer programmes identify trends communication deemed require examination 20 november 2014 channel 4 news broadcast investigation prepared collaboration german broadcaster westdeutscher rundfunk wdr report revealed leading uk communications company cable wireless vodafone cooperated gchq allow access data including carried rival indian telecommunications company broadcast detailed operation centred fibre-optic cables surfacing porthcurno beach sennen cove cornwall data travelling nearby cable landing station skewjack farm onwards gchq bude 4 april 2016 royal highness princess royal made first royal visit gchq bude station princess royal arrived helicopter greeted head gchq bude station along lord lieutenant cornwall colonel edward bolitho visit consisted short tour site hrh met many members staff grades learnt activities carried bude july 2016 gchq launched cyberfirst scheme students 2016/17 academic year offering bursaries studying relevant science technology engineering mathematics stem graduate courses followed guaranteed jobs gchq including bude gchq 17 may 2016 satellite dishes gchq bude station lit display rainbow colours mark international day homophobia transphobia biphobia idahobit display public act unity recognition pride gchq assert continued commitment gchq diversity pride staff follows similar rainbow coloured themed display support 2015 idahobit gchq cheltenham site year earlier south gchq bude widemouth bay numerous submarine cables make landfall followed locations link brackets include apollo us tat-3 us cantat-1 canada tat-8 us france last used 2002 tat-14 us europe ac-2 us eig europe india glo-1 west africa crooklets beach bude south gchq bude key submarine cable landing point particular carrying financial trading data new york | [
3428,
3495,
6344,
2892,
7887,
1169,
11089,
4595,
8276,
7893,
8564,
10935,
8156,
6749
] | None |
4,938 | 5 | IBM_1009:ibm 1009 ibm 1009 data transmission unit ibm communications controller introduced 1960 1009 used synchronous transmit-receive str protocol transfer data 150 characters per second cps single point-to-point dial leased telephone line system advertised able link magnetic core memories ibm 1401 computers telephone lines 1009 attached ibm 1400 series computers 1401 1961 transmission rate doubled 300 cps 1962 1009 part test data communications using telstar satellite link two 1401 computer systems | [
11217,
3323
] | Test |
4,939 | 2 | Inter-App_Audio:inter-app audio inter-app audio iaa technology developed apple inc designed route audio midi signals various applications within devices based ios mobile operating system technology first introduced 2013 seventh version ios inter-app audio host-plugin technology means application called host initiate connection node plug-in application order send receive audio send midi timeline etc signals also host application receive remote control signals node application node applications following types moment audio signal routing possible frequency 44 100 hz | [
2259
] | None |
4,940 | 4 | Rop_Gonggrijp:rop gonggrijp robbert rop valentijn gonggrijp born 14 february 1968 dutch hacker one founders xs4all gonggrijp born amsterdam growing wormer dutch zaanstreek area became known teenage hacker appeared one main characters jan jacobs book kraken en computers hacking computers veen uitgevers 1985 describes early hacker scene netherlands moved amsterdam 1988 founded hacker magazine hack-tic 1989 believed major security threat authorities netherlands united states masthead hack-tic gonggrijp described role hoofdverdachte 'prime suspect convinced internet would radically alter society 1993 number people surrounding hack-tic including gonggrijp founded xs4all first isp offered access internet private individuals netherlands gonggrijp sold company former enemy dutch-telecom kpn 1997 left xs4all gonggrijp founded itsx computer security evaluation company bought madison gurkha 2006 2001 gonggrijp started work cryptophone mobile telephone encrypt conversations since 1989 gonggrijp main organizer hacker events held every four years originally organized cast hack-tic events continued live day throughout years repeatedly shown concerns increasing amount information individuals government agencies companies access rop held controversial talk titled lost war chaos communication congress 2005 berlin together frank rieger 2006 founded organisation wij vertrouwen stemcomputers niet trust voting computers campaigns use electronic voting systems without voter verified paper audit trail showed october 2006 dutch television electronic voting machine manufacturer nedap could easily hacked findings taken seriously dutch government international election observers 16 may 2008 dutch government decided elections would held using paper ballots red pencil proposal develop new generation voting computers rejected gonggrijp worked wikileaks helping prepare collateral murder april 2010 release video footage baghdad airstrike 14 december 2010 relation ongoing investigations wikileaks us department justice issued subpoena ordering twitter release information regarding gonggrijp account well julian assange chelsea manning birgitta jónsdóttir jacob appelbaum 637,000 users following wikileaks reason gonggrijp collaboration releasing collateral murder video april 2010 wikileaks action | [
8320,
4133,
3495,
297,
3629,
1946,
4956
] | Validation |
4,941 | 4 | Ivan_Krstić:ivan krstić ivan krstić croatian computer security expert currently working core security apple inc. krstić previously director security architecture one laptop per child co-author official ubuntu book born croatia krstić received scholarship attend cranbrook kingswood school michigan u.s 15 2004 enrolled harvard college took year leave work secure electronic healthcare croatia largest children hospital returning harvard 2005 took another leave offered position one laptop per child designed bitfrost security architecture personally oversaw project first two in-country deployments uruguay peru left project early 2008 later joined apple may 2009 2007 krstić became tr35 laureate selected mit technology review one world top 35 innovators age 35 year later eweek magazine declared one top three influential people modern computer security one top 100 | [
2558
] | Validation |
4,942 | 0 | Lauri_Karttunen:lauri karttunen lauri karttunen adjunct professor linguistics stanford acl fellow karttunen received ph.d. linguistics 1969 indiana university bloomington university texas austin 1970s worked mostly semantics published series seminal papers discourse referents presuppositions implicative verbs conventional implicatures questions 1980s karttunen became along ronald m. kaplan martin kay kimmo koskenniemi one pioneers computational linguistics application finite-state transducers phonology morphology karttunen kenneth r. beesley published textbook finite state morphology set applications creating morphological analyzers commercial versions finite-state technology developed karttunen colleagues parc xrce licensed xerox many companies including sap microsoft karttunen retired parc 2011 currently working language natural reasoning csli association computational linguistics acl gives year annual meeting lifetime achievement award age 66 karttunen became far youngest recipient award 45th meeting prague 2007 2009 indiana linguistics department gave karttunen distinguished alumni award 2011 acl created acl fellows program karttunen one seventeen selected founding group acl fellows whose contributions field extraordinary european meta-net organization awarded karttunen xfst xerox finite-state toolkit application meta-seal recognition 2012 meeting brussels software products services actively contribute european multilingual information society | [
3668,
2326,
7724
] | None |
4,943 | 9 | Nu_(programming_language):nu programming language nu interpreted object-oriented programming language lisp-like syntax created tim burks alternative scripting language program os x cocoa application programming interface api implementations also exist iphone linux language first announced c4 conference indie mac developers held august 2007 nu code defines simple complex numbers class example basic definition complex number defines instance variables method initialize object shows similarity code nu equivalent objective-c also shows similarity ruby sample nuke tool bundled nu also shows influence objective-c lisp ruby design language | [
5409,
9345,
9732,
6502,
10470,
7983,
8303,
499,
11221,
823,
1852,
9245
] | Test |
4,944 | 1 | Apache_iBATIS:apache ibatis ibatis persistence framework automates mapping sql databases objects java .net ruby rails java objects pojos plain old java objects mappings decoupled application logic packaging sql statements xml configuration files result significant reduction amount code developer needs access relational database using lower level apis like jdbc odbc persistence frameworks hibernate allow creation object model java say user create maintain relational database automatically ibatis takes reverse approach developer starts sql database ibatis automates creation java objects approaches advantages ibatis good choice developer full control sql database schema example application may need access existing sql database used software access new database whose schema fully application developer control specialized database design team created schema carefully optimized high performance may 21 2010 development team forked code creating new project called mybatis making new releases consequence apache ibatis project became inactive moved apache attic june 2010 example assume database table java class read product record key new pojo following mapping added ibatis xml mapping file new java product object retrieved database product number 123 follows mapping file example codice_1 refers long integer value passed query parameter java object values properties object inserted query using similar codice_2 notation example parameter class codice_3 property called codice_4 codice_1 replaced codice_6 codice_7 object instance class codice_8 founder ibatis publicly stated dismay java 5 continued release new versions ibatis java versions 2.3.1 2.3.2 came april 2008 2.3.3 july framework currently available java .net ruby rbatis versions jbati project javascript orm inspired ibatis apache ibator tool closely related connects database uses metadata generate ibatis mapping files java classes 2001 project called ibatis started clinton begin originally focus development cryptographic software solutions first product released ibatis secrets personal data encryption signing tool much like pgp secrets written entirely java released open source license year microsoft published paper demonstrate recent .net 1.0 framework productive java purpose microsoft built version sun web pet store web project sun used show java best practices java blueprints microsoft claimed .net 10 times faster 4 times productive java 2002 clinton developed application called jpetstore demonstrate java could productive .net could also achieving better architecture used microsoft implementation jpetstore 1.0 big impact database layer clinton used attracted attention community soon ibatis database layer 1.0 project started composed two components ibatis dao ibatis sql maps ibatis 2.0 released june 2004 complete redesign keeping features clinton donated ibatis name code apache software foundation project stayed asf six years eventually ibatis dao deprecated considering better dao frameworks available spring framework may 19 2010 ibatis 3.0 published simultaneously development team decided continue development framework google code new project called mybatis june 16 2010 apache announced ibatis retired moved apache attic | [
3080,
9481,
10377,
8460,
7567,
1296,
6161,
1047,
8217,
11161,
6555,
8860,
9245,
3877,
10661,
11303,
5677,
10413,
1327,
7983,
3763,
4919,
5047,
4538,
1851,
6074,
7485,
7742,
9789,
7233,
6338,
4419,
1222,
1991,
4294,
7750,
5066,
8139,
6860,
... | Test |
4,945 | 4 | Cybercrime:cybercrime cybercrime computer-oriented crime crime involves computer network computer may used commission crime may target cybercrimes defined offences committed individuals groups individuals criminal motive intentionally harm reputation victim cause physical mental harm loss victim directly indirectly using modern telecommunication networks internet networks including chat rooms emails notice boards groups mobile phones bluetooth/sms/mms cybercrime may threaten person nation security financial health issues surrounding types crimes become high-profile particularly surrounding hacking copyright infringement unwarranted mass-surveillance sextortion child pornography child grooming also problems privacy confidential information intercepted disclosed lawfully otherwise debarati halder k. jaishankar define cybercrime perspective gender defined 'cybercrime women crimes targeted women motive intentionally harm victim psychologically physically using modern telecommunication networks internet mobile phones internationally governmental non-state actors engage cybercrimes including espionage financial theft cross-border crimes cybercrimes crossing international borders involving actions least one nation-state sometimes referred cyberwarfare report sponsored mcafee published 2014 estimated annual damage global economy 445 billion approximately 1.5 billion lost 2012 online credit debit card fraud us 2018 study center strategic international studies csis partnership mcafee concludes close 600 billion nearly one percent global gdp lost cybercrime year computer crime encompasses broad range activities computer fraud dishonest misrepresentation fact intended let another refrain something causes loss context fraud result obtaining benefit forms fraud may facilitated using computer systems including bank fraud carding identity theft extortion theft classified information types crime often result loss private information monetary information government officials information technology security specialists documented significant increase internet problems server scans since early 2001 growing concern among government agencies federal bureau investigations fbi central intelligence agency cia intrusions part organized effort cyberterrorists foreign intelligence services groups map potential security holes critical systems cyberterrorist someone intimidates coerces government organization advance political social objectives launching computer-based attack computers networks information stored cyberterrorism general defined act terrorism committed use cyberspace computer resources parker 1983 simple propaganda piece internet bomb attacks holidays considered cyberterrorism also hacking activities directed towards individuals families organized groups within networks tending cause fear among people demonstrate power collecting information relevant ruining peoples lives robberies blackmailing etc cyberextortion occurs website e-mail server computer system subjected threatened repeated denial service attacks malicious hackers hackers demand money return promising stop attacks offer protection according federal bureau investigation cybercrime extortionists increasingly attacking corporate websites networks crippling ability operate demanding payments restore service 20 cases reported month fbi many go unreported order keep victim name public domain perpetrators typically use distributed denial-of-service attack however cyberextortion techniques exist doxing extortion bug poaching example cyberextortion attack sony pictures 2014 u.s. department defense dod notes cyberspace emerged national-level concern several recent events geostrategic significance among included attack estonia infrastructure 2007 allegedly russian hackers august 2008 russia allegedly conducted cyber attacks time coordinated synchronized kinetic non-kinetic campaign country georgia december 2015 ukraine power grid cyberattack also attributed russia considered first successful cyber attack power grid fearing attacks may become norm future warfare among nation-states concept cyberspace operations impacts adapted warfighting military commanders future crimes committed selected group criminals unlike crimes using computer tool crimes require technical knowledge perpetrators technology evolves nature crime crimes relatively new existence long computers have—which explains unprepared society world general towards combating crimes numerous crimes nature committed daily internet crimes primarily target computer networks devices include individual main target cybercrime computer considered tool rather target crimes generally involve less technical expertise human weaknesses generally exploited damage dealt largely psychological intangible making legal action variants difficult crimes existed centuries offline world scams theft likes existed even development high-tech equipment criminal simply given tool increases potential pool victims makes harder trace apprehend crimes use computer networks devices advance ends include unsolicited sending bulk email commercial purposes spam unlawful jurisdictions phishing mostly propagated via email phishing emails may contain links websites affected malware may contain links fake online banking websites used steal private account information content websites electronic communications may distasteful obscene offensive variety reasons instances communications may illegal extent communications unlawful varies greatly countries even within nations sensitive area courts become involved arbitrating groups strong beliefs one area internet pornography target strongest efforts curtailment child pornography illegal jurisdictions world whereas content may offensive non-specific way harassment directs obscenities derogatory comments specific individuals focusing example gender race religion nationality sexual orientation often occurs chat rooms newsgroups sending hate e-mail interested parties harassment internet also includes revenge porn instances committing crime using computer lead enhanced sentence example case united states v. neil scott kramer kramer served enhanced sentence according u.s sentencing guidelines manual §2g1.3 b 3 use cell phone persuade induce entice coerce facilitate travel minor engage prohibited sexual conduct kramer argued claim insufficient charge included persuading computer device cellular phone technically computer although kramer tried argue point u.s sentencing guidelines manual states term computer means electronic magnetic optical electrochemically high-speed data processing device performing logical arithmetic storage functions includes data storage facility communications facility directly related operating conjunction device connecticut u.s. state pass statute making criminal offense harass someone computer michigan arizona virginia south carolina also passed laws banning harassment electronic means harassment defined u.s. computer statutes typically distinct cyberbullying former usually relates person use computer computer network communicate obscene vulgar profane lewd lascivious indecent language make suggestion proposal obscene nature threaten illegal immoral act latter need involve anything sexual nature although freedom speech protected law democratic societies us done first amendment include types speech fact spoken written true threat speech/text criminalized intent harm intimidate also applies online type network related threats written text speech us supreme court definition true threat statements speaker means communicate serious expression intent commit act unlawful violence particular individual group darknet markets used buy sell recreational drugs online drug traffickers use encrypted messaging tools communicate drug mules dark web site silk road major online marketplace drugs shut law enforcement reopened new management shut law enforcement silk road 2.0 went silk road 3 reloaded emerged however older marketplace named diabolus market used name exposure brand previous success broad diffusion cybercriminal activities issue computer crimes detection prosecution according jean-loup richet associate professor sorbonne business school technical expertise accessibility longer act barriers entry cybercrime indeed hacking much less complex years ago hacking communities greatly diffused knowledge internet blogs communities hugely contributed information sharing beginners could benefit older hackers knowledge advice furthermore hacking cheaper ever cloud computing era order spam scam one needed dedicated server skills server management network configuration maintenance knowledge internet service provider standards etc comparison mail software-as-a-service scalable inexpensive bulk transactional e-mail-sending service marketing purposes could easily set spam jean-loup richet explains cloud computing could helpful cybercriminal way leverage attack – brute-forcing password improve reach botnet facilitating spamming campaign computer source evidence see digital forensics even computer directly used criminal purposes may contain records value criminal investigators form logfile countries internet service providers required law keep logfiles predetermined amount time example european wide data retention directive applicable eu member states states e-mail traffic retained minimum 12 months method cybercrime investigation many ways cybercrime take place investigations tend start ip address trace however necessarily factual basis upon detectives solve case different types high-tech crime may also include elements low-tech crime vice versa making cybercrime investigators indispensable part modern law enforcement method cybercrime detective work dynamic constantly improving whether closed police units international cooperation framework due easily exploitable laws cybercriminals use developing countries order evade detection prosecution law enforcement developing countries philippines laws cybercrime weak sometimes nonexistent weak laws allow cybercriminals strike international borders remain undetected even identified criminals avoid punished extradited country united states developed laws allow prosecution proves difficult cases agencies fbi used deception subterfuge catch criminals example two russian hackers evading fbi time fbi set fake computing company based seattle washington proceeded lure two russian men united states offering work company upon completion interview suspects arrested outside building clever tricks like sometimes necessary part catching cybercriminals weak legislation makes impossible otherwise then-president barack obama released executive order april 2015 combat cybercrime executive order allows united states freeze assets convicted cybercriminals block economic activity within united states first solid legislation combats cybercrime way european union adopted directive 2013/40/eu offences directive definitions procedural institutions also council europe convention cybercrime.. usa european union introducing new measures cybercrime 31 may 2017 china announced new cybersecurity law takes effect date penalties computer-related crimes new york state range fine short period jail time class misdemeanor unauthorized use computer computer tampering first degree class c felony carry 3 15 years prison however hackers hired information security experts private companies due inside knowledge computer crime phenomenon theoretically could create perverse incentives possible counter courts ban convicted hackers using internet computers even released prisonthough computers internet become central everyday life type punishment may viewed harsh draconian however nuanced approaches developed manage cyber offenders behavior without resorting total computer internet bans approaches involve restricting individuals specific devices subject computer monitoring computer searches probation parole officers technology advances people rely internet store sensitive information banking credit card information criminals increasingly attempt steal information cybercrime becoming threat people across world raising awareness information protected tactics criminals use steal information continues grow importance according fbi internet crime complaint center 2014 269,422 complaints filed claims combined reported total loss 800,492,073 cybercrime yet seem average person radar 1.5 million cyber-attacks annually means 4,000 attacks day 170 attacks every hour nearly three attacks every minute studies showing us 16 victims asked people carrying attacks stop anybody uses internet reason victim important aware one protected online cybercrime proliferated professional ecosystem evolved support individuals groups seeking profit cybercriminal activities ecosystem become quite specialized including malware developers botnet operators professional cybercrime groups groups specializing sale stolen content forth leading cybersecurity companies skills resources visibility follow activities individuals group wide variety information available sources used defensive purposes including technical indicators hashes infected files malicious ips/urls well strategic information profiling goals techniques campaigns profiled groups freely published consistent on-going access typically requires subscribing adversary intelligence subscription service level individual threat actor threat intelligence often referred actor ttp tactics techniques procedures infrastructure tools technical indicators often trivial attackers change corporate sectors considering crucial role artificial intelligence cybersecurity | [
7553,
3843,
4356,
5636,
5764,
7044,
8202,
11146,
1169,
4883,
2324,
1429,
3092,
7574,
7827,
9087,
3354,
9630,
8735,
5675,
11437,
8368,
1970,
1975,
4023,
11577,
7228,
11583,
704,
1088,
4163,
1861,
6091,
4813,
9550,
4689,
2643,
7929,
9688,
1... | Test |
4,946 | 3 | Pachicom:pachicom game pachinko hugely popular japan since involves playing pinball element slot machines mixed along gambling four different gameplay modes choose two assign player pachinko machine two allow players choose machine game based standard pachinko rules replicating experience playing pachinko parlor game board layout nails sticking metal balls would either fall holes created pegs order traverse board certain compartments added board metal ball find way one compartments player receive points similar credits slot machine players expect lose ball point falls bottom board similar falling bottomless pit action game initially player starts one hundred balls points mode clock goes forward 000000 seconds reaches 999999 seconds equivalent either 16666.65 non-real time minutes 2777.775 non-real time hours 115.740625 non-real time days occurs game remaining points stored top three score list mode b except clock goes backwards 999999 seconds way back 000000 seconds easy mash button repeatedly around direction pad right order accumulate mass winnings pachinko games cheat system hidden message famicom version found hex editor almost five percent entire rom 2.05 kilobytes 41 kilobyte rom image taken otherwise inaccessible message message written romaji features lengthy rant towards game executives harshly criticizing forcing changes fly particularly sound effects even showing replace initially intended sounds much shorter rant presumably written person also romaji accessed via hex editor included msx release | [
10931,
9006
] | Train |
4,947 | 3 | Superstabilization:superstabilization superstabilization concept fault-tolerance distributed computing superstabilizing distributed algorithms combine features self-stabilizing algorithms dynamic algorithms superstabilizing algorithm – like self-stabilizing algorithm – started arbitrary state eventually converge legitimate state additionally superstabilizing algorithm recover rapidly single change network topology adding removing one edge node network self-stabilizing algorithm recovers change network topology – system configuration topology change treated like arbitrary starting configuration however self-stabilizing algorithm convergence single change network topology may slow convergence arbitrary starting state study superstabilizing algorithms special attention paid time takes recover single change network topology stabilization time superstabilizing algorithm defined exactly case self-stabilizing algorithm long takes converge legitimate state arbitrary configuration depending computational model time measured e.g. synchronous communication rounds asynchronous cycles superstabilization time time recover single topology change assumed system initially legitimate configuration network topology changed superstabilization time maximum time takes system reach legitimate configuration similarly adjustment measure maximum number nodes change state changes “ almost-legitimate configurations ” occurs one topology change formally modelled using passage predicates passage predicate predicate holds single change network topology also convergence legitimate configuration | [
2012
] | None |
4,948 | 4 | Attack_tree:attack tree attack trees conceptual diagrams showing asset target might attacked attack trees used variety applications field information technology used describe threats computer systems possible attacks realize threats however use restricted analysis conventional information systems widely used fields defense aerospace analysis threats tamper resistant electronics systems e.g. avionics military aircraft attack trees increasingly applied computer control systems especially relating electric power grid attack trees also used understand threats physical systems earliest descriptions attack trees found papers articles bruce schneier cto counterpane internet security schneier clearly involved development attack tree concepts instrumental publicizing however attributions early publicly available papers attack trees also suggest involvement national security agency initial development attack trees similar identical threat trees threat trees discussed 1994 edward amoroso attack trees multi-leveled diagrams consisting one root leaves children bottom child nodes conditions must satisfied make direct parent node true root satisfied attack complete node may satisfied direct child nodes node may child another node case becomes logical multiple steps must taken carry attack example consider classroom computers secured desks steal one securing cable must cut lock unlocked lock may unlocked picking obtaining key key may obtained threatening key holder bribing keyholder taking stored e.g mousemat thus four level attack tree drawn one path bribe keyholder obtain key unlock lock steal computer note also attack described node may require one many attacks described child nodes satisfied condition shows conditions however condition created example assuming electronic alarm must disabled cable cut rather making task child node cutting lock tasks simply reach summing junction thus path disable alarm cut cable steal computer created attack trees related established fault tree formalism fault tree methodology employs boolean expressions gate conditions parent nodes satisfied leaf nodes including priori probabilities node possible perform calculate probabilities higher nodes using bayes rule however reality accurate probability estimates either unavailable expensive gather respect computer security active participants i.e. attackers probability distribution events probably independent uniformly distributed hence naive bayesian analysis unsuitable since bayesian analytic techniques used fault tree analysis legitimately applied attack trees analysts instead use techniques determine attacks preferred particular attacker may involve comparing attacker capabilities time money skill equipment resource requirements specified attack attacks near beyond attacker ability perform less preferred attacks perceived cheap easy degree attack satisfies adversary objectives also affects attacker choices attacks within adversary capabilities satisfy goals likely attack trees become large complex especially dealing specific attacks full attack tree may contain hundreds thousands different paths leading completion attack even trees useful determining threats exist deal attack trees lend defining information assurance strategy important consider however implementing policy execute strategy changes attack tree example computer viruses may protected refusing system administrator access directly modify existing programs program folders instead requiring package manager used adds attack tree possibility design flaws exploits package manager one could observe effective way mitigate threat attack tree mitigate close root possible although theoretically sound usually possible simply mitigate threat without implications continued operation system example threat viruses infecting windows system may largely reduced using standard non-administrator account ntfs instead fat file system normal users unable modify operating system implementing negates way foreseen unforeseen normal user may come infect operating system virus however also requires users switch administrative account carry administrative tasks thus creating different set threats tree operational overhead also users still able infect files write permissions may include files documents systems using cooperative agents dynamically examine identify vulnerability chains creating attack trees built since 2000 several commercial packages open source products available adtool university luxembourg ent seamonster attacktree+ isograph secur ree amenaza technologies | [
3552,
9762,
1315,
483,
612,
5636,
5067,
7979,
1453,
6797,
7887,
8976,
2193,
3473,
7739,
2558
] | None |
4,949 | 2 | BrickOS:brickos brickos previously legos developed markus noga alternative operating system lego mindstorms rcx controller also provides c/c++ development environment rcx programs using gcc g++ gnu c c++ cross compilation tool chain necessary tools download programs rcx | [
2179,
2045,
7983
] | Validation |
4,950 | 7 | Cloud_broker:cloud broker cloud broker entity manages use performance delivery cloud services negotiates relationships cloud providers cloud consumers cloud computing evolves integration cloud services may complex cloud consumers manage alone cases cloud consumer may request cloud services cloud broker instead contacting cloud provider directly according nist cloud computing reference architecture cloud brokers provides single point entry manage multiple cloud services business technical purposes two important unique features cloud broker ability provide single consistent interface multiple differing cloud providers clear visibility broker allows company providing services background general cloud brokers provide services three categories benefits using cloud broker business technical purpose include following pay needed cloud brokers provide selected assortment services required consumer despite benefits cloud broker provide also concerns related use cloud broker | [
4194
] | Test |
4,951 | 2 | Ubuntu_Software_Center:ubuntu software center ubuntu software center simply software center discontinued high-level graphical front end apt/dpkg package management system free software written python pygtk/pygobject based gtk+ program created adding managing repositories well ubuntu personal package archives ppa ubuntu ubuntu software center also allowed users purchase commercial applications development ended 2015 ubuntu 16.04 lts replaced gnome software early 2009 ubuntu developers noted package management within ubuntu could improved consolidated recent releases ubuntu ubuntu 9.04 jaunty jackalope included five applications package management consumed space resources well provide confusion users applications could downloaded using basic add/remove applications synaptic package manager software updater provided updating installed packages computer janitor cleaned packages longer needed software sources application allowed user selection package download location ubuntu developers set goal canonical introduced software center gradually starting ubuntu 9.10 karmic koala complete functionality expected ubuntu 11.10 october 2011 may 2011 plan mostly completed august 2015 chris hoffman pc world criticized application indicating canonical maintaining properly work replacement application pursued particular noted paid applications supported properly canonical informed developers application still works installing managing free software applications november 2015 canonical announced development would end application would replaced gnome software ubuntu 16.04 lts examples high-level graphical front end apt | [
10760,
7181,
8213,
6680,
10270,
5670,
7722,
9262,
3131,
3649,
10817,
3654,
3152,
1107,
3667,
6227,
4192,
9324,
6257,
1138,
3189,
5755,
7293,
10368,
10900,
3745,
4775,
6828,
3245,
5819,
190,
6361,
8413,
5343,
741,
231,
7913,
7920,
9971,
53... | None |
4,952 | 7 | Open_Garden:open garden open garden inc. american company based san francisco california develops free closed source mobile application called firechat enables peer-to-peer mobile internet connection sharing faster efficient data transmissions automatically actively choosing switching best available network without requiring users manually sift available networks find best one available open garden supports promotes open wireless networks member open wireless coalition founded electronic frontier foundation open garden inc. co-founded 2011 businessman micha benoliel systems architect taylor ongaro internet architect stanislav shalunov software developer greg hazel san francisco california united states company co-founders share similar backgrounds internet infrastructure peer-to-peer technology period 2004 2005 benoliel working skype well negotiating deals european telecommunication companies provided fundamentals skype skype ongaro spent much career ibm federal chief technology office meanwhile shalunov spent much career working internet infrastructure beginning internet2 us academic network consortium peer-to-peer filesharing service bittorrent met hazel lead developer popular bittorrent client utorrent used 200 million peer-to-peer users worldwide currently open garden popular united states followed india mexico france brazil united kingdom italy spain germany company already talking number mobile carriers countries cooperation currently working raising additional capital kevin restivo senior analyst international data corporation stated open garden likely popular among consumers emerging mobile markets africa relatively people cell phones incomes low people likely share phone service open garden previously offered software solution name proprietary internet community-based connection sharing software application shares internet access devices using wi-fi bluetooth users direct internet connection available within open garden network application automatically connects internet links devices laptops mobile phones person whose internet connection shared leaves network application automatically detects connects next best available connection introducing way access internet multiple channels one time improving speed reliability network self-healing self-forming nodes operates local knowledge together build network using probabilistic distributed algorithm open garden ’ solution built software rather hardware requires operational expenses minimal capital expenses mobile operators compared alternatives femtocells microcells raising 2 million seed money group leading technology industry angel investors open garden started developing incorporating roll multi-hop connectivity channel bonding application features company ’ roadmap since launched new funding team led allan green early investor phone.com mobileway david ulevitch ceo opendns derek parham creator google apps business digital garage also invested twitter path application free download open garden key people stated intend use freemium business model plan obtain revenues special enterprise-level services business customers sponsorships advertising also said aim freemium model extra features like vpn access business users application available android devices mac open garden product introduced october 11 2011 android open 2011 startup showcase award may 26 2012 open garden innovative startup award techcrunch disrupt conference 2012 toward end conference one judges venture capitalist fred wilson union square ventures said open garden favorite along stating company worthy conference name disrupt following year october 23 2013 open garden g-startup award global mobile innovator conference beginning mobile carriers afraid losing revenue might obtain mobile internet users one carrier requested google play block customers access open garden spokesman mark siegel stated open garden violates company policies enabling unauthorized tethering mobile connection sharing open garden founder ceo micha benoliel stated company anything illegal block remains force january 2014 circumvented sideloading apk made available open garden mobile website | [
8640,
3428,
10021,
5382,
3207,
9610,
8413
] | None |
4,953 | 4 | Arptables:arptables arptables computer software utility network administrator tool maintaining address resolution protocol arp packet filter rules linux kernel firewall modules tools may used create update view tables contain filtering rules similarly iptables program developed popular application creation filter configurations prevent arp spoofing linux kernel 2.4 offers two arp filtering chains input output linux kernel 2.6 adds third forward applied bridging packets | [
1792,
2049,
4480,
6797,
1172,
9496,
3482,
1436,
4511,
6431,
5924,
550,
8998,
10790,
1708,
3885,
8753,
823,
569,
5178,
11577,
5437,
5057,
1858,
10433,
11073,
2118,
4814,
9423,
10574,
7121,
10708,
4568,
9048,
2907,
6364,
5860,
3942,
8943,
8... | Test |
4,954 | 6 | Scality:scality scality global company based san francisco california develops software-defined object storage scality scale-out object storage software platform called ring company commercial product scality ring software deploys industry-standard x86 servers store objects files scality also offers number open source tools called zenko including zenko cloudserver compatible amazon s3 api scality founded 2009 jérôme lecat giorgio regni daniel binsfeld serge dugas brad king scality raised 7 million venture capital funding march 2011 c-round 22 million announced june 2013 led menlo ventures iris capital participation fsn pme existing investors including idinvest partners omnes capital galileo partners scality raised 45 million august 2015 series funding led menlo ventures participation existing investors one new strategic investor broadband tower 2016 hpe made strategic investment company april 2018 company announced 60 million round funding scality announced refreshed brand along global distribution agreement hp october 2014 scality added dell cisco global resellers 2015 scality principal product scale-out object storage software platform known ring scality ring delivers petabyte-scale software-defined storage designed use commodity hardware characterized cost-effective scaling performance auto-recovery scality ring multitier architecture scale thousands servers 100 petabytes single global namespace allows customers deploy performance-optimized capacity-optimized storage varied data durability levels small large object file support single global namespace object storage one fastest growing segments enterprise storage market according idc report “ worldwide file – object – based storage forecast 2016 – 2020 ” idc us41685816 september 2016 estimated object-based storage capacity expected grow cagr 30.7 percent 2016 2020 reaching 293.7eb 2020.the scality ring software turns standard x86 servers web-scale storage ring store amount data type incredible efficiency 100 availability guaranteed—all reducing costs much 90 legacy systems zenko scality open source multi-cloud data controller zenko integrates data managed on-premises services available public clouds zenko cloudserver formerly scality s3 server amazon web services simple storage service-compatible open source object storage server code written node.js single instance running docker container uses docker volumes persistent storage cloudserver uses code scality ring s3 interface includes apache 2.0 license note distributed system paid version s3 enterprise however level compatibility s3 interface scality ring zenko orbit cloud-based portal data placement workflows global metadata search product enables asynchronous replication clouds scality recognized consistently years object-based storage idc gartner first magic quadrant distributed file systems object storage scality ranked leader scality 2014 storage system software finalist storage magazine 2017 scality ranked leader gartner magic quadrant distributed file systems object storage | [
11201,
7364,
3909,
5384,
1801,
4011,
7248,
8404,
1400,
2395
] | Test |
4,955 | 9 | Prototype_Verification_System:prototype verification system prototype verification system pvs specification language integrated support tools automated theorem prover developed computer science laboratory sri international menlo park california pvs based kernel consisting extension church theory types dependent types fundamentally classical typed higher-order logic base types include uninterpreted types may introduced user built-in types booleans integers reals ordinals type-constructors include functions sets tuples records enumerations abstract data types predicate subtypes dependent types used introduce constraints constrained types may incur proof obligations called type-correctness conditions tccs typechecking pvs specifications organized parameterized theories system implemented common lisp released gnu general public license gpl | [
8450,
5796,
8262,
2062,
4791
] | None |
4,956 | 4 | Security_hacker:security hacker security hacker someone explores methods breaching defenses exploiting weaknesses computer system network hackers may motivated multitude reasons profit protest information gathering challenge recreation evaluate system weaknesses assist formulating defenses potential hackers subculture evolved around hackers often referred computer underground longstanding controversy surrounds meaning term hacker controversy computer programmers reclaim term hacker arguing refers simply someone advanced understanding computers computer networks cracker appropriate term break computers whether computer criminals black hats computer security experts white hats 2014 article noted ... black-hat meaning still prevails among general public computer security hacker someone focuses security mechanisms computer network systems including endeavor strengthen mechanisms often used mass media popular culture refer seek access despite security measures media portrays 'hacker villain nevertheless parts subculture see aim correcting security problems use word positive sense white hat name given ethical computer hackers utilize hacking helpful way white hats becoming necessary part information security field operate code acknowledges breaking people computers bad discovering exploiting security mechanisms breaking computers still interesting activity done ethically legally accordingly term bears strong connotations favorable pejorative depending context subculture around hackers termed network hacker subculture hacker scene computer underground initially developed context phreaking 1960s microcomputer bbs scene 1980s implicated alt.2600 newsgroup 1980 article august issue psychology today commentary philip zimbardo used term hacker title hacker papers excerpt stanford bulletin board discussion addictive nature computer use 1982 film tron kevin flynn jeff bridges describes intentions break encom computer system saying 've little hacking clu software uses 1983 hacking sense breaking computer security already use computer jargon public awareness activities however release film wargames year featuring computer intrusion norad raised public belief computer security hackers especially teenagers could threat national security concern became real year gang teenage hackers milwaukee wisconsin known 414s broke computer systems throughout united states canada including los alamos national laboratory sloan-kettering cancer center security pacific bank case quickly grew media attention 17-year-old neal patrick emerged spokesman gang including cover story newsweek entitled beware hackers play patrick photograph cover newsweek article appears first use word hacker mainstream media pejorative sense pressured media coverage congressman dan glickman called investigation began work new laws computer hacking neal patrick testified u.s. house representatives september 26 1983 dangers computer hacking six bills concerning computer crime introduced house year result laws computer criminality white hat grey hat black hat hackers try distinguish depending legality activities moral conflicts expressed mentor hacker manifesto published 1986 phrack use term hacker meaning computer criminal also advanced title stalking wily hacker article clifford stoll may 1988 issue communications acm later year release robert tappan morris jr. so-called morris worm provoked popular media spread usage popularity stoll book cuckoo egg published one year later entrenched term public consciousness several subgroups computer underground different attitudes use different terms demarcate try exclude specific group agree eric s. raymond author new hacker dictionary advocates members computer underground called crackers yet people see hackers even try include views raymond see wider hacker culture view raymond harshly rejected instead hacker/cracker dichotomy emphasize spectrum different categories white hat grey hat black hat script kiddie contrast raymond usually reserve term cracker malicious activity according ralph d. clifford cracker cracking gain unauthorized access computer order commit another crime destroying information contained system subgroups may also defined legal status activities white hat hacker breaks security non-malicious reasons either test security system perform penetration tests vulnerability assessments client working security company makes security software term generally synonymous ethical hacker ec-council among others developed certifications courseware classes online training covering diverse arena ethical hacking black hat hacker hacker violates computer security little reason beyond maliciousness personal gain moore 2005 term coined richard stallman contrast maliciousness criminal hacker versus spirit playfulness exploration hacker culture ethos white hat hacker performs hacking duties identify places repair means legitimate employment black hat hackers form stereotypical illegal hacking groups often portrayed popular culture epitome public fears computer criminal grey hat hacker lies black hat white hat hacker grey hat hacker may surf internet hack computer system sole purpose notifying administrator system security defect example may offer correct defect fee grey hat hackers sometimes find defect system publish facts world instead group people even though grey hat hackers may necessarily perform hacking personal gain unauthorized access system considered illegal unethical social status among hackers elite used describe skilled newly discovered exploits circulate among hackers elite groups masters deception conferred kind credibility members script kiddie also known skid skiddie unskilled hacker breaks computer systems using automated tools written others usually black hat hackers hence term script i.e computer script automates hacking kiddie i.e kid child—an individual lacking knowledge experience immature usually little understanding underlying concept neophyte newbie noob someone new hacking phreaking almost knowledge experience workings technology hacking blue hat hacker someone outside computer security consulting firms used bug-test system prior launch looking exploits closed microsoft also uses term bluehat represent series security briefing events hacktivist hacker utilizes technology publicize social ideological religious political message hacktivism divided two main groups intelligence agencies cyberwarfare operatives nation states groups hackers carry organized criminal activities profit typical approach attack internet-connected system order several recurring tools trade techniques used computer criminals security experts security exploit prepared application takes advantage known weakness common examples security exploits sql injection cross-site scripting cross-site request forgery abuse security holes may result substandard programming practice exploits would able used file transfer protocol ftp hypertext transfer protocol http php ssh telnet web pages common web site web domain hacking tools procedures computer underground produced specialized slang 1337speak members often advocate freedom information strongly opposing principles copyright well rights free speech privacy writing software performing activities support views referred hacktivism consider illegal cracking ethically justified goals common form website defacement computer underground frequently compared wild west common hackers use aliases conceal identities computer underground supported regular real-world gatherings called hacker conventions hacker cons events include summercon summer def con hohocon christmas shmoocon february blackhat chaos communication congress athcon hacker halted hope local hackfest groups organize compete develop skills send team prominent convention compete group pentesting exploit forensics larger scale hacker groups became popular early 1980s providing access hacking information resources place learn members computer bulletin board systems bbss utopias provided platforms information-sharing via dial-up modem hackers could also gain credibility affiliated elite groups maximum imprisonment one year fine fourth category commonly known computer fraud abuse act prohibits unauthorized access damage protected computers protected computers defined maximum imprisonment fine violations computer fraud abuse act depends severity violation offender history violations act notable hacker-oriented print publications phrack hakin9 information contained hacker magazines ezines often outdated time published enhanced contributors reputations documenting successes hackers often show interest fictional cyberpunk cyberculture literature movies adoption fictional pseudonyms symbols values metaphors works common | [
9217,
11266,
1540,
5636,
10756,
11,
2067,
4117,
3094,
9240,
7710,
9248,
3619,
2084,
7717,
4140,
3629,
8753,
10295,
6712,
7739,
7228,
10300,
1087,
9791,
4163,
2634,
4689,
8274,
2643,
8787,
11347,
7257,
8288,
6754,
8803,
3172,
10341,
4198,
... | Test |
4,957 | 4 | IOS_jailbreaking:ios jailbreaking ios jailbreaking privilege escalation apple device purpose removing software restrictions imposed apple ios tvos watchos operating systems typically done using series kernel patches jailbreaking permits root access ios allowing installation software unavailable official apple app store many types jailbreaking available different versions apple publicly disapproves jailbreaking apple implemented hardware software fixes vulnerabilities used jailbreaks meaning many versions ios jailbroken immediately analogous rooting android although software unavailable google play installed android without rooting one reasons jailbreaking expand feature set limited apple app store apple checks apps compliance ios developer program license agreement accepting distribution app store however reasons banning apps limited safety security may regarded arbitrary capricious one case apple mistakenly banned app pulitzer-winning cartoonist violated developer license agreement specifically bans apps contain content ridicules public figures access banned apps users rely jailbreaking circumvent apple censorship content features jailbreaking permits downloading programs approved apple user interface customization tweaks since software programs available apt installer.app legacy required adhere app store guidelines many typical self-contained apps instead extensions customization options ios apps commonly called tweaks users install programs purposes including personalization customization interface tweaks developed developers designers adding desired features fixing annoyances making development work device easier providing access filesystem command-line tools many chinese ios device owners also jailbreak phones install third-party chinese character input systems easier use apple jailbreaking also opens possibility using software unofficially unlock carrier-locked iphones used carriers software-based unlocks available since september 2007 tool applying specific iphone model baseband version multiple models versions includes iphone 4s iphone 4 iphone 3gs iphone 3g models example unlocking iphone jailbreak utility would redsn0w software iphone users able create custom ipsw unlock device moreover unlocking process options install cydia ipad baseband computer criminals may jailbreak iphone install malware target jailbroken iphones malware installed easily italian cybersecurity company hacking team sells hacking software law enforcement agencies advised police jailbreak iphones allow tracking software installed iphones installation consumer software generally restricted installation app store jailbreaking therefore allows installation pirated applications suggested major motivation apple prevent jailbreaking protect income app store including third-party developers allow buildup sustainable market third-party software however installation pirated applications also possible without jailbreaking taking advantage enterprise certificates facilitate distribution modified pirated releases popular applications jailbroken device booting loads apple kernel initially device exploited kernel patched every time turned many different types jailbreaks come years untethered jailbreak jailbreak require assistance reboots kernel patched without help computer application jailbreaks uncommon take significant amount reverse engineering create tethered jailbreak opposite untethered jailbreak sense computer required boot device boot using tethered jailbreak user still able restart/kill springboard without needing reboot mix untethered tethered jailbreak also option namely semi-tethered type jailbreak allows user reboot patched kernel non-jailbroken functions still run making phone call texting using app able patched kernel run modified code device must booted using computer type jailbreak become popular recent years semi-untethered variant type jailbreak like semi-tethered jailbreak device reboots longer patched kernel kernel patched without using computer kernel usually patched using application installed device recent jailbreaks semi-untethered variant jailbreaking ios devices sometimes compared rooting android devices although concepts involve privilege escalation differ scope android devices allow users modify replace operating system unlocking bootloader moreover nearly android phones option allow user install unknown 3rd-party apps exploit needed normal sideloading ios engineered security measures including locked bootloader prevent users modifying operating system prevent apps gaining root privileges jailbreaking ios device defeat security measures presents significant technical challenge violates apple end-user license agreement ios 2015 sideloading apps general difficult individual users requiring purchase developer membership corporations could install private applications onto corporate phones 2015 became free users however requires basic understanding xcode compiling ios apps apps installed way restrictions apps addition alternative app stores utilising enterprise certificates sprung offering modified pirated releases popular ios applications video games either previously released cydia unavailable app store due complying apple developer guidelines first iphone worm ikee appeared early november 2009 created 21-year-old australian student town wollongong told australian media created worm raise awareness security issues jailbreaking allows users install ssh service users leave default insecure state month f-secure reported new malicious worm compromising bank transactions jailbroken phones netherlands similarly affecting devices owner installed ssh without changing default password 2010 blogger john gruber close apple said users misunderstood jailbreak exploits serious appear commented odd press mostly covering 'jailbreaking convenient rather 'remote code exploit wild pointing exploit allowed creator malicious website take control iphones accessing restoring device itunes removes jailbreak however generally updates device latest possibly non-jailbreakable version due apple use shsh blobs many applications aim prevent restoring devices version currently running whilst removing jailbreaks examples succession semi-restore cydia eraser 2012 forbes staff analyzed ucsb study 1,407 free programs available apple third party source 1,407 free apps investigated 825 downloaded apple app store using website app tracker 526 bigboss cydia default repository 21 official apps tested leaked device id 4 leaked location unofficial apps leaked 4 0.2 respectively 0.2 apps cydia leaked photos browsing history app store leaked none unauthorized apps tended respect privacy better official ones also program available cydia called privacy allows user control upload usage statistics remote servers august 2015 keyraider malware discovered affects jailbroken iphones apple released various updates ios patch exploits used jailbreak utilities includes patch released ios 6.1.3 software exploits used original evasi0n ios 6–6.1.2 jailbreak ios 7.1 patching evasi0n 7 jailbreak ios 7–7.0.6-7.1 beta 3 bootroom exploits exploits found hardware device patched apple system updates fixed hardware revisions new chips new hardware entirety occurred iphone 3gs 2009 july 15 2011 apple released new ios version closed exploit used jailbreakme 3.0 german federal office information security reported jailbreakme uncovered critical weakness information could stolen malware unwillingly downloaded ios users clicking maliciously crafted pdf files apple released fix security hole jailbreak users access fix published developer jailbreakme january 27 2015 apple released ios 8.1.3 patched exploits used jailbreak ios 8.0-8.1.2 possible jailbreak ios 8.3 update ios 9.1 update october 21 2015 included patch pangu ios 9.0-9.0.2 jailbreak august 13 2015 apple updated ios 8.4.1 patching taig exploit pangu taig teams said working exploiting ios 8.4.1 pangu demonstrated chances wwdc 2015 september 16 2015 ios 9 announced made available released new rootless security system dubbed heavy blow jailbreaking community october 21 2015 seven days pangu ios 9.0-9.0.2 jailbreak release apple pushed ios 9.1 update contained patch rendered nonfunctional august 4 2016 apple released ios version 9.3.4 patch semi-untethered jailbreak 64-bit devices august 25 2016 apple released ios version 9.3.5 patch three important vulnerabilities used secret jailbreak pegasus malware nso group january 23 2017 apple released ios 10.2.1 patch jailbreak exploits released google yalu ios 10 jailbreak created luca todesco december 2 2017 ios 11.2 released included patch async_wake exploit ian beer google project zero may 29 2018 ios 11.4 released including patch 2 exploits empty_list multi_path ian beer google project zero january 22 2019 ios 12.1.3 released including patch exploit voucher_swap found independently brandon azad google project zero zhuo liang qihoo 360 nirvan team may 13 2019 ios 12.3 released including patch exploit sock_puppet ned williamson google project zero however 18th august 2019 bacame known apple accidentally reintroduced vulnerabilities ios 12.4 making possible jailbreak 12.4 exploits pre-12.3 versions apple n't patched 12.4.1 version yet legal status jailbreaking affected laws regarding circumvention digital locks laws protecting digital rights management drm mechanisms many countries laws countries laws including exceptions jailbreaking international treaties influenced development laws affecting jailbreaking 1996 world intellectual property organization wipo copyright treaty requires nations party treaties enact laws drm circumvention american implementation digital millennium copyright act dmca includes process establishing exemptions non-copyright-infringing purposes jailbreaking 2001 european copyright directive implemented treaty europe requiring member states european union implement legal protections technological protection measures copyright directive includes exceptions allow breaking measures non-copyright-infringing purposes jailbreaking run alternative software member states vary implementation directive apple technically support jailbreaking violation eula jailbreaking communities generally legally threatened apple least two prominent jailbreakers given positions apple albeit least one case temporary one apple also regularly though possibly somewhat jokingly thanked jailbreak communities detecting security holes ios release notes apple support article concerning jailbreaking claims may deny service iphone ipad ipod touch installed unauthorized software therefore anyone jailbroken warranty may may get support apple considering assistance jailbreaking 2010 electronic frontiers australia said unclear whether jailbreaking legal australia anti-circumvention laws may apply laws strengthened copyright amendment act 2006 november 2012 canada amended copyright act new provisions prohibiting tampering drm protection exceptions including software interoperability jailbreaking device run alternative software form circumventing digital locks purpose software interoperability several efforts 2008–2011 amend copyright act bill c-60 bill c-61 bill c-32 prohibit tampering digital locks along initial proposals c-11 restrictive bills set aside 2011 michael geist canadian copyright scholar cited iphone jailbreaking non-copyright-related activity overly-broad copyright act amendments could prohibit india copyright law permits circumventing drm non-copyright-infringing purposes parliament introduced bill including drm provision 2010 passed 2012 copyright amendment bill 2012 india signatory wipo copyright treaty requires laws drm circumvention listed us special 301 report priority watch list applied pressure develop stricter copyright laws line wipo treaty new zealand copyright law allows use technological protection measure tpm circumvention methods long use legal non-copyright-infringing purposes law added copyright act 1994 part copyright new technologies amendment act 2008 jailbreaking might legal singapore done provide interoperability circumvent copyright tested court law copyright related rights regulations 2003 makes circumventing drm protection measures legal purpose interoperability copyright infringement jailbreaking may form circumvention covered law tested court competition laws may also relevant main law affects legality ios jailbreaking united states 1998 digital millennium copyright act dmca says person shall circumvent technological measure effectively controls access work protected dmca since may apply jailbreaking every three years law allows public propose exemptions legitimate reasons circumvention last three years approved 2010 2012 u.s copyright office approved exemptions allowed smartphone users jailbreak devices legally 2015 copyright office approved expanded exemption also covers all-purpose mobile computing devices tablets still possible apple may employ technical countermeasures prevent jailbreaking prevent jailbroken phones functioning unclear whether legal traffic tools used make jailbreaking easy 2010 apple announced jailbreaking violate warranty may affected magnuson-moss warranty act 1975 2007 tim wu professor columbia law school argued jailbreaking apple superphone legal ethical plain fun wu cited explicit exemption issued library congress 2006 personal carrier unlocking notes locks used wireless carriers limit ability subscribers switch carriers business decision nothing whatsoever interests protected copyright thus implicate dmca wu claim exemption applies help others unlock device traffic software 2010 response request electronic frontier foundation u.s copyright office explicitly recognized exemption dmca permit jailbreaking order allow iphone owners use phones applications available apple store unlock iphones use unapproved carriers apple previously filed comments opposing exemption indicated considered jailbreaking violation copyright implication prosecutable dmca apple request define copyright law include jailbreaking violation denied part 2009 dmca rulemaking ruling library congress affirmed july 26 2010 jailbreaking exempt dmca rules respect circumventing digital locks dmca exemptions must reviewed renewed every three years else expire october 28 2012 us copyright office released new exemption ruling jailbreaking smartphones continued legal circumvention accomplished sole purpose enabling interoperability lawfully obtained software applications computer programs telephone handset however u.s copyright office refused extend exemption tablets ipads arguing term tablets broad ill-defined exemption class devices could unintended side effects copyright office also renewed 2010 exemption unofficially unlocking phones use unapproved carriers restricted exemption phones purchased january 26 2013 days original iphone became available july 2007 developers released first jailbreaking tool soon jailbreak-only game app became available october 2007 jailbreakme 1.0 also called appsnapp allowed people jailbreak iphone os 1.1.1 iphone ipod touch included installer.app way get software jailbroken device february 2008 zibri released ziphone tool jailbreaking iphone os 1.1.3 iphone os 1.1.4 iphone dev team affiliated apple released series free desktop-based jailbreaking tools july 2008 released version pwnagetool jailbreak new iphone 3g iphone os 2.0 well ipod touch newly including cydia primary third-party installer jailbroken software pwnagetool continues updated untethered jailbreaks newer ios versions november 2008 iphone dev team released quickpwn jailbreak iphone os 2.2 iphone ipod touch options enable past functionality apple disabled certain devices apple released ios 3.0 june 2009 dev team published redsn0w simple jailbreaking tool mac windows also updated pwnagetool primarily intended expert users making custom firmware mac continues maintain redsn0w jailbreaking versions ios 4 ios 5 devices george hotz developed first iphone unlock 2009 released jailbreaking tool iphone 3gs iphone os 3.0 called purplera1n blackra1n iphone os version 3.1.2 3rd generation ipod touch devices october 2010 released limera1n low-level boot rom exploit permanently works jailbreak iphone 4 used part tools including redsn0w nicholas allegra better known comex released program called spirit may 2010 spirit jailbreaks devices including iphones running iphone os 3.1.2 3.1.3 ipad running ios 3.2 august 2010 comex released jailbreakme 2.0 first web-based tool jailbreak iphone 4 ios 4.0.1 july 2011 released jailbreakme 3.0 web-based tool jailbreaking devices certain versions ios 4.3 including ipad 2 first time ios 4.3.3 2011 jailbreakme 3.0 used flaw pdf file rendering mobile safari chronic dev team initially released greenpois0n october 2010 desktop-based tool jailbreaking ios 4.1 later ios 4.2.1 devices including apple tv well ios 4.2.6 cdma verizon iphones december 2011 redsn0w included corona untether pod2g ios 5.0.1 iphone 3gs iphone 4 ipad 1st generation ipod touch 3rd 4th generation june 2012 redsn0w also includes rocky racoon untether pod2g ios 5.1.1 iphone ipad ipod touch models support ios 5.1.1 iphone dev team chronic dev team pod2g collaborated release absinthe january 2012 desktop-based tool jailbreak iphone 4s first time ipad 2 second time ios 5.0.1 devices also ios 5.0 iphone 4s may 2012 released absinthe 2.0 jailbreak ios 5.1.1 untethered iphone ipad ipod touch models support ios 5.1.1 including jailbreaking third-generation ipad first time hackers together called evad3rs released ios 6.x jailbreak tool called evasi0n available linux os x windows monday february 4 2013 noon eastern standard time due high volume interest downloading jailbreak utility site initially gave anticipating users download errors apple upgraded software ios 6.1.3 permanently patched evasi0n jailbreak april 2013 latest versions sn0wbreeze released added support tethered jailbreaking a4 devices i.e devices newer iphone 4 ipad 1st generation ipod touch 4th generation december 22 2013 evad3rs released new version evasi0n supports jailbreaking ios 7.0.x known evasi0n7 december 30 2013 winocm ih8sn0w squiffypwn released p0sixspwn untethering devices ios 6.1.3 – 6.1.5 initially necessary jailbreak tethered using redsn0w install p0sixpwn cydia days later january 4 2014 team released version p0sixpwn jailbreaking using computer ios 7.1 patched exploits used evasi0n7 june 23 2014 pangu chinese untethered jailbreak released ios 7.1 october 22 2014 pangu team released pangu8 jailbreak devices running ios 8-8.1 first versions bundle cydia ios 8 compatible version cydia time november 29 2014 taig team released jailbreak tool called taig devices running ios 8.0-8.1.1 december 10 2014 app updated include support ios 8.1.2 july 3 2015 taig 2.3.0 released includes support ios 8.0-8.4 10 september 2015 6 days ios 9 released ih8sn0w demonstrated working exploit twitter page linking youtube video october 14 2015 pangu team released pangu 9 jailbreak tool ios 9.0 9.0.2 march 11 2016 pangu team updated tool support ios 9.1 64-bit devices july 17 2016 pangu team released pangu93 semi-untethered jailbreak tool ios 9.2-9.3.3 first semi-untethered jailbreak time made within sideloaded app included support 64bit devices mid-march 2017 jk9357 aka realkjcmember part kjc kim jong cracks hacking team released first semi-untethered jailbreak 32bit devices 9.1-9.3.4 jailbreak made use pegasus vulnerabilities december 21 2016 well-known hacker luca todesco released beta semi-untethered jailbreak tool ios 10.1 known yalu+mach_portal select 64-bit ios devices jailbreak made use ian beer google project zero mach_portal exploit version extremely unstable meant developers january 26 2017 help marco grassi stable version ios 10.2 released eventually supporting 64-bit ios devices except iphone 7 7 plus supported older unstable version 10.1.1 jailbreak made use ian beer project zero extra_recipe exploit jailbreaks installed computer application known cydia impactor allows signing apps app store todesco said newer version would eventually updated support iphone 7 7 plus ios 10.1.1 however left jailbreaking scene march 28 abandoning jailbreaks released august 6 2017 siguza tihmstar released semi-untethered phoenix jailbreak 32-bit devices ios 9.3.5 september 19 2017 tihmstar released etasonjb jailbreak 32-bit devices ios 8.4.1 exploit found users 9.3.5 phoenix jailbreak could downgrade 8.4.1 without use shsh blobs 8.4.1 unsigned version ios october 15 2017 hacker abraham masri known twitter cheesecakeufo released saïgon jailbreak 64-bit devices ios 10.2.1 december 6 2017 abraham masri released houdini first semi-jailbreak ios 10 compatible ios 10.x 10.3.2 64-bit devices application allows installation themes resolution changes etc basic cydia repos untethered needs run exploit install content tool updated beta revision 1 adding compatibility ios 11 11.1.2 december 11 2017 ian beer released async_wake ios 11.0 11.1.2 exploit allows tfp0 exploit updated allowed jailbreak apps jailed devices filzajailed filzaescaped allows root access jailed device mterminal-jailed applebetas allows execution commands jailed device torngat 1gamerdev tweak manager set boot logo change resolution disable ota updates jailed device december 23 2017 abraham masri released to.panga ios 11 11.1.2 wip jailbreak developers based async_wake exploit ian beer cydia included since jailbreak used kppless exploit cydia substrate rewritten abraham masri since stated project would n't updated due tools goal december 24 2017 tihmstar released h3lix semi-untethered jailbreak 32-bit devices compatible ios 10 versions shortly release h3lix tihmstar siguza released doubleh3lix semi-untethered jailbreak 64bit devices excluding iphone 7 ios 10.x december 26 2017 hacker jonathan levin known twitter morpheus____ released liberios wip developer-only jailbreak based async_wake exploit ian beer ios 11.0 ios 11.1.2 jonathan levin later stated liberios would officially released cydia january 29 2018 zimperium whose goal assess issues locate possible ios sandbox escape released two crucial bugs one major vulnerability leads execution arbitrary code different crucial daemons found ios 11.2 11.2.2 second bug full relative aslr bypass control stack corebluetooth leads memory corruption also 11.2 – 11.2.2 february 26 2018 developer coolstar known twitter coolstarorg released public version electra jailbreak ios devices 11.0–11.1.2 jailbreak uses kppless exploit cydia substrate updated ios 11 electra uses substrate alternative known substitute june 6 2018 abraham masri released update houdini first semi-jailbreak tool updated beta 3 revision 1 adding compatibility ios 11 11.3.1 july 6 2018 developer coolstar known twitter coolstarorg released public version electra jailbreak ios devices 11.0-11.3.1 jailbreak uses kppless exploit cydia substrate updated ios 11 electra uses substrate alternative known substitute august 17 2018 developer ben sparkes released public version meridian jailbreak ios versions 10.x 64-bit devices september 3 2018 web-based jailbreak called totally spyware released unknown user named jakeblair420 eventually came developed foxletfox ben sparkes littlelailo siguza stek29 based works 5aelo ian beer niklas b jamie bishop lucas todesco realkjcmember sam bingner sticktron theninjaprawn tihmstar xerub used webkit-based exploit bootstrap either meridian doubleh3lix october 14 2018 former electra team member developer pwn20wnd known twitter pwn20wnd ref name= https //twitter.com/pwn20wnd https //twitter.com/pwn20wnd /ref released public version unc0ver jailbreak ios devices 11.0–11.4.1 jailbreak uses three kppless exploits provided ian beer ios 11 async_wake empty_list multi_path pwn20wnd also worked jay freeman original developer cydia get cydia substrate reupdated ios 11 released december 17 2018 february 22 2019 developer pwn20wnd released public update unc0ver jailbreak ios devices 12.0–12.1.2 version unc0ver uses exploits provided tihmstar sorrymybad ios 12 v1ntex v3ntex voucher_swap pwn20wnd worked jay freeman get cydia cydia substrate updated work ios 12 april 29 2019 electra team released chimera public jailbreak ios 12.0-12.1.2 included support devices including devices a12 chips major security reinforcements compared devices jailbreak uses substitute alternative cydia substrate allow tweaks run june 12 2019 developer pwn20wnd released public update unc0ver jailbreak add support ios 12.1.2-12.2 jailbreak support a8 a7 devices begin support devices added ios 12.1.2-12.2 18th august 2019 developer pwn20wnd released public update unc0ver jailbreak add support ios 12.4 added following mistake apple reintroduced vulnerabilities patched 12.3 version unc0ver used sock_puppet exploit developed ned williamson sock_port exploit developed jake james a12 devices yet supported unc0ver due incompatibility substrate lack pac bypass beyond 12.1.2 | [
10755,
516,
5636,
6,
5637,
9732,
5647,
7697,
3602,
5138,
11289,
4649,
3626,
4139,
6186,
2605,
6700,
1074,
8754,
9784,
1083,
8253,
5191,
8783,
4180,
10838,
1623,
3672,
3162,
3681,
9826,
10341,
8806,
3691,
6763,
2673,
8313,
7292,
2686,
6783... | None |
4,958 | 7 | Wercker:wercker wercker docker-based continuous delivery platform helps software developers build deploy applications microservices using command-line interface developers create docker containers desktop automate build deploy processes testing desktop deploy various cloud platforms ranging heroku aws rackspace command-line interface wercker open-sourced business behind wercker also called wercker founded 2012 acquired oracle corporation 2017 wercker targets companies developers focus web applications acts middleman source-code hosting repositories like github cloud servers like amazon web services time developer makes change codebase git wercker retrieves code builds version inside container isolate tests errors notifies user either passed failed wercker integrated docker containers package application code easily moved server server build artifact docker container user take container docker hub private registry build code shipping saas platform enables developers test deploy code often push software updates incrementally ready rather bundled dumps makes easier coders practice continuous integration software engineering practice change developer makes codebase constantly tested process software ’ break goes live wercker based concept pipelines automated workflows pipelines take pieces code automatically execute series steps upon code wercker api provides programmatic access information applications builds deploys code snippets available golang node.js python service includes social networking element providing facebook-like wall team members know colleagues creates high degree transparency needed ever numerous groups work across different countries projects wercker currently available cloud services though wercker working enterprise offering allow on-premises use well hernandez van leuffen came wercker ’ underlying technology thesis project containers automatic resource provisioning university san francisco nexuslabs foundation based amsterdam mit helped wercker attract venture capital united states january 2013 wercker received seed investment a-list group investors round led shamrock ventures additional support greylock venture partners amsterdam-based micro vc vitulum ventures company executives reveal amount funding received wercker allegedly raised close 1 million wercker part 2012 startup incubator program rockstart accelerator amsterdam participated mozilla webfwd program salesforce innovation challenge also gigaom structure europe launchpad competition receiving people ’ choice judge ’ awards startup brought former co-founder openstack andy smith cto september 2014 month later wercker brought 2.4 million bringing total funding 3.2 million notion capital drove investment round along tola capital vitulum ventures shamrock ventures rockstart accelerator wercker originally focused lxc containers converted platform run ever popular docker containers late 2014 launched local development model enabling developers build deploy containerized applications entrepreneur included wercker among 9 essential tools agile product development teams july 2015 december atlassian launched wercker integration git-based bitbucket service called wercker yaml viewer january 2016 wercker announced 4.5 million series investment round led inkef capital participation notion capital bringing company ’ total funding 7.5 million first time inkef capital one largest vc funds netherlands invested developer tool wercker announced would use investment drive developer adoption expand enterprise market deepen automation capabilities flexible complex development pipelines april 17 2017 oracle announced signed definitive agreement acquire wercker | [
4194,
295,
8554,
3819,
4236,
8495,
7248,
467,
11221,
11097,
1435,
2910
] | Validation |
4,959 | 9 | Java_API_for_XML_Registries:java api xml registries java api xml registries jaxr defines standard api java platform applications access programmatically interact various kinds metadata registries jaxr one java xml programming apis jaxr api developed java community process jsr 93 jaxr provides uniform standard java api accessing different kinds xml-based metadata registry current implementations jaxr support ebxml registry version 2.0 uddi version 2.0 registries could defined future jaxr provides api clients interact xml registries service provider interface spi registry providers plug registry implementations jaxr api insulates application code underlying registry mechanism writing jaxr based client browse populate registry code change registry changes instance uddi ebxml | [
9988,
8203,
3341,
10526,
10020,
6067,
6328,
2106,
3517,
6334,
3518,
3008,
11582,
1095,
3278,
3920,
4960,
3558,
1128,
3560,
9834,
3954
] | Test |
4,960 | 9 | Java_Community_Process:java community process java community process jcp established 1998 formalized mechanism allows interested parties develop standard technical specifications java technology anyone become jcp member filling form available jcp website jcp membership organizations commercial entities requires annual fees – free individuals jcp involves use java specification requests jsrs – formal documents describe proposed specifications technologies adding java platform formal public reviews jsrs take place jsr becomes final jcp executive committee votes final jsr provides reference implementation free implementation technology source code form technology compatibility kit verify api specification jsr describes jcp jsr 215 describes current version 2.7 jcp hundreds jsrs visible jsrs include jcp executive board characterized rubber stamp organization since oracle acquired sun microsystems original developer java language apache software foundation resigned seat board december 2010 oracle unwilling license technology compatibility kit apache version java source | [
514,
9731,
7176,
8201,
6168,
10266,
11296,
10789,
5677,
10798,
2106,
572,
7750,
4688,
597,
10327,
2658,
11363,
1128,
7784,
5233,
9333,
6775,
631,
3705,
8825,
3710,
9343,
3712,
9350,
4235,
2710,
2215,
1707,
3247,
8880,
690,
5810,
6322,
888... | None |
4,961 | 2 | Anaconda_(installer):anaconda installer anaconda free open-source system installer linux distributions anaconda used red hat enterprise linux oracle linux scientific linux centos qubes os fedora sabayon linux blag linux gnu also less known discontinued distros like progeny componentized linux based debian founded ian murdock asianux foresight linux rpath linux vidalinux based gentoo anaconda offers text-mode gui mode users install wide range systems designed easily portable supports wide range hardware platforms ia-32 itanium dec alpha ibm esa/390 powerpc armv8 supports installing local storage devices like cd-rom drives harddisks well network resources via ftp http nfs installations automated use kickstart file automatically configures installation allowing users run minimal supervision starting os installation process installer checks system hardware resource requirements requirements satisfied start installation process mainly written python modules written c. graphical frontend based gtk+ 3/pygobject designed glade interface designer anaconda also custom text frontend support computers line printer like terminals ibm esa/390 mainframes | [
5380,
9353,
1553,
5523,
2974,
7983,
823,
59,
10172,
7364,
3142,
4302,
10961,
4309,
8539,
5723,
5988,
5096,
4841,
8554,
9197,
9455,
4729,
11643,
8700,
2045,
3582,
11135
] | Test |
4,962 | 8 | Xenon_(program):xenon program xenon software perform covert internet searches surveillance presently use taxing authorities least six nations investigate possibilities tax evasion various revenue producing web sites online shops gambling sites pornography sites clients selling goods on-line auction sites software uses time-controlled web spiders avoid detection likely countermeasures webmasters targeted site use may legal citizen right privacy civil liberties implicated use xenon begun netherlands 2004 dutch tax authority belastingdienst amsterdam-based data mining firm sentient machine research together tax authorities austria canada denmark united kingdom since upgraded system sweden tax authority began using xenon 2007 swedish privacy advocate expert par strom stating 2007 anticipated use xenon swedish tax authority skatteverket would legal also stated use would pose dangers citizen privacy rights—as current use time similar spidering software developed internally swedish government canadian internet law expert michael geist expressed similar privacy concerns | [
113,
119
] | None |
4,963 | 5 | E-carrier:e-carrier e-carrier member series carrier systems developed digital transmission many simultaneous telephone calls time-division multiplexing european conference postal telecommunications administrations cept originally standardized e-carrier system revised improved earlier american t-carrier technology adopted international telecommunication union telecommunication standardization sector itu-t widely adopted almost countries outside us canada japan e-carrier deployments steadily replaced ethernet telecommunication networks transitions towards ip e1 link operates two separate sets wires usually unshielded twisted pair balanced cable using coaxial unbalanced cable nominal 3 volt peak signal encoded pulses using method avoiding long periods without polarity changes line data rate 2.048 mbit/s full duplex i.e 2.048 mbit/s downstream 2.048 mbit/s upstream split 32 timeslots allocated 8 bits turn thus timeslot sends receives 8-bit pcm sample usually encoded according a-law algorithm 8,000 times per second 8 × 8,000 × 32 2,048,000 ideal voice telephone calls voice sampled data rate reconstructed end timeslots numbered 0 31 e1 frame defines cyclical set 32 time slots 8 bits time slot 0 devoted transmission management time slot 16 signaling rest assigned originally voice/data transport main characteristics 2-mbit/s frame described following one timeslot ts0 reserved framing purposes alternately transmits fixed pattern allows receiver lock onto start frame match channel turn standards allow full cyclic redundancy check performed across bits transmitted frame detect circuit losing bits information always used alarm signal may also transmitted using timeslot ts0 finally bits reserved national use one timeslot ts16 often reserved signalling purposes control call setup teardown according one several standard telecommunications protocols includes channel-associated signaling cas set bits used replicate opening closing circuit picking telephone receiver pulsing digits rotary phone using tone signalling passed voice circuits recent systems use common-channel signaling ccs signalling system 7 ss7 particular timeslot reserved signalling purposes signalling protocol transmitted freely chosen set timeslots different physical channel e1 channel communication consists sending consecutive frames transmitter receiver receiver must receive indication showing first interval frame begins since knows channel information time slot corresponds demultiplex correctly way bytes received slot assigned correct channel synchronization process established known frame alignment order implement frame alignment system receiver frame tell begins called frame alignment signal fas 2 mbit/s frame system fas combination seven fixed bits 0011011 transmitted first time slot frame time slot zero ts0 alignment mechanism maintained fas need transmitted every frame instead signal sent alternate frames first third fifth case ts0 used synchronization slot ts0 rest frames therefore available functions transmission alarms ts0 frames fas first bit dedicated carrying cyclic redundancy checksum crc tells us whether one bit errors specific group data received previous block eight frames known submultiframe aim system avoid loss synchronization due coincidental appearance sequence 0011011 time slot ts0 frame fas implement crc code transmission 2 mbit/s frames crc-4 multiframe built made 16 frames grouped two blocks eight frames called submultiframes crc checksum word four bits crc-4 put positions ci bits 1 frames fas next submultiframe receiving end crc submultiframe calculated locally compared crc value received next submultiframe coincide one bit errors determined found block alarm sent back transmitter indicating block received far end contains errors receiving end know first bit crc-4 word c1 reason crc-4 multiframe alignment word needed obviously receiver told multiframe begins synchronization crc-4 multiframe alignment word set combination 0011011 introduced first bits frames contain fas signal crc-4 method mainly used protect communication wrong frame alignment word also provide certain degree monitoring bit error rate ber low values around 10 method suitable cases ber around 10 block contains least one errored bit another advantage using crc bits transmitted checked unlike systems check seven bits fas ones known advance every 51 bits one fas next however crc-4 code completely infallible since probability around error may occur detected 6.25 blocks may contain errors detected code aim monitoring errors continuously check transmission quality without disturbing information traffic quality required standard taking necessary steps improve telephone traffic two way means information transmitted directions ends communication turn means two 2 mbit/s channels two directions transmission must considered crc-4 multiframe alignment word takes six first eight bits ts0 without fas two bits every second block submultiframe whose task indicate block errors far end communication mechanism follows bits called e-bits 1 default value far end communication receives 2 mbit/s frame detects erroneous block puts 0 e-bit corresponds block frame sent along return path transmitter way near end communication informed erroneous block detected ends information one crc-4 procedure e bits number frames multiframe 0 15 e-bit frame 13 refers submultiframe block received far end e-bit frame 15 refers submultiframe ii block ii bits position 2 ts0 frame contain fas called supervision bits set “ 1 ” avoid simulations fas signal bits ts0 contain fas positions 3–8 make known non-frame alignment signal nfas signal sent alternate frames frame 1 frame 3 frame 5 etc. first bit nfas bit 3 ts0 used indicate alarm occurred far end communication operating normally set 0 value 1 indicates alarm bits positions 4–8 spare bits one single application used number ways decided telecommunications carrier accordance itu-t rec g.704 bits used specific point-to-point applications establish data link based messages operations management maintenance monitoring transmission quality spare bits nfas used must set 1 international links method used transmit alarm makes use fact telephone systems transmission always two way multiplexing/demultiplexing devices known generically multiplex devices installed ends communication transmission reception frames alarm must sent transmitter device detects either power failure failure coder/decoder multiplexer following demultiplexer loss signal los loss frame alignment lof ber greater 10 remote alarm indication rai sent nfas return frames bit 3 set 1 transmitter considers serious alarm goes generating series operations depending type alarm condition detected well transmitting information generated users telephone network also necessary transmit signaling information signaling refers protocols must established exchanges users exchange information signals indicate subscriber picked telephone start dial number another subscriber calls well signals let communication link maintained e1 pcm system signaling information transmitted two different methods common channel signaling ccs method channel associated signaling cas method cases time slot ts16 basic 2 mbit/s frame used transmit signaling information ccs signaling messages several bytes transmitted 64 kbit/s channel provided ts16 frame messages providing signaling channels frame message contains information determines channel signaling signaling circuits access 64 kbit/s channel ts16 also common channels signaled different ccs systems constitute complex protocols following section way example channel associated signaling looked based e1 signal itu defined hierarchy plesiochronous signals enables signals transported rates 140 mbit/s section describes characteristics hierarchy mechanism dealing fluctuations respect nominal values rates produced consequence tolerances system case level 1 plesiochronous digital hierarchy 2 mbit/s higher levels multiplexing carried bit bit unlike multiplexing 64 kbit/s channels 2 mbit/s signal byte byte thus making impossible identify lower level frames inside higher level frame recovering tributary frames requires signal fully demultiplexed higher hierarchical levels 8,448 34,368 139,264 kbit/s etc referred 8 34 140 mbit/s simplicity obtained multiplexing four lower level frames within frame whose nominal transmission rate four times lower level see table 3 order leave room permitted variations rate justification bits well corresponding fas alarm spare bits 8 mbit/s frame structure defined itu-t rec g.742 frame divided four groups length 212 bits structure frame described itu-t rec g.751 see figure 20 previous case frame divided four groups length 384 bits structure frame described itu-t rec g.751 see figure 20 case frame divided six groups length 488 bits groups containing fas 8 34 140 mbit/s frames alarm bits spare bits also found known service bits a-bits alarm carry alarm indication remote multiplexing device certain breakdown conditions detected near-end device spare bits designed national use must set 1 digital paths cross international boundaries far synchronization concerned multiplexing plesiochronous signals completely trouble free especially comes demultiplexing circuits pcm multiplexer 30 2 channels sample output signal clock 1/32 sent coders input channels synchronized output frame however higher level multiplexers receive frames lower level multiplexers clocks whose value fluctuates around nominal frequency value within certain margins tolerance margins set itu-t recommendations hierarchical level signals thus formed almost synchronous except differences within permitted margins tolerance reason called plesiochronous order perform bit-by-bit tdm higher-order pdh multiplexer elastic memories inputs incoming bits lower level signal line tributary written since tributary signals different rates asynchronous respect prevent capacity elastic memories overflowing multiplexer reads incoming bits maximum rate permitted within range tolerances rate incoming flow tributary lines reading rate multiplexer read bits elastic memory uses stuffing bit justification bit called justification opportunity output aggregate signal task adapting signal enters multiplexer rate signal transmitted within output frame highest clock value type justification called positive justification justification bits together overhead bits make output rate higher total input signals task justification opportunity bits r-bits available extra bits used rate incoming tributaries higher nominal value within margin specified itu-t amount makes necessary case opportunity bit longer mere stuffing becomes information bit instead order device receives multiplexed signal able determine whether justification opportunity bit contains useful information i.e information tributary justification control bits j-bits included frame group control bits refers one tributaries frame set 0 associated opportunity bit carrying useful information otherwise set 1 several bits used instead one provide protection possible errors transmission examining control bits received value decided sent majority value 1 1s 0s instance assumed error bits 0 seen dispersion control bits referring tributary causes separate groups spreading j-bits control bits reduces probability errors occurring wrong decision made whether used useful data bit wrong decision made error output data also slip one bit loss repetition one bit information a-bit fas 8 34 140 mbit/s frames enables multiplexers correspond hierarchies transmit alarm indications far ends multiplexer detects alarm condition addition 140 mbit/s multiplexers also transmit alarm indication faced loss frame alignment 34-mbit/s signals received inside 140 mbit/s signals well nfas 34 mbit/s signal lost alignment bit 11 group changes 0 1 return channel pdh based e0 signal rate designed higher level multiplex set lower level signals framed e1 designed carry 30 31 e0 data channels plus 1 2 special channels levels designed carry 4 signals level necessity overhead bits justification bits account rate differences sections network subsequent level capacity greater would expected simply multiplying lower level signal rate example e2 8.448 mbit/s 8.192 mbit/s one might expect multiplying e1 rate 4 note bit interleaving used difficult demultiplex low level tributaries directly requiring equipment individually demultiplex every single level one required | [
3168,
8192,
1955,
2787,
1893,
7108,
7815,
2860,
2989,
4590,
2863,
10833,
2994,
3156,
7799,
1437,
4543
] | None |
4,964 | 7 | Fog_computing:fog computing fog computing fog networking also known fogging architecture uses edge devices carry substantial amount computation storage communication locally routed internet backbone fog computing perceived large cloud systems big data structures making reference growing difficulties accessing information objectively results lack quality obtained content effects fog computing cloud computing big data systems may vary however common aspect limitation accurate content distribution issue tackled creation metrics attempt improve accuracy fog networking consists control plane data plane example data plane fog computing enables computing services reside edge network opposed servers data-center compared cloud computing fog computing emphasizes proximity end-users client objectives dense geographical distribution local resource pooling latency reduction backbone bandwidth savings achieve better quality service qos edge analytics/stream mining resulting superior user-experience redundancy case failure also able used assisted living scenarios fog networking supports internet things iot concept devices used humans daily basis connected examples include phones wearable health monitoring devices connected vehicle augmented reality using devices google glass spawar division us navy prototyping testing scalable secure disruption tolerant mesh network protect strategic military assets stationary mobile machine control applications running mesh nodes take internet connectivity lost use cases include internet things e.g smart drone swarms iso/iec 20248 provides method whereby data objects identified edge computing using automated identification data carriers aidc barcode and/or rfid tag read interpreted verified made available fog edge even aidc tag moved 2010 need extend cloud computing fog computing emerged order cope huge number iot devices big data volumes real-time low-latency applications november 19 2015 cisco systems arm holdings dell intel microsoft princeton university founded openfog consortium promote interests development fog computing cisco sr. managing-director helder antunes became consortium first chairman intel chief iot strategist jeff fedders became first president cloud computing fog computing provide storage applications data end-users however fog computing closer proximity end-users bigger geographical distribution ‘ cloud computing ’ practice using network remote servers hosted internet store manage process data rather local server personal computer cloud computing heavyweight dense form computing power ‘ fog computing ’ term defined flavio bonomi group cisco systems september 2010 refers extending cloud computing edge enterprise network also known edge computing fogging fog computing facilitates operation compute storage networking services end devices cloud computing data centers edge computing typically referred location services instantiated fog computing implies distribution communication computation storage resources services close devices systems control end-users fog computing medium weight intermediate level computing power rather substitute fog computing often serves complement cloud computing national institute standards technology march 2018 released definition fog computing adopting much cisco commercial terminology nist special publication 500-325 fog computing conceptual model defines fog computing horizontal physical virtual resource paradigm resides smart end-devices traditional cloud computing data center paradigm supports vertically-isolated latency-sensitive applications providing ubiquitous scalable layered federated distributed computing storage network connectivity thus fog computing distinguished distance edge per theoretical model fog computing fog computing nodes physically functionally operative edge nodes centralized cloud much terminology defined including key architectural terms like smart distinction fog computing edge computing generally agreed acceptance fog computing considered energy efficient compared cloud computing ieee adopted fog computing standards proposed openfog consortium | [
8576,
516,
8326,
11156,
9366,
154,
8098,
10921,
428,
2605,
3886,
6834,
9779,
1849,
321,
6981,
8262,
11473,
7638,
4957,
477,
4194,
8675,
9314,
754,
2804,
1400
] | None |
4,965 | 4 | Strong_authentication:strong authentication strong authentication notion several definitions strong authentication often confused two-factor authentication generally multi-factor authentication however strong authentication necessarily multi-factor authentication soliciting multiple answers challenge questions may considered strong authentication unless process also retrieves 'something 'something would considered multi-factor authentication ffiec issued supplemental guidance subject august 2006 clarified definition true multifactor authentication requires use solutions two three categories factors using multiple solutions category ... would constitute multifactor authentication another commonly found class definitions relates cryptographic process precisely authentication based challenge response protocol type definition found handbook applied cryptography type definition necessarily relate two-factor authentication since secret key used challenge-response authentication scheme simply derived password one factor third class definitions says strong authentication form authentication verification accomplished without transmission password case example definition found fermilab documentation fourth class legal standing within european economic area strong customer authentication fast identity online fido alliance striving establish technical specifications strong authentication 250 members 150 certified products thus term strong authentication used long notion strong defined context use | [
11619,
5433,
3271,
6220,
5389,
11244,
11185,
1945,
6204,
5918,
4575
] | Test |
4,966 | 2 | DX10:dx10 dx10 general purpose multitasking operating system designed operate texas instruments 990/10 990/10a 990/12 minicomputers using memory mapping feature dx10 versatile disk-based operating system capable supporting wide range commercial industrial applications dx10 also multiterminal system capable making several users appear exclusive control system dx10 international operating system designed meet commercial requirements united states european countries japan dx10 supported several models video display terminals vdts permit users enter view process data language dx10 required basic hardware configuration allows additional members extensive group peripherals included configuration system generation could configure dx10 support peripheral devices members 990 family devices require realtime support capability required also provide software control devices communicated dx10 easily system command interpreter sci sci designed provide simple convenient interaction user dx10 conversational format sci access complete control dx10 sci flexible mode communication sci convenient interactive communication data terminal sci accessed batch mode well dx10 capable extensive file management built-in file structures include key indexed files relative record files sequential files group file control utilities exists copying modifying files controlling file parameters dx10 offers number features provide convenient use system's capabilities | [
2179,
2345,
8524,
7983,
10068,
3960,
477
] | Test |
4,967 | 8 | Sportradar:sportradar sportradar ag multinational corporation headquarters st. gallen switzerland collects analyzes sports data sportradar provides services bookmakers national international sports federations media companies january 2016 company 35 offices 24 countries around world including trondheim london ljubljana sportradar products includes live results statistics white-label sports content solutions brand betradar sportradar operates suite tools bookmakers including in-game pre-match odds suggestions resulting market monitoring trading services us subsidiary sportradar us sportradar official data provider us sports federations nfl nhl nascar end 2015 sportradar renewed partnership international tennis federation official data collection service partner 2016 sportradar entered partnership nba third partnership big four since 2005 company partnership german football association detect fraud match fixing system later developed launched fraud detection system addition detection fraud sportradar organizes integrity workshops together federations major league soccer serie international ice hockey federation workshops teach clubs players betting market works different forms match fixing match manipulation detected sportradar started market monitor founded 2000 trondheim norway petter fornæss tore steinkjer market monitor provided services online bookmakers based crawler technology developed part thesis norwegian university science technology market monitor together austrian german partners created product betradar.com 2001 betradar.com provides set reporting monitoring tools online betting markets carsten koerl joined market monitor major investor obtaining 51 shares 2007 sportradar ag founded owners market monitor served parent company various companies group market monitor renamed sportradar became subsidiary sportradar ag 2012 sportradar acquired slovenian development company klika later year eqt acquired minority stake investing 44 million euro company sportradar expansions continued 2013 sportradar became majority shareholder usk-based sportstat sportstat official data collection partner http //www.insidermedia.com/insider/wales/87716-sportstat-merges-swiss-business/ 2013 sportradar also advanced us market acquiring sportsdata sportradar us eqt reinvested sportradar 2014 eqt flagship fund buying shares eqt capital expansion ii 2015 sportradar obtained exclusive distribution rights nascar nfl nhl year sportradar attracted investments michael jordan mark cuban led revolution llc national football league also acquired equity sportradar us part partnership 2016 sportradar acquired core business sportman media holding including laola1.at laola1.tv later year nba announced multi-year partnership sportradar involving integrity services data distribution video streaming sportradar provides federations law enforcement agencies system detecting betting related match fixing services operated sportradar security services division headquarters london england sportradar sport integrity services began early warning system developed 2005 following hoyzer scandal use system one measures bundesliga took prevention match fixing system developed include live monitoring relaunched 2009 fraud detection system fds development fds done cooperation uefa partnership sportradar monitors suspicious matches two top leagues every uefa member nation fds since expanded partnerships sports federations including concacaf fiba esl ioc sportradar also signed agreements several law enforcement agencies notably europol australian federal police fraud detection system works comparing odds movement patterns online bookmakers expected odds movement patterns given match suspicious matches found analyzed reported relevant federation federation start investigations 2015 fraud detection system monitors 65 000 matches across 11 sports half soccer daily system receives roughly 5 billion odds adjustments around 450 different bookmakers since launch fraud detection system sportradar involved several notable match fixing cases nepal scandal 2015 austrian case including sanel kuljić 2013 australian match fixing case 2013 system indicated since 2009 2000 events likely manipulated addition sportradar provides workshops clubs federations educate consequences match fixing sportradar sports distribution covers 325 000 sport events feeds clients like google fox sports sportradar also provides data facebook sports stadium brand betradar sportradar provides bookmakers number sports betting services 2015 sportradar partnered roughly 450 bookmakers including bet365 william hill paddy power ladbrokes sportradar services also used state lotteries veikkaus svenska spel norsk tipping sportradar create odds thousands games across 40 sports odds created feeding sports data collected sportradar mathematical models in-game betting odds requires continuous recalculation outcomes using live data sportradar collects acquires licenses odds sold odds suggestions bookmakers matches bookmakers unable create odds similarly sportradar provides information bookmakers matches start finish allow money placed matches finished subset sportradar collected data goes extensive quality assurance process specialised bet clearing sportradar also provides market monitoring allows bookmakers compare odds rest market bookmakers provide odds make use service thus making odds part comparison bookmakers service allows bookmakers ensure unwanted surebet situation august 12 2019 sportradar extended relationship national football league become exclusive provider official league data sports betting operators united states internationally jurisdictions betting legal regulated sportradar also use integrity services monitor betting nfl games right distribute live audiovisual feeds nfl games sportsbooks select international markets sportradar partnered several sports federations collect distribute sports data handball-bundesliga sportradar collects distributes official data itf umpire enters data directly sportradar systems nhl sportradar ingests redistributes data coming nhl tracking system partnerships us federations nascar nhl nfl handled us subsidiary sportradar us partly order avoid conflict interest federation sportradar involvement betting industry distribution partnerships also include creating official web mobile solutions well rights stream video content partnerships one esl include using data expand sportradar betting services deal signed october 2015 sportradar provide football association malaysia platform managing federation platform federation manage things schedules leagues personnel players referees tool also provides means collecting live data distributed teams partners visualised various web solutions | [
113,
4967
] | Test |
4,968 | 3 | Exec_(system_call):exec system call computing exec functionality operating system runs executable file context already existing process replacing previous executable act also referred overlay especially important unix-like systems although operating systems implement well since new process created original process identifier pid change machine code data heap stack process replaced new program exec call supported many programming languages including compilable languages scripting languages os command interpreters built-in command replaces shell process specified program interfaces exec implementations vary depending programming language may accessible via one functions depending operating system may represented one actual system calls reason exec sometimes described collection functions standard names functions c see exec linux kernel one corresponding system call named execve whereas aforementioned functions user-space wrappers around higher-level languages usually provide one call named posix standard declares exec functions header file c language functions declared dos see os/2 microsoft windows implementations provide functions named leading underscore e.g _execl base exec execute followed one letters calls new process image inherits current environment variables file descriptor open exec call made remain open new process image unless marked codice_2 codice_3 opened codice_4 latter introduced posix.1-2001 aspect used specify standard streams stdin stdout stderr new program successful overlay destroys previous memory address space process memory areas shared reclaimed operating system consequently data passed new program otherwise saved become lost successful exec replaces current process image return anything program made call processes exit status exec-ing termination process continues exist exec function return calling program error occurred case return value −1 errno set one following values linux kernel may destroy memory map old process start constructing loading new executable discover new executable ca n't loaded example fields executable internal tables contain invalid values case process killed fatal signal sigsegv ideally kernel would fail codice_5 return error indication old executable would significantly complex slower dos multitasking operating system replacing previous executable image great merit due harsh primary memory limitations lack virtual memory api used overlaying programs dos effects similar ones posix systems ms-dos exec functions always load new program memory maximum allocation program executable file header set default value 0xffff exehdr utility used change maximum allocation field program however done program invoked one exec functions program might behave differently program invoked directly operating-system command line one spawn functions see many unix shells also offer builtin command replaces shell process specified program wrapper scripts often use command run program either directly interpreter virtual machine setting environment variables configuration using exec resources used shell program need stay use program started command also perform redirection shells passing arguments means use command redirection without making actual overlay traditional unix system functionality create new process running new executable program one step explains importance exec unix programming systems may use spawn main tool running executables result equivalent fork-exec sequence unix-like systems posix supports posix_spawn routines optional extension usually implemented using vfork os/360 successors include system call xctl transfer control performs similar function exec except type 4 svc usage rare common use link attach invoke load module without terminating current load module particular tso invokes commands attach sharing memory | [
8975,
10387,
11539,
5397,
6813,
1952,
7847,
10407,
2345,
7983,
5040,
2045,
11442,
9780,
8262,
4423,
2253,
9166,
10063,
10835,
10584,
7421,
8414,
4703,
6498,
868,
4850,
9330,
5492,
9714,
3062,
7933,
2942
] | Test |
4,969 | 4 | Authenticated_Received_Chain:authenticated received chain authenticated received chain arc email authentication system designed allow intermediate mail server like mailing list forwarding service sign email original authentication results allows receiving service validate email email spf dkim records rendered invalid intermediate server processing arc defined rfc 8617 published july 2019 experimental dmarc allows sender domain indicate emails protected spf and/or dkim tells receiving service neither authentication methods passes reject message however strict dmarc policy may block legitimate emails sent mailing list forwarder spf check fail due unapproved sender dkim signature invalidated message modified adding subject tag footer arc helps solve problem giving intermediate servers way sign original message validation results even spf dkim validation fail receiving service choose validate arc arc indicates original message passed spf dkim checks modifications made intermediaries trusted receiving service receiving service may choose accept email arc defines three new mail headers sign modification intermediate server performs following steps validate arc recipient performs following steps | [
4793,
8130
] | Validation |
4,970 | 7 | Firmex:firmex firmex cloud-based virtual data room service provider headquartered toronto ontario canada virtual data rooms facilitate secure document sharing across corporate firewalls used highly confidential complex transactions seen corporate finance procurement well regulatory compliance governance processes 2004 davies ward phillips vineberg toronto-based international business law firm contracted version 5.1 develop davies deal room online virtual data room software designed facilitate legal transactions transactions project commercialized version 5.1 2006 firmex inc. 2007 2008 firmex raised total 4.4 million angel investors end 2009 company licensed 500 customers running 2,500 transactions year 2011 firmex reached customer milestone 1,000 2012 company workforce grew 25 percent 2014 firmex named 13 deloitte technology fast 50 2015 firmex deloitte fast 500 winner https //www2.deloitte.com/content/dam/deloitte/us/documents/technology-media-telecommunications/technology-fast-500-winners-ranking-list.pdf 2016 novacap montreal-based private equity fund acquired majority interest firmex http //www.novacap.ca/en/news/tmt/novacap-invests-in-firmex-to-accelerate-growth/ firmex customers started 12000 virtual data rooms 2018 firmex expanded european operations opening office london england https //www.firmex.com/blog/news/firmex-opens-new-emea-headquarters-london-uk/ 2019 vertu capital toronto-based private equity fund bdc capital firmex management acquired firmex https //www.pehub.com/2019/02/vertu-and-bdc-to-acquire-firmex-from-novacap/ | [
10185,
4623,
10161,
5650,
2267
] | None |
4,971 | 0 | TIMIT:timit timit corpus phonemically lexically transcribed speech american english speakers different sexes dialects transcribed element delineated time timit designed acoustic-phonetic knowledge automatic speech recognition systems commissioned darpa corpus design joint effort massachusetts institute technology sri international texas instruments ti speech recorded ti transcribed mit verified prepared publishing national institute standards technology nist also telephone bandwidth version called ntimit network timit timit ntimit freely available — either membership linguistic data consortium monetary payment required access dataset | [
5667,
3721,
9577,
5903,
10160,
10965,
5214
] | None |
4,972 | 2 | Sandbox_(computer_security):sandbox computer security computer security sandbox security mechanism separating running programs usually effort mitigate system failures software vulnerabilities spreading often used execute untested untrusted programs code possibly unverified untrusted third parties suppliers users websites without risking harm host machine operating system sandbox typically provides tightly controlled set resources guest programs run scratch space disk memory network access ability inspect host system read input devices usually disallowed heavily restricted sense providing highly controlled environment sandboxes may seen specific example virtualization sandboxing frequently used test unverified programs may contain virus malicious code without allowing software harm host device sandbox implemented executing software restricted operating system environment thus controlling resources example file descriptors memory file system space etc process may use examples sandbox implementations include following use cases sandboxes include following | [
537,
6171,
9244,
3102,
10785,
550,
10284,
2107,
3643,
7739,
5697,
2118,
2558,
1623,
11365,
8296,
9841,
9356,
7822,
8846,
6800,
10388,
10900,
8344,
6813,
2213,
4775,
171,
7851,
174,
719,
9424,
3286,
231,
5872,
6411,
9488,
6431,
5411,
8998,... | Test |
4,973 | 3 | Blagger_(video_game):blagger video game blagger platform game created antony crowther commodore 64 released alligata 1983 bbc micro port released year acorn electron amstrad cpc amsoft msx 1984 commodore 16 plus/4 1985 countries game released name gangster gameplay similar manic miner also released 1983 sequel son blagger released 1984 third final title blagger goes hollywood released 1985 game divided series single-screen levels goal player screen manipulate blagger burglar collect scattered keys reach safe keys must collected safe opened set amount time blagger walk either left right jump left right jumping action fixed pattern altered initiated gameplay reduces learning best order collect keys correct timing movements jumping platforms solid decay blagger walked platforms serve move blagger particular direction blagger die touches cacti one moving enemy obstacles level falls certain distance moving enemies vary level level include cars aliens mad hatters giant mouths movement enemies fixed pattern repeatedly travelling one point another back bbc electron versions feature floating rg hazards r.g initials programmer versions r.s goodley | [
9322,
9006,
1527
] | Test |
4,974 | 8 | GSOAP:gsoap gsoap c c++ software development toolkit soap/xml web services generic xml data bindings gsoap tools generate efficient source code xml serialization type c/c++ data zero-copy overhead gsoap toolkit started research project florida state university professor robert van engelen 1999 project introduced new methods highly-efficient xml parsing pull parsing serialization c/c++ data directly xml later also soap project succeeded defining type-safe data bindings xml schema types wide variety c/c++ data types toolkit uses automatic programming simplify development invocation web services using efficient auto-generated xml serializers send receive c/c++ data directly domain-specific compiler-based tool generates source code efficiently converts native c/c++ data structures xml back toolkit developed support soap web services messaging protocol introduced around time therefore name gsoap generic xml soap use approach scientific data exchange development maintenance software took place ownership genivia inc includes addition new wsdl xml schema processing capabilities well addition many ws-* web services protocol capabilities ws-security optimizations xml-rpc messaging support json data format plugin modules integrate gsoap apache iis web servers third-party plugins grid services gsoap toolkit written portable c/c++ uses form bootstrapping generating code implement converter translate wsdl/xsd specifications c/c++ source code wsdl/xsd meta-data bindings gsoap software licensed gplv2 open source license commercial-use source code licenses gsoap software widely used industrial projects mission-critical infrastructures example web service operation c retrieving lodging rate hotel given number guests declared annotated form last parameter function always service return value denoted void one-way operations struct/class bundle multiple service return parameters function int return value used error diagnostics service invocation c using auto-generated soap_call_ns__get_rate function executed follows facilitate web services implementations legacy c c++ systems prefix qualification identifier names c/c++ omitted replaced colon notation example ns get_rate rather ns__get_rate punctuation removed auto-generated source code used project builds service invocation c++ using auto-generated proxy class executed follows using proxy default endpoint url soap action values using annotations identifier naming conventions i.e qualification prefix ns__ function ns__get_rate declaring properties ns namespace using //gsoap directives example binding established web service operations auto-generated web services description language wsdl document declares request message response message get-rate operation porttype interface soap binding ns__get_rate function follows request responses messages operation refer xml elements defined types section wsdl follows likewise client server c/c++ source code auto-generated set wsdls xml schemas services must completed defining appropriate service operations example auto-generated c++ service class wsdl must completed defining get_rate method follows restrictions type operation parameters marshaled xml web service messaging except certain type declaration conventions annotations followed establish data binding establish xml data binding c/c++ data types gsoap uses three basic forms source code annotation directives identifier naming conventions punctuation fully annotated structure declaration c hierarchical employee record may appear following annotations conventions used gsoap tools convert c/c++ data types to/from xml schema data types since c support namespaces struct/class member names namespace-qualified c++ use identifier naming conventions gsoap allow binding structure members xml schema complextype auto-generated follows furthermore unions struct/class annotated special selector field union member selection mapped to/from schema choice particles stl containers mapped to/from sequence particles enumerations mapped to/from xml schema simpletype enumerations standard c/c++ primitive types mapped to/from xsd types conversion xsd schema c/c++ data types actual mapping configurable gsoap type mapping file instance example hierarchical employee structure serialized xml tree default example soap encoding style enabled xml serialization gsoap respects co-referenced objects cyclic data structures per soap encoding rules resulting xml id-ref edges auto-generated xml data binding includes read write operations to/from file string stream example ns__employee_record object read write operations read employee record xml file parsed xml internally validated data bindings constraints application data sent received to/from rest xml service xml data binding provides rest xml api calls example given ns__employee_record xml data binding previous section following get put post operations auto-generated post functions called together first post_send transmit xml data endpoint url followed post_recv accept response data may different type received xml internally validated data bindings constraints | [
11105,
10020,
7878,
8070,
425,
5612,
6284,
7983,
4561,
4658,
6353,
6357,
10486,
7320,
4572,
2045,
479
] | None |
4,975 | 4 | Message_forgery:message forgery cryptography message forgery sending message deceive recipient real sender common example sending spam prank e-mail originated address one really used | [
262
] | Test |
4,976 | 7 | LoginRadius:loginradius loginradius inc. cloud based saas customer identity access management platform based vancouver british columbia canada established 2012 loginradius started 2012 two friends deepak gupta rakesh soni social login widget interview soni said duo started company recognizing hassles registration websites negative effects conversion rates according company loginradius platform 200 pre-built integrations different customer relationship management ad platform email marketing tools platform involved collection customer data traditional email based registration social profile data acquired customer data secured cloud based storage loginradius also provides single customer view customer data aggregated one record organizations using loginradius platform integrate marketing tools | [] | None |
4,977 | 7 | Nivio:nivio nivio company marketing desktop virtualization services allow customer use computer application software without personal computer sachin dev duggal saurabh pradeep dhoot founded nivio 2004 two founders met students imperial college london 2000 initial funding came two executives deutsche bank duggal worked time claimed idea came 20 minutes presentation headquarters switzerland development center gurgaon nvivo announced test first online windows xp-based desktop service 2007 early reviews mixed noting high data-rate continuous connections needed good response times existing products companies citrix systems advanced micro devices announced investment undisclosed value august 2007 several patents related technology assigned smx inet global services sa nivio subsidiary december 2008 nivio named technology pioneer world economic forum affordable computing access nivio announced nivio companion june 2009 bharti airtel limited india internet service provider companion low-cost product including keyboard mouse set-top-box style terminal monthly service charge user gets internet access microsoft office 2007 functionality 10 gbytes storage one motivation given rampant software piracy india indian media reported company young founders since 2007 january 2010 duggal promoted cloud computing world economic forum davos february 2010 nivio announced operations australia hosted nec polaris data centre springfield queensland july 2010 company estimated us 5 million revenues profitable earlier nivio companion product called test november 2010 duggal dhoot claimed goal education 2012 nivio reported announce devices called cloudbook cloudpc provide access services although us patent trademark office shows cloudbook trademark application date december 2009 nholdings business nivio product everex marketed cloudbook around 2008 registration nholdings sa gives location mont-sur-lausanne formerly using name smx inet global services sa microsoft remote desktop services technology allowed nivio officially licensed service provider license agreement use remote desktop protocol contrasts services onlive desktop trucloud licensing terms raised questions press approach also contrasted official support microsoft office ipad videocon aec partners invested us 21 million company february 2012 co-founder dhoot nephew videocon chairman venugopal dhoot offices opened palo alto california silicon valley well new delhi april 2012 nivio announced application use microsoft office files stored google drive product received mixed reviews since products still by-invitation beta testing stages judged easy use kate russell bbc reported company products august 2012 near end 2012 duggal stepped operational roles nivio frank houghton became chief operating officer company announced would provide services businesses stuart collingwood president europe middle east africa 2014 company appears gone web site shut twitter feed dormant since 2013 | [
4194,
8355,
10820,
6539,
10747,
5371
] | None |
4,978 | 2 | Arch_Hurd:arch hurd arch hurd operating system based arch linux uses gnu hurd kernel instead linux kernel arch hurd project founded arch linux forum thread january 2010 weeks many contributions progressed point could boot virtual machine aims provide arch-like user environment bsd-style init scripts i686-optimised packages use pacman package manager rolling-release kiss set hurd stable enough use despite small development team much progress made since founding booting real hardware packaging everything basic web server production unofficial graphical livecd june 2011 arch hurd announced successful integration device driver environment dde — framework linux drivers hurd improves network hardware support distribution makes nearly usable | [
10016,
6371,
3684,
2180,
5067,
7983,
10257,
5363,
7187,
5397,
3068
] | None |
4,979 | 8 | OASIS_(organization):oasis organization organization advancement structured information standards oasis global nonprofit consortium works development convergence adoption open standards security internet things energy content technologies emergency management areas oasis founded name sgml open 1993 began trade association sgml tool vendors cooperatively promote adoption standard generalized markup language sgml mainly educational activities though amount technical activity also pursued including update cals table model specification specifications fragment interchange entity management 1998 movement high tech industry xml sgml open changed emphasis sgml xml changed name oasis open inclusive xml reflect expanded scope technical work standards focus consortium activities also moved promoting adoption xml getting lots attention developing technical specifications july 2000 new technical committee process approved adoption process manner technical committees created operated progressed work regularized adoption process five technical committees 2004 nearly 70 1999 oasis approached un/cefact committee united nations dealing standards business jointly develop new set specifications electronic business joint initiative called ebxml first met november 1999 chartered three-year period final meeting original charter vienna un/cefact oasis agreed divide remaining work two organizations coordinate completion work coordinating committee 2004 oasis submitted completed ebxml specifications iso tc154 approved iso 15000 consortium headquarters burlington massachusetts shared companies september 4 2014 consortium moved 25 corporate drive suite 103 35 corporate dr suite 150 still loop route following standards development oasis technical committees adhesion consortium requires fees paid must renewed annually depending membership category adherents want access among adherents members american bar association collabora dell eclecticiq general motors ibm iso/iec kde e.v. microsoft novell oracle redhat document foundation universities government agencies individuals employees less-known companies like many bodies producing open standards e.g ecma oasis added reasonable non-discriminatory licensing rand clause policy february 2005 amendment required participants disclose intent apply software patents technologies consideration standard contrary w3c requires participants offer royalty-free licenses anyone using resulting standard oasis offers similar royalty free limited terms mode along royalty free rand terms mode rand reasonable non-discriminatory mode committees compared w3c oasis less restrictive regarding obligation companies grant royalty-free license patents controversy rapidly arisen licensing added silently allows publication standards could require licensing fee payments patent holders situation could effectively eliminate possibility free/open source implementations standards contributors could initially offer royalty-free use patent later imposing per-unit fees standard accepted april 11 2005 new york times reported ibm committed free patents oasis group larry rosen software law expert leader reaction rose oasis quietly included rand clause policy welcomed initiative supposed oasis continue using policy companies involved would follow history proved wrong rand policy still removed commercial companies published free statement towards oasis patrick gannon president ceo oasis 2001 2008 minimized risk company could take advantage standard request royalties established option nobody uses harm sam hiser former marketing lead defunct openoffice.org explained patents towards open standard counterproductive inappropriate also argued ibm microsoft shifting standardization efforts w3c oasis way leverage probably patents portfolio future hiser also attributed rand change oasis policy microsoft rand term could indeed theoretically allow company involved leverage patent future amendment probably added way attract companies consortium encourage contributions potential participants big actors like microsoft could indeed applied pressure made sine-qua-non condition access consortium possibly jeopardize/boycott standard clause present doug mahugh — working microsoft promoter office open xml microsoft document format competing oasis iso/iec 26300 i.e odf v1.0 senior product manager specializing office client interoperability — claimed many countries expressed frustration pace oasis responses defect reports submitted iso/iec 26300 inability sc 34 members participate maintenance odf however rob weir co-chair oasis odf technical committee noted time odf tc received zero defect reports iso/iec national body japan added submitter original japanese defect report murata mokoto satisfied preparation errata also self-published blog post blaming microsoft involving people improve modify accuracy odf openxml wikipedia articles trying make odf sound risky adopt | [
1280,
4107,
8203,
3086,
6805,
9365,
7320,
6811,
7198,
10020,
425,
10409,
4397,
8626,
5433,
8764,
5443,
2501,
2118,
7368,
7800,
10829,
6353,
6993,
5460,
5463,
90,
2013,
349,
479,
4064,
6366,
7522,
489,
5996,
3693,
9455,
2932,
10486,
6007,
... | Test |
4,980 | 9 | Program_transformation:program transformation program transformation operation takes computer program generates another program many cases transformed program required semantically equivalent original relative particular formal semantics fewer cases transformations result programs semantically differ original predictable ways transformations performed manually often practical use program transformation system applies specifications required transformations program transformations may specified automated procedures modify compiler data structures e.g abstract syntax trees representing program text may specified conveniently using patterns templates representing parameterized source code fragments practical requirement source code transformation systems able effectively process programs written programming language usually requires integration full front-end programming language interest including source code parsing building internal program representations code structures meaning program symbols useful static analyses regeneration valid source code transformed program representations problem building integrating adequate front ends conventional languages java c++ php etc may equal difficulty building program transformation system complexity languages widely useful transformation system must able handle many target programming languages must provide means specifying front ends generalisation semantic equivalence notion program refinement one program refinement another terminates initial states original program terminates state guaranteed terminate possible final state original program words refinement program defined deterministic original program two programs refinements programs equivalent | [
10762,
1552,
4112,
3475,
1685,
5399,
3363,
932,
4519,
5677,
2619,
3263,
8644,
8773,
2374,
8262,
9926,
10703,
5585,
11475,
2262,
605,
7780,
10469,
10983,
10474,
2927,
5496
] | Validation |
4,981 | 9 | Bill_Gosper:bill gosper ralph william gosper jr. born april 26 1943 known bill gosper american mathematician programmer along richard greenblatt may considered founded hacker community holds place pride lisp community high school gosper interested model rockets one friends injured rocketry accident contracted fatal brain infection gosper enrolled mit 1961 received bachelor degree mathematics mit 1965 despite becoming disaffected mathematics department anti-computer attitude second year mit gosper took programming course john mccarthy became affiliated mit ai lab contributions computational mathematics include hakmem mit maclisp system made major contributions macsyma project mac computer algebra system gosper later worked symbolics macsyma inc. commercial versions macsyma 1974 moved stanford university lectured worked donald knuth since time worked consulted xerox parc symbolics wolfram research lawrence livermore laboratory macsyma inc became intensely interested game life shortly john horton conway proposed conway conjectured existence infinitely growing patterns offered reward example gosper first find pattern glider gun prize gosper also originator hashlife algorithm speed computation life patterns many orders magnitude gosper created numerous packing problem puzzles twubblesome twelve gosper first person realize possibilities symbolic computation computer mathematics research tool whereas computer methods previously limited purely numerical methods particular research resulted work continued fraction representations real numbers gosper algorithm finding closed form hypergeometric identities 1985 gosper briefly held world record computing digits pi 17 million digits see chronology computation π | [
4992,
1443,
2798,
5361,
2135,
10104,
989,
4799
] | Test |
4,982 | 6 | VMware_VMFS:vmware vmfs vmware vmfs virtual machine file system vmware inc. clustered file system used company flagship server virtualization suite vsphere developed store virtual machine disk images including snapshots multiple servers read/write filesystem simultaneously individual virtual machine files locked vmfs volumes logically grown non-destructively increased size spanning multiple vmfs volumes together five plus one vsan versions vmfs corresponding esx/esxi server product releases java open source vmfs driver enables read-only access files folders partitions formatted virtual machine file system vmfs developed maintained fluid operations ag allows features like offloaded backups virtual machines hosted vmware esxi hosts vmfsv3 based fluidops code vmfs-tools evolved add vmfs features supports read vmfs mounts standard linux vfs fuse framework developed christophe fillot mike hommey available source code download glandium.org vmfs-tools page debian vmfs-tools ubuntu vmfs-tools packages | [
9762,
6309,
6153,
2314,
492,
5677,
7983,
819,
823,
8410,
2395
] | Test |
4,983 | 5 | Link_Quality_Report:link quality report link quality report lqr protocol part point-to-point protocol ppp allows two computers connect lqr allows peers either end ppp link assess state quality ppp link lqr transmits counts packets sent received rejected errors report signal noise attenuation order produce link quality reports ppp peer implement link quality monitoring link quality monitoring consists maintaining number counters counters include use lqrs negotiated ppp link first established peer wants receive lqr packets signals sending ppp configuration option following data lqr one packet containing counters well addition receiving peer add following fields lqr packet arrives numbers come mib database ppp receive logic maintains saved use next lqr packet peer sends number ppp implementations cause errors lqr generation implementations negotiate correctly lqrs fail send leads local peer determining ppp link failed led users using less capable lcp echos detect whether link still functioning lcp echos provide information lqr could provide | [
8432
] | None |
4,984 | 1 | SciELO:scielo scielo scientific electronic library online bibliographic database digital library cooperative electronic publishing model open access journals scielo created meet scientific communication needs developing countries provides efficient way increase visibility access scientific literature originally established brazil 1997 today 16 countries scielo network journal collections argentina bolivia brazil chile colombia costa rica cuba ecuador mexico paraguay peru portugal south africa spain uruguay venezuela scielo initially supported são paulo research foundation fapesp brazilian national council scientific technological development cnpq along latin american caribbean center health sciences information bireme scielo provides portal integrates provides access scielo network sites users search across scielo collections limit single country collection browse subject area publisher journal title october 2015 database contained different countries universally accessible free open access full-text format scielo project stated aims envisage development common methodology preparation storage dissemination evaluation scientific literature electronic format journals published special software suite implements scientific electronic virtual library accessed via several mechanisms including table titles alphabetic subject list subject author indexes search engine project launch timeline 2013 latin american scielo project completed 15 years free publishing open access long emphasized access scholarly materials however open access also mean access means producing visible recognized journals issue particularly important developing emergent countries benefits challenges publishing scientific journals emerging countries articles sent scielo publishers xml html+sgml using variety article dtds sgml dtd used 2013 scielo started offer journal article tag suite jats dtd standard xml deposites using markup xml macro proprietary desktop application microsoft office word docx scielo portals received jats-articles converted via xslt html sgml+html pack articles use html content general handmade pdf-to-html conversion process may reveal errors reported back publisher correction graphics also converted standard formats sizes original converted forms archived converted form moved relational database along associated files graphics multimedia associated data many publishers also provide pdfs articles made available without change bibliographic citations sgml xml parsed automatically linked associated articles scielo resources publishers web sites unresolvable references journals particular articles yet available one sources tracked database automatically come live resources become available in-house indexing system provides search capability july 2015 jeffrey beall american librarian posted article blog referring two largest latin american open access databases scielo redalyc favelas derogatory portuguese term slum beall stated many north american scholars never even heard meta-publishers journals aggregate content largely hidden neighborhood remote unfamiliar among responses motion passed brazilian forum public health journals editors associação brasileira de saúde coletiva abrasco brazilian public health association motion takes exception beall characterization draws attention underlying ethnocentric prejudice corrects factual inaccuracies counterpoint beall neocolonial point view motion draws attention work vessuri guedon cetto emphasizing value initiatives scielo redalyc also targeted beall development science latin america globally fact latin america using oa publishing model far greater extent region world… also sense public mission remains strong among latin american universities… current initiatives demonstrate region contributes global knowledge exchange positioning research literature public good | [
10401,
10759,
8627,
502,
8539,
479
] | None |
4,985 | 9 | DYNAMO_(programming_language):dynamo programming language dynamo dynamic models historically important simulation language accompanying graphical notation developed within system dynamics analytical framework originally industrial dynamics soon extended applications including population resource studies urban planning dynamo initially developed direction jay wright forrester late 1950s dr. phyllis fox alexander l. pugh iii grace duren others m.i.t computation center dynamo used system dynamics simulations global resource-depletion reported club rome limits growth since fallen disuse 1958 forrester unwittingly instigated dynamo development asked mit staff programmer compute needed solutions equations harvard business review paper writing industrial dynamics programmer richard bennett chose implement system simple simulation industrial management problems lots equations took coded equations symbolic input computed solutions simple became proof-of-concept dynamo rather specialist programmer hard-code special-purpose solver general purpose programming language users could specify system equations special simulation language get simulation output one program execution dynamo designed emphasize following among ways dynamo standard time featured units checking numerical types relatively clear error messages earliest versions written assembly language ibm 704 ibm 709 ibm 7090 dynamo ii written aed-0 extended version algol 60 dynamo ii/f 1971 generated portable fortran code dynamo ii/f dynamo iii improved system portability written fortran originally designed batch processing mainframe computers made available minicomputers late 1970s became available micro-dynamo personal computers early 1980s language went several revisions dynamo ii dynamo iv 1983 apart indirectly felt public impact environmental issues raised controversy limits growth dynamo influential history discrete-event simulation even though essentially package continuous simulation specified difference equations said opened opportunities computer modelling even users relatively low mathematical sophistication hand also criticized weak precisely mathematical sophistication required relying euler integration | [
4492,
5775,
3408,
5277,
477
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.