node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
4,986 | 4 | The_Art_of_Deception:art deception art deception book kevin mitnick covers art social engineering part book composed real stories examples social engineering combined hacking nearly examples fictional quite plausible expose ease skilled social engineer subvert many rules people take granted examples book also giving example tell tricked/conned victims scam prevent real life business book ends mitnick strategy business plans prevent scams book | [
4435,
4956,
7927
] | None |
4,987 | 4 | Software_fault_tolerance:software fault tolerance software fault tolerance ability computer software continue normal operation despite presence system hardware faults fault-tolerant software ability satisfy requirements despite failures thing constant change certainly true software systems almost phenomenon software change way software fault tolerance methods designed overcome execution errors modifying variable values create acceptable program state need control software fault one rising challenges facing software industries today fault tolerance must key consideration early stage software development exist different mechanisms software fault tolerance among computer applications make call using application programming interface api access shared resources like keyboard mouse screen disk drive network printer fail two ways blocked call request services operating system halts computer program results available example tcp call blocks response becomes available remote server occurs every time perform action web browser intensive calculations cause lengthy delays effect blocked api call two methods used handle blocking threading allows separate sequence execution api call block prevent overall application stalling waiting resource benefit none information state api call lost activities take place threaded languages include following timers allow blocked call interrupted periodic timer allows programmer emulate treading interrupts typically destroy information related state blocked api call intensive calculation programmer must keep track information separately un-threaded languages include following corrupted state occur timers avoided following fault induced signals posix compliant systems signals originate api calls operating system applications signal handler code becomes fault causes premature application termination handler function performed on-demand application receives signal called exception handling termination signal signal handled signals directed handler function handler functions come two broad varieties initialized handler functions paired signal software starts causes handler function startup corresponding signal arrives technique used timers emulate threading in-line handler functions associated call using specialized syntax familiar following used c++ java hardware fault tolerance software requires following backup maintains information event hardware must replaced done one two ways backup requires information-restore strategy make backup information available replacement system restore process usually time-consuming information unavailable restore process complete redundancy relies replicating information one computer computing device recovery delay brief achieved using continuous backup live system remains inactive needed synchronized backup also achieved replicating information created multiple identical systems eliminate recovery delay | [
2592,
3366
] | None |
4,988 | 4 | Canadian_Trusted_Computer_Product_Evaluation_Criteria:canadian trusted computer product evaluation criteria canadian trusted computer product evaluation criteria ctcpec computer security standard published 1993 communications security establishment provide evaluation criterion products combination tcsec also called orange book european itsec approaches ctcpec led creation common criteria standard canadian system security centre part communications security establishment founded 1988 establish canadian computer security standard | [
8904,
4067,
2558,
10467
] | None |
4,989 | 9 | Revolution_(software_platform):revolution software platform revolution software development environment/multimedia authoring software tradition hypercard based metacard engine primary focus providing relatively accessible development tool set scripting language enable creation software programs run across multiple platforms little code modifications integrated development environment ide included revolution built partly models created bill atkinson original hypercard team apple subsequently followed many software development products microsoft visual basic revolution includes english language-like scripting language called transcript full programming language superset hypercard scripting language hypertalk higher-grade versions see versions allow applications compiled run one platform including macintosh classic mac os 9 mac os x windows unix-like systems including linux also import hypercard stacks require little modification unless use external functions generally work revolution revolution designed environment non-programmers feel ease programmers feel uncomfortable getting used non-traditional programming syntax like programming language development environment opinions degree aims achieved vary greatly revolution 2 starter kit version available freeware imposed restrictions user allowing scripts longer ten lines compiled however since discontinued longer available download dreamcard version intended home users/hobbyists applications called stacks built using require either dreamcard player full copy revolution run dreamcard include revolution compiler studio version powerful useful creating professional binary applications enterprise version probably expensive casual users compared similar products borland delphi kylix priced competitively one wishes develop programs non-microsoft platforms cross-platform deployment revolution one small handful commercially supported options revolution derived metacard engine metacard stacks 100 compatible revolution however way around necessarily true hypercard stacks run externals run macs supercard stacks must run converter upgraded revolution/metacard format revolution runs mac classic mac os x windows 9x/nt/2000/xp following unix variants standalone applications written revolution run well windows 3.1 limitations march 2005 dreamcard player runs windows mac os classic x linux linux user gnome/xfce/gtk+ theme used gtk+ installed otherwise motif look used mac appearance manager used available otherwise platinum look used windows xp theme standard widgets used users preview motif platinum windows appearance platform many companies groups use revolution engine mainly used freelance programmers make small widgets libraries one example used exclusively christa mcauliffe space education center | [
5506,
10051,
10436,
1542,
4486,
4844,
1389,
6797,
847,
499,
9780,
5397,
823,
1304,
3167,
1399
] | Test |
4,990 | 4 | VLAN_hopping:vlan hopping vlan hopping computer security exploit method attacking networked resources virtual lan vlan basic concept behind vlan hopping attacks attacking host vlan gain access traffic vlans would normally accessible two primary methods vlan hopping switch spoofing double tagging attack vectors mitigated proper switch port configuration switch spoofing attack attacking host imitates trunking switch speaking tagging trunking protocols e.g multiple vlan registration protocol ieee 802.1q dynamic trunking protocol used maintaining vlan traffic multiple vlans accessible attacking host switch spoofing exploited interfaces set negotiate trunk prevent attack cisco ios use one following methods 1 ensure ports set negotiate trunks automatically disabling dtp 2 ensure ports meant trunks explicitly configured access ports double tagging attack attacker connected 802.1q-enabled port prepends two vlan tags frame transmits frame externally tagged vlan id attacker port really member forwarded without first tag native vlan trunk interface second tag visible second switch frame encounters second vlan tag indicates frame destined target host second switch frame sent target host though originated target vlan effectively bypassing network mechanisms logically isolate vlans one another however possible replies forwarded attacking host unidirectional flow double tagging exploited switch ports configured use native vlans trunk ports configured native vlan n't apply vlan tag sending frames allows attacker fake vlan tag read next switch double tagging mitigated following actions incl ios example example double tagging attack consider secure web server vlan called vlan2 hosts vlan2 allowed access web server hosts outside vlan2 blocked layer 3 filters attacking host separate vlan called vlan1 native creates specially formed packet attack web server places header tagging packet belonging vlan2 header tagging packet belonging vlan1 packet sent switch sees default vlan1 header removes forwards packet next switch sees vlan2 header puts packet vlan2 packet thus arrives target server though sent another host vlan2 ignoring layer 3 filtering might place | [
3473,
10905,
939
] | Validation |
4,991 | 3 | Druid_(video_game):druid video game druid action-adventure game developed electralyte software published firebird 1986 atari 8-bit family commodore 64 also ported amstrad cpc zx spectrum game ported nippon dexter msx japan-only 1988 another japanese port druid entitled made famicom disk system jaleco 1988 game followed inspired arcade game gauntlet druid fantasy-themed action-adventure game player plays part hasrinaxx druid trying rid world dark mage acamantor army demons hasrinaxx must travel several levels first level normal landscape ones underground one deeper previous level infested various enemies ghosts giant insects witches four demon princes hasrinaxx shoot enemies three different weapons water fire electricity come finite supply equally effective enemies using chaos spell destroy enemies player vicinity well replenishing energy four demon princes defeated chaos spell common weapons ineffective hasrinaxx also summon golem help turn invisible brief period commodore 64 version second player take control golem using joystick port 2 | [
7536,
5340,
9006
] | None |
4,992 | 9 | Richard_Greenblatt_(programmer):richard greenblatt programmer richard d. greenblatt born december 25 1944 american computer programmer along bill gosper may considered founded hacker community holds place distinction communities programming language lisp massachusetts institute technology mit artificial intelligence laboratory greenblatt born portland oregon december 25 1944 family moved philadelphia pennsylvania child later moved columbia missouri mother sister parents divorced greenblatt enrolled mit fall 1962 around second term undergraduate student found way mit famous tech model railroad club time peter samson written program fortran ibm 709 series machines automate tedious business writing intricate timetables railroad club vast model train layout greenblatt felt compelled implement fortran compiler pdp-1 lacked one computer time available debug compiler even type computer years later elements compiler combined ideas fellow tmrc member steven piner author early pdp-4 fortran compiler working digital equipment corporation typed showed signs life however perceived need fortran compiler evaporated compiler pursued experiences tmrc especially influence alan kotok worked dec junior partner design team pdp-6 computer led greenblatt ai lab proceeded become hacker hacker noted programming acumen described steven levy acknowledged gerald jay sussman harold abelson said fortunate apprentice programmers feet bill gosper richard greenblatt indeed spent much time programming programmed data processor pdp machines failed mit first-term junior take job firm charles adams associates ai lab hired 6 months later 1979 tom knight main designers mit lisp machine founded lisp machines inc. later renamed gigamos systems according vision ideal hacker-friendly computer company opposed commercial ideals symbolics main implementor maclisp pdp-6 wrote mac hack first computer program play tournament-level chess first compete human chess tournament ai skeptic hubert dreyfus famously made claim computers would able play high-quality chess beaten program marking start respectable computer chess performances 1977 unbeaten chess champion bobby fischer played three games cambridge massachusetts greenblatt computer program fischer greenblatt along tom knight stewart nelson co-wrote incompatible timesharing system highly influential time-sharing operating system pdp-6 pdp-10 used mit | [
10752,
11269,
2056,
2062,
9231,
7184,
2577,
9749,
8728,
4633,
4122,
8226,
3119,
2105,
3132,
6717,
8258,
8771,
1613,
80,
9299,
10841,
3675,
7267,
2660,
8293,
2666,
5751,
1147,
7805,
1159,
9865,
9877,
5803,
2225,
7867,
4799,
7880,
8908,
205... | None |
4,993 | 5 | Binkp:binkp binkp protocol transferring fidonet wwivnet mail reliable connections typically used deliver mail internet instead point-to-point connections modems historically fidonet traffic transferred mainly serial rs-232 modem connections might error correction layer dial-up-oriented protocols transferring fidonet traffic like emsi zmodem implement error-recovery members fidonet started use tcp/ip transfer fidonet traffic error-recovery overhead became unnecessary assuming connection reliable makes possible eliminate error-checking unnecessary synchronization steps achieving ease implementation improved performance major advantage binkp vs emsi zmodem achieved connections large delays low bandwidth iana internet assigned numbers authority registered port number 24554 binkp used tcp/ip connections | [
6993,
1121
] | Train |
4,994 | 4 | AV-Comparatives:av-comparatives av-comparatives austrian independent organization tests assesses antivirus software regularly releasing charts reports freely available public media antivirus vendors meet various requirements regarding trustworthiness reliability order take part tests av-comparatives issues relevant awards based antivirus software comprehensive performance according multiple testing criteria also supported university innsbruck academic bodies around world well austrian federal government regional government tirol av-comparatives real world protection test test environment closely approximates well antivirus product protect real-world users test results released monthly march june august november two detailed overall result reports released june december real world protection test framework recognized “ standortagentur tirol ” 2012 cluster award innovation computer science 2018 av-comparatives started large scale enterprise security software test series consisting real-world test false alarm test malware protection test performance test well review av-comparatives provided undroid apk analyzer free service website users since may 2013 designed android smartphone users provides static analysis android apps users upload android application package apk receive quick online analysis containing file hashes graphical danger level additional information | [
5057,
2213,
1417,
202,
43,
6699,
6797,
8493,
8940,
4464,
9713,
4659,
10708,
823,
1242,
2654
] | Test |
4,995 | 2 | Google_Assistant:google assistant google assistant artificial intelligence-powered virtual assistant developed google primarily available mobile smart home devices unlike company previous virtual assistant google google assistant engage two-way conversations assistant initially debuted may 2016 part google messaging app allo voice-activated speaker google home period exclusivity pixel pixel xl smartphones began deployed android devices february 2017 including third-party smartphones android wear wear os released standalone app ios operating system may 2017 alongside announcement software development kit april 2017 assistant extended support large variety devices including cars third party smart home appliances functionality assistant also enhanced third-party developers 2017 google assistant installed 400 million devices users primarily interact google assistant natural voice though keyboard input also supported nature manner google assistant able search internet schedule events alarms adjust hardware settings user device show information user google account google also announced assistant able identify objects gather visual information device camera support purchasing products sending money well identifying songs ces 2018 first assistant-powered smart displays smart speakers video screens announced first one released july 2018 google assistant unveiled google developer conference may 18 2016 part unveiling google home smart speaker new messaging app allo google ceo sundar pichai explained assistant designed conversational two-way experience ambient experience extends across devices later month google assigned google doodle leader ryan germick hired former pixar animator emma coats develop little personality system-level integration outside allo app google home google assistant initially exclusive pixel pixel xl smartphones february 2017 google announced begun enable access assistant android smartphones running android marshmallow nougat beginning select english-speaking markets android tablets receive assistant part rollout assistant also integrated android wear 2.0 included future versions android tv android auto october 2017 google pixelbook became first laptop include google assistant google assistant later came google pixel buds december 2017 google announced assistant would released phones running android lollipop update google play services well tablets running 6.0 marshmallow 7.0 nougat february 2019 google reportedly began testing ads google assistant results may 15 2017 android police reported google assistant would coming ios operating system separate app information confirmed two days later google developer conference january 2018 consumer electronics show first assistant-powered smart displays released smart displays shown event lenovo sony jbl lg devices support google duo video calls youtube videos google maps directions google calendar agenda viewing smart camera footage addition services work google home devices devices based android things google-developed software google unveiled smart display google home hub october 2018 utilizes different system platform december 2016 google launched actions google developer platform google assistant actions google allows 3rd party developers build apps google assistant march 2017 google added new tools developing actions google support creation games google assistant originally limited google home smart speaker actions google made available android ios devices may 2017 time google also introduced app directory overview compatible products services incentivize developers build actions google announced competition first place tickets google 2018 developer conference 10,000 walk-through google campus second place third place received 7,500 5,000 respectively google home april 2017 software development kit sdk released allowing third-party developers build hardware run google assistant integrated raspberry pi cars audi volvo smart home appliances including fridges washers ovens companies including irobot lg general electric d-link google updated sdk december 2017 add several features google home smart speakers google assistant smartphone apps previously supported features include may 2 2018 google announced new program blog focuses investing future google assistant early-stage startups focus build environment developers could build richer experiences users includes startups broaden assistant features building new hardware devices simply differentiating different industries google assistant nature manner google search internet schedule events alarms adjust hardware settings user device show information user google account unlike google however assistant engage two-way conversation using google natural language processing algorithm search results presented card format users tap open page february 2017 google announced users google home would able shop entirely voice products google express shopping service products available whole foods market costco walgreens petsmart bed bath beyond launch retailers added following months new partnerships formed google assistant maintain shopping list previously done within notetaking service google keep feature moved google express google home app april 2017 resulting severe loss functionality may 2017 google announced assistant would support keyboard typed input visual responses support identifying objects gather visual information device camera support purchasing products sending money use keyboard users see history queries made google assistant edit delete previous inputs assistant warns deleting however due use previous inputs generate better answers future november 2017 became possible identify songs currently playing asking assistant.. google assistant allows users activate modify vocal shortcut commands order perform actions device android ipad/iphone configuring hub home automation feature speech recognition available english among languages july 2018 google home version assistant gained support multiple actions triggered single vocal shortcut command annual i/o developers conference may 8 2018 google seo announced addition six new voice options google assistant one john legend made possible wavenet voice synthesizer developed deepmind significantly reduced amount audio samples voice actor required produce creating voice model august 2018 google added bilingual capabilities google assistant existing supported languages devices recent reports say may support multilingual support setting third default language android phone default option google assistant n't support two common features speech recognition transcribed texts like punctuation spelling however beta feature speech-to-text enables en-us language users ask detect insert punctuation transcription results speech-to-text recognize commas question marks periods transcription requests april 2019 popular audio games assistant crystal ball lucky trivia biggest voice change software history voice assistant able add expression games instance crystal ball game voice would speak slow soft intro answer revealed make game excitable lucky trivia game voice would become excitable like game show host british accent voice crystal ball voice would say word 'probably downwards slide like sure games used text speech voice makes voice robotic may 2019 however turned bug speech api caused games lose studio quality voices audio games fixed may 20th 2019 may 2018 google revealed duplex extension google assistant allows carry natural conversations mimicking human voice manner dissimilar robocalling assistant autonomously complete tasks calling hair salon book appointment scheduling restaurant reservation calling businesses verify holiday store hours duplex complete tasks fully autonomously able recognize situations unable complete signal human operator finish task duplex created speak natural voice language incorporating speech disfluencies filler words like hmm uh using common phrases mhm gotcha along human-like intonation response latency duplex currently development limited release late 2018 google pixel users limited release pixel phone users atlanta new york phoenix san francisco able use duplex make restaurant reservations announcement concerns made ethical societal questions artificial intelligence technology duplex raises instance human operators may notice speaking digital robot conversing duplex critics view unethical deceitful concerns privacy also identified conversations duplex recorded order virtual assistant analyze respond privacy advocates also raised concerns millions vocal samples gathered consumers fed back algorithms virtual assistants making forms ai smarter use though features individualize user experience critics unsure long term implications giving company unprecedented access human patterns preferences crucial next phase artificial intelligence could potentially lead ai outsmarting creators transparency referred key part experience technology revealed google later clarified statement saying designing feature disclosure built-in 'll make sure system appropriately identified google added certain jurisdictions assistant would inform end phone call recorded pc world mark hachman gave favorable review google assistant saying step cortana siri digital trends called smarter google ever july 2019 belgian public broadcaster vrt nws published article revealing 3rd party contractors paid transcribe audio clips collected google assistant listened sensitive information users sensitive data collected google home devices android phones included names addresses private conversations business calls bedroom conversations 1000 recordings analysed 153 recorded without ‘ okay google ’ command google officially acknowledged 0.2 recordings listened language experts improve google services august 1 2019 germany ’ hamburg commissioner data protection freedom information initiated administrative procedure prohibit google carrying corresponding evaluations employees third parties period three months provisionally protect rights privacy data subjects time citing gdpr google spokesperson stated google paused “ language reviews ” european countries investigated recent media leaks google assistant new feature google assistant supported languages | [
4096,
516,
5637,
8719,
3600,
4624,
7700,
9244,
11294,
1578,
10284,
2605,
3633,
9779,
6208,
6212,
69,
8262,
4683,
4685,
11343,
3664,
8280,
8285,
2658,
7780,
8821,
11391,
1670,
8326,
7816,
5262,
6800,
11408,
9366,
10393,
8858,
7835,
673,
78... | Test |
4,996 | 2 | Group_Control_System:group control system group control system gcs operating system made ibm meant run guest vm gcs integral component discontinued vm/sp since vm/sp 4 vm/xa sp vm/esa current z/vm ibm system product offerings gcs purpose provide environment run specific os/mvs-based applications networking middleware vm end gcs provides limited simulation os/mvs apis cms usual vm guest already os simulation extensive enough run applications vtam specifically gcs provides os multitasking support order able spread load several virtual machines gcs also implements notion group group member virtual machine interact one another implement gcs uses several techniques gcs designed multi-purpose user operating system cms example allow file editing examples programs designed run gcs | [
10883,
6148,
7053,
8077,
9361,
9619,
9468,
789,
5397,
11673,
9370,
6557,
3359,
10273,
421,
7848,
2345,
6442,
7983,
8879,
7217,
9139,
10803,
7477,
7733,
10040,
8122,
573,
8509,
1219,
964,
8388,
6342,
1235,
7507,
863,
3938,
5603,
868,
3429,... | None |
4,997 | 2 | Jim_Jagielski:jim jagielski jim jagielski born march 11 1961 american software engineer specializes web cloud open source technologies jagielski graduated johns hopkins university 1983 bes electrical/computer engineering hired nasa goddard space flight center immediately graduation 1994 jagielski founded jagunet access services web host isp served cto zend technologies cto covalent technologies chief architect springsource/vmware office cto red hat inc. consulting software engineer sr. director capital one tech fellows program currently open source chef consensys speaker various conferences seminars apachecon forrester gigaworld o'reilly open source convention written numerous topics editor apache section slashdot best known cofounder member director apache software foundation asf core developer several asf projects including apache http server apache portable runtime apache tomcat first recognition internet editor a/ux faq system administrator jagubox primary repository third-party software apple a/ux operating system addition involvement asf jagielski involved open-source projects jagielski one founding members apache software foundation member original eight-member apache group jagielski served director asf board incorporation 1999 2018 making longest serving director foundation history served eight years executive vice president secretary three years chairman jagielski served several years president asf jagielski original chair apache incubator project still involved one original co-mentors geronimo project also mentors several incubator podlings jagielski active developer many open source projects asf otherwise development ncsa httpd web server started apache early-to-mid 1995 making likely longest active contributor within asf 2005 jagielski asked serve advisory board open source software institute open source software institute ossi non-profit 501 c 6 organization corporate government academic representatives mission promote development implementation open-source software solutions within u.s. federal state municipal government agencies academic entities 2010 jagielski appointed board directors codeplex foundation later renamed outercurve foundation well director jagielski serves president outercurve 2011 jagielski appointed board directors open source initiative resigned september 2013 based long involvement foss community jagielski one recipients o'reilly open source awards oscon 2012 2012 jagielski appointed new council member marsec-xl foundation 2015 jagielski awarded european commission/open innovation strategy policy group luminary award creating open engagement platforms global efforts promoting open source innovation process jagielski contributed sendmail xntpd bind php perl freebsd among projects | [
865,
4194,
8644,
4837,
8582,
3241,
3986,
1363
] | Test |
4,998 | 9 | System_programming_language:system programming language system programming language programming language used system programming languages designed writing system software usually requires different development approaches compared application software system software computer software designed operate control computer hardware provide platform running application software system software includes software categories motherboard firmware components firmware chipset peripheral controllers sometimes cpu microcode architectures provide rich complex isa interpreted simple general purpose hardware circuits bios/uefi second stage boot loaders operating systems comprising essential always running services api exposed system libraries user applications interfaces kernel address space obviously kernel utilities system administration device drivers loaders dynamic linkers contrast application languages system programming languages typically offer more-direct access physical hardware machine archetypical system programming language sense bcpl system programming languages often lack built-in input/output i/o facilities system-software project usually develops i/o mechanisms builds top basic monitor i/o screen management facilities distinction languages used system programming application programming became blurred time widespread popularity pl/i c pascal earliest system software written assembly language primarily alternative also reasons including efficiency object code compilation time ease debugging application languages fortran used system programming although usually still required routines written assembly language mid-level languages much syntax facilities higher level language also provide direct access language well providing assembly language machine features earliest espol burroughs mainframes 1960 followed niklaus wirth pl360 initially written burroughs system cross compiler general syntax algol 60 whose statements directly manipulated cpu registers memory languages category include mol-360 pl/s example typical pl360 statement codice_1 signifying registers 8 7 and'ed together result shifted left 8 bits result or'ed contents register 6 final result placed register 9 pl360 semantic level assembly language another kind system programming language operates higher semantic level specific extensions designed make language suitable system programming early example kind language lrltran extended fortran features character bit manipulation pointers directly addressed jump tables subsequently languages c developed combination features sufficient write system software compiler could developed generated efficient object programs modest hardware language generally omits features implemented efficiently adds small number machine-dependent features needed access specific hardware capabilities inline assembly code c asm statement often used purpose although many languages developed c c++ ones survived system programming language spl also name specific language hp 3000 computer series used operating system hp multi-programming executive parts system software | [
5634,
7173,
8582,
8966,
9224,
3594,
1552,
8976,
5397,
9751,
25,
9245,
8606,
11295,
3876,
5803,
428,
5165,
5677,
5551,
7983,
9264,
1715,
8502,
10680,
58,
1469,
10176,
837,
1349,
8262,
10568,
9931,
8524,
10703,
7889,
5714,
11219,
1236,
6742... | Test |
4,999 | 5 | RadSec:radsec radsec protocol transporting radius datagrams tcp tls radius protocol widely deployed authentication authorization protocol supplementary radius accounting specification also provides accounting mechanisms thus delivering full aaa protocol solution however radius experiencing two major shortcomings time passes since initial design dependency unreliable transport protocol udp lack security large parts packet payload specifically latter radius security based md5 algorithm proven insecure main focus radsec provide means secure communication radius/tcp peers transport layer important use radsec lies roaming environments radius packets need transferred different administrative domains untrusted potentially hostile networks example world-wide roaming environment uses radsec secure communication eduroam radius extensions working group internet engineering task force ietf specified radsec rfc 6614 | [
10058,
10924,
4053,
11413
] | Test |
5,000 | 2 | Reboot:reboot computing rebooting process running computer system restarted either intentionally unintentionally reboots either cold alternatively known hard power system physically turned back causing initial boot machine warm alternatively known soft system restarts without need interrupt power term restart used refer reboot operating system closes programs finalizes pending input output operations initiating soft reboot early electronic computers like ibm 1401 operating system little internal memory input often stack punch cards computer initiated pressing start button performed single command read card first card instructed machine read cards eventually loaded user program process likened old saying picking bootstraps referring horseman lifts ground pulling straps boots set initiating punch cards called bootstrap cards thus cold start called booting computer computer crashed rebooted boot reference carried subsequent types computers see bootstrapping technical sources describe two contrasting forms reboot known cold reboot also cold boot hard reboot hard boot warm reboot also soft reboot soft boot although definition forms vary slightly sources according jones landes tittel 2002 cooper 2002 tulloch 2002 soper 2004 ibm pc compatible platform cold boot boot process computer starts powerless state except tulloch 2002 also mention cold boot system performs power-on self-test post addition power switch cooper 2002 soper 2004 also state reset button present may commence cold reboot jones landes tittel 2002 contradicts assertion states reset button may commence either cold warm reboot depending system microsoft support article 102228 also confers although reset button designed perform cold reboot may disconnect power motherboard – state correspond cold boot definition given according jones landes tittel 2002 operating system third-party software initiate cold boot restart command windows 9x initiates cold reboot unless shift key held finding definition warm boot however challenge aforementioned sources indicate warm boot initiated pressing ctrl alt delete key combination except tulloch 2002 mention warm reboot perform post jones landes tittel 2002 specifies warm reboot occur bios must recipient key combination microsoft support article 102228 takes technical approach defines warm boot result invoking int 19h bios interrupt call ctrl alt delete key combination one way achieving according grimes 2001 malware may prevent subvert warm boot intercepting ctrl alt delete key combination prevent reaching bios windows nt family operating systems also reserves key combination use soper 2004 asserts windows restart command initiates warm boot thus contradicting jones landes tittel 2002 believe action performs cold boot linux family operating systems supports alternative warm boot linux kernel optional support kexec system call transfers execution new kernel skips hardware firmware reset entire process occurs independently system firmware kernel executed linux kernel outside domain ibm compatible pcs types boot may disambiguous according sue loh windows ce base team windows ce devices support three types boots warm cold clean warm boot discards program memory cold boot additionally discards storage memory also known object store clean boot erases forms memory storage device however since areas exist windows ce devices users concerned two forms reboot one resets volatile memory one wipes device clean restores factory settings example windows mobile 5.0 device former cold boot latter clean boot hard reboot means system shut orderly manner skipping file system synchronisation activities would occur orderly shutdown achieved either applying reset cycling power issuing command unix-like systems triggering kernel panic term restart used microsoft windows linux family operating systems denote operating system-assisted reboot restart operating system ensures pending i/o operations gracefully ended commencing reboot users may deliberately initiate reboot rationale action may include means performing deliberate reboot also vary may include unexpected loss power reason including power outage power supply failure depletion battery mobile device forces system user perform cold boot power restored bioses option automatically boot system power failure uninterruptible power supply ups backup battery redundant power supply prevent circumstances random reboot non-technical term referring unintended often undesired reboot following system crash whose root cause may immediately evident user crashes may occur due multitude software hardware problems triple faults generally symptomatic error ring 0 trapped error handler operating system hardware-triggered non-maskable interrupt systems may configured reboot automatically power failure fatal system error kernel panic method done varies depending whether reboot handled software must handled firmware hardware level operating systems windows nt family windows nt 3.1 windows 7 option modify behavior error handler computer immediately restarts rather displaying blue screen death bsod error message option enabled default editions introduction advanced power management allowed operating systems greater control hardware power management features advanced configuration power interface acpi newer operating systems able manage different power states thereby sleep and/or hibernate hibernation also involves turning system subsequently back operating system start scratch thereby differentiating process rebooting reboot may simulated software running operating system example sysinternals bluescreen utility used pranking modes bsod xscreensaver hack entertainment albeit possibly concerning first glance malware may also simulate reboot thereby deceive computer user nefarious purpose microsoft app-v sequencing tool captures file system operations installer order create virtualized software package users part sequencing process detect installer requires reboot interrupt triggered reboot instead simulate required reboot restarting services loading/unloading libraries windows 8 10 enable default hibernation-like fast startup a.k.a fast boot cause problems including confusion users accustomed turning computers cold reboot | [
8447,
11140,
6797,
8976,
10130,
8852,
5397,
3109,
8997,
7983,
823,
7739,
4032,
321,
5312,
9540,
6601,
7501,
2383,
10063,
9557,
7515,
3807,
6369,
8418,
4836,
1515,
3181,
9197,
1903,
5105,
6129,
2811,
1660,
7678,
639
] | Train |
5,001 | 3 | 4x4_Off-Road_Racing:4x4 off-road racing 4x4 off-road racing video game racing genre released 1988 epyx developed ogdan micro design inc four maps consist mud ice desert mountains compute called game enjoyable drive spanish magazine microhobby valued game following scores originality 50 graphics 50 motion 60 sound 50 difficulty 70 addiction 40 | [
10931,
9166,
9006
] | None |
5,002 | 4 | Cyber-security_regulation:cyber-security regulation cybersecurity regulation comprises directives safeguard information technology computer systems purpose forcing companies organizations protect systems information cyberattacks like viruses worms trojan horses phishing denial service dos attacks unauthorized access stealing intellectual property confidential information control system attacks numerous measures available prevent cyberattacks cybersecurity measures include firewalls anti-virus software intrusion detection prevention systems encryption login passwords attempts improve cybersecurity regulation collaborative efforts government private sector encourage voluntary improvements cybersecurity industry regulators including banking regulators taken notice risk cybersecurity either begun planned begin include cybersecurity aspect regulatory examinations 2011 dod released guidance called department defense strategy operating cyberspace articulated five goals treat cyberspace operational domain employ new defensive concepts protect dod networks systems partner agencies private sector pursuit whole-of-government cybersecurity strategy work international allies support collective cybersecurity support development cyber workforce capable rapid technological innovation march 2011 gao report identified protecting federal government information systems nation cyber critical infrastructure governmentwide high-risk area noting federal information security designated high-risk area since 1997 2003 systems protecting critical infrastructure called cyber critical infrastructure protection cyber cip also included november 2013 dod put forward new cybersecurity rule 78 fed reg 69373 imposed certain requirements contractors compliance certain nist standards mandatory reporting cybersecurity incidents dod flow-down clause applies requirements subcontractors june 2013 congressional report found 50 statutes relevant cybersecurity compliance federal information security management act 2002 fisma one key statutes governing federal cybersecurity regulations federal cybersecurity regulations ones exist focus specific industries three main cybersecurity regulations 1996 health insurance portability accountability act hipaa 1999 gramm-leach-bliley act 2002 homeland security act included federal information security management act fisma three regulations mandate healthcare organizations financial institutions federal agencies protect systems information example fisma applies every government agency requires development implementation mandatory policies principles standards guidelines information security however regulations address numerous computer related industries internet service providers isps software companies furthermore regulations specify cybersecurity measures must implemented require reasonable level security vague language regulations leaves much room interpretation bruce schneier founder cupertino counterpane internet security argues companies make sufficient investments cybersecurity unless government forces also states successful cyberattacks government systems still occur despite government efforts suggested data quality act already provides office management budget statutory authority implement critical infrastructure protection regulations administrative procedure act rulemaking process idea fully vetted would require additional legal analysis rulemaking could begin state governments attempted improve cybersecurity increasing public visibility firms weak security 2003 california passed notice security breach act requires company maintains personal information california citizens security breach must disclose details event personal information includes name social security number driver license number credit card number financial information several states followed california example passed similar security breach notification regulations security breach notification regulations punish firms cybersecurity failures giving freedom choose secure systems also regulation creates incentive companies voluntarily invest cybersecurity avoid potential loss reputation resulting economic loss come successful cyber attack 2004 california state legislature passed california assembly bill 1950 also applies businesses maintain personal information california residents regulation dictates businesses maintain reasonable level security required security practices also extend business partners regulation improvement federal standard expands number firms required maintain acceptable standard cybersecurity however like federal legislation requires reasonable level cybersecurity leaves much room interpretation case law established us congress proposed numerous bills expand upon cybersecurity regulation consumer data security notification act amends gramm-leach-bliley act require disclosure security breaches financial institutions congressmen also proposed expanding gramm-leach-bliley industries touch consumer financial information including firm accepts payment credit card congress proposed cybersecurity regulations similar california notice security breach act companies maintain personal information information protection security act requires data brokers ensure data accuracy confidentiality authenticate track users detect prevent unauthorized activity mitigate potential harm individuals addition requiring companies improve cybersecurity congress also considering bills criminalize cyberattacks securely protect cyber trespass act spy act bill type focused phishing spyware bill passed may 23 2005 us house representatives died us senate bill makes unlawful unauthorized usage computer take control modify setting collect induce owner disclose personally identifiable information install unsolicited software tamper security anti-spyware anti-virus software may 12 2011 us barack obama proposed package cybersecurity legislative reforms improve security us persons federal government critical infrastructure year public debate congress hearings followed resulting house representative passing information sharing bill senate developing compromise bill seeking balance national security privacy business interests july 2012 cybersecurity act 2012 proposed senators joseph lieberman susan collins bill would required creating voluntary best practice standards protection key infrastructure cyber attacks businesses would encouraged adopt incentives liability protection bill put vote senate failed pass obama voiced support act wall street journal op-ed also received support officials military national security including john o. brennan chief counterterrorism adviser white house according washington post experts said failure pass act may leave united states vulnerable widespread hacking serious cyberattack act opposed republican senators like john mccain concerned act would introduce regulations would effective could burden businesses senate vote republican senator kay bailey hutchison stated opposition bill partisan issue take right approach cybersecurity.the senate vote strictly along partisan lines six democrats voted five republicans voted critics bill included us chamber commerce advocacy groups like american civil liberties union electronic frontier foundation cybersecurity expert jody westby heritage foundation argued although government must act cybersecurity bill flawed approach represented intrusive federal role february 2013 obama proposed executive order improving critical infrastructure cybersecurity represents latest iteration policy considered law addressed congress yet seeks improve existing public-private partnerships enhancing timeliness information flow dhs critical infrastructure companies directs federal agencies share cyber threat intelligence warnings private sector entity identified target also tasks dhs improving process expedite security clearance processes applicable public private sector entities enable federal government share information appropriate sensitive classified levels directs development framework reduce cyber risks incorporating current industry best practices voluntary standards lastly tasks federal agencies involved incorporating privacy civil liberties protections line fair information practice principles january 2015 obama announced new cybersecurity legislative proposal proposal made effort prepare us expanding number cyber crimes proposal obama outlined three main efforts work towards secure cyberspace us first main effort emphasized importance enabling cybersecurity information sharing enabling proposal encouraged information sharing government private sector would allow government know main cyber threats private firms facing would allow government provide liability protection firms shared information furthermore would give government better idea us needs protected another main effort emphasized proposal modernize law enforcement authorities make equipped properly deal cyber crimes giving tools need order would also update classifications cyber crimes consequences one way would done would making crime overseas selling financial information another goal effort place cyber crimes prosecutable last major effort legislative proposal require businesses report data breaching consumers personal information sacrificed requiring companies consumers aware danger identity theft february 2016 obama developed cybersecurity national security action plan cnap plan made create long-term actions strategies effort protect us cyber threats focus plan inform public growing threat cyber crimes improve cybersecurity protections protects personal information americans inform americans control digital security one highlights plan include creating commission enhancing national cybersecurity goal create commission consists diverse group thinkers perspectives contribute make recommendations create stronger cybersecurity public private sector second highlight plan change government new government make secure put place third highlight plan give americans knowledge secure online accounts avoid theft personal information multi-factor authentication fourth highlight plan invest 35 money invested 2016 cybersecurity addition regulation federal government tried improve cybersecurity allocating resources research collaborating private sector write standards 2003 president national strategy secure cyberspace made department homeland security dhs responsible security recommendations researching national solutions plan calls cooperative efforts government industry create emergency response system cyber-attacks reduce nation vulnerability threats 2004 us congress allocated 4.7 billion toward cybersecurity achieving many goals stated president national strategy secure cyberspace industry security experts state president national strategy secure cyberspace good first step insufficient bruce schneier stated national strategy secure cyberspace n't secured anything yet however president national strategy clearly states purpose provide framework owners computer systems improve security rather government taking solving problem however companies participate collaborative efforts outlined strategy required adopt discovered security solutions united states us congress trying make information transparent cyber security act 2012 would created voluntary standards protecting vital infrastructure failed pass senate february 2013 white house issued executive order titled improving critical infrastructure cybersecurity allows executive branch share information threats companies individuals april 2013 house representatives passed cyber intelligence sharing protection act cispa calls protecting lawsuits aimed companies disclose breach information obama administration said might veto bill light hacking website indian space agency commercial arm 2015 antrix corporation government digital india programme cyberlaw expert advocate supreme court india pavan duggal stated dedicated cyber security legislation key requirement india sufficient merely put cyber security part act see cyber security sectoral perspective also national perspective cybersecurity standards great prominence today technology driven businesses maximize profits corporations leverage technology running operations internet since large number risks entail internetwork operations operations must protected comprehensive extensive regulations existing cybersecurity regulations cover different aspects business operations often vary region country business operates differences country society infrastructure values one overarching cyber security standard optimal decreasing risks us standards provide basis operations european union created tailored regulation businesses operating specifically within eu also light brexit important consider uk chosen adhere security regulations three major regulations within eu include enisa nis directive eu gdpr european union agency network information security enisa governing agency originally set regulation ec 460/2004 european parliament council 10 march 2004 purpose raising network information security nis internetwork operations eu enisa currently runs regulation eu 526/2013 replaced original regulation 2013 enisa works actively member states eu provide range services focus operations three factors enisa made management board relies support executive director permanent stakeholders group operations however run heads various departments enisa released various publications cover major issues cybersecurity enisa past current initiatives include eu cloud strategy open standards information communications technology cyber security strategy eu cyber security coordination group enisa also works collaboration existing international standard organizations like iso itu july 6 2016 european parliament set policy directive security network information systems nis directive directive went effect august 2016 member states european union given 21 months incorporate directive regulations national laws aim nis directive create overall higher level cybersecurity eu directive significantly affects digital service providers dsps operators essential services oess operators essential services include organizations whose operations would greatly affected case security breach engage critical societal economic activities dsps oes held accountable reporting major security incidents computer security incident response teams csirt dsps held stringent regulations operators essential services dsps set eu still operate eu still face regulations even dsps oes outsource maintenance information systems third parties nis directive still holds accountable security incidents member states eu required create nis directive strategy includes csirts addition national competent authorities ncas single points contact spocs resources given responsibility handling cybersecurity breaches way minimizes impact addition member states eu encouraged share cyber security information security requirements include technical measures manage risks cybersecurity breaches preventative manner dsp oes must provide information allows depth assessment information systems security policies significant incidents must notified csirts significant cybersecurity incidents determined number users affected security breach well longevity incident geographical reach incident eu general data protection regulation gdpr set place 14 april 2016 current date enforcement set 25 may 2018 gdpr aims bring single standard data protection among member states eu changes include redefining geographical borders applies entities operate eu deal data resident eu regardless data processed eu citizen data processed entity subject gdpr fines also much stringent gdpr total €20 million euros 4 entity annual turnover whichever higher addition like previous regulations data breaches effect rights freedoms individuals residing eu must disclosed within 72 hours overarching board eu data protection board edp charge oversight set gdpr consent plays major role gdpr companies hold data regards eu citizens must also offer right back sharing data easily consented sharing data addition citizens also restrict processing data stored choose allow companies store data process creates clear differentiation unlike previous regulations gdpr also restricts transfer citizen data outside eu third party without citizen prior consent proposed eprivacy regulation also planned applicable 25 may 2018 experts agree cybersecurity improvements necessary disagreement whether solution government regulation private-sector innovation many government officials cybersecurity experts believe private sector failed solve cybersecurity problem regulation needed richard clarke states industry responds threaten regulation industry respond threat follow believes software companies must forced produce secure programs bruce schneier also supports regulation encourages software companies write secure code economic incentives us representative rick boucher d–va proposes improving cybersecurity making software companies liable security flaws code addition improving software security clarke believes certain industries utilities isps require regulation hand many private-sector executives lobbyists believe regulation restrict ability improve cybersecurity harris miller lobbyist president information technology association america believes regulation inhibits innovation rick white former corporate attorney president ceo lobby group technet also opposes regulation states private-sector must continue able innovate adapt response new attack methods cyber space toward end commend president bush congress exercising regulatory restraint another reason many private-sector executives oppose regulation costly involves government oversight private enterprise firms concerned regulation reducing profits regulation limiting flexibility solve cybersecurity problem efficiently | [
4099,
10756,
4489,
11409,
5780,
150,
8471,
10392,
1315,
2213,
7337,
3629,
4654,
3759,
4016,
7345,
9901,
7739,
4689,
9426,
11347,
6360,
7899,
3552,
5986,
1251,
4081,
8824,
2041,
2558
] | None |
5,003 | 2 | Syskey:syskey sam lock tool better known syskey name executable file discontinued component windows nt encrypts security account manager sam database using 128-bit rc4 encryption key first introduced windows nt 4.0 sp3 removed windows 10 windows server 2016 due use cryptography considered insecure modern standards use part scams form ransomware microsoft officially recommended use bitlocker disk encryption alternative first introduced windows nt 4.0 sp3 syskey intended protect offline password cracking attacks preventing possessor unauthorized copy sam file extracting useful information syskey optionally configured require user enter key boot startup password load key onto removable storage media e.g. floppy disk usb flash drive october 2 2018 microsoft removed syskey.exe future versions windows microsoft recommends use bitlocker similar technologies instead syskey.exe utility december 1999 security team bindview found security hole syskey indicated certain form offline cryptanalytic attack possible making brute force attack appear possible microsoft later issued fix problem dubbed syskey bug bug affected windows nt 4.0 pre-rc3 versions windows 2000 syskey commonly abused tech support scammers lock victims computers order coerce paying ransom | [
11270,
5643,
4624,
537,
540,
3102,
9762,
8227,
8740,
1577,
10281,
3629,
2101,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
9819,
3170,
8299,
622,
9839,
4210,
7794,
7796,
1656,
6265,
7290,
4731,
10879,
1671,
8... | Test |
5,004 | 2 | Windows_Ultimate_Extras:windows ultimate extras windows ultimate extras optional features offered microsoft users ultimate edition windows vista accessible via windows update ultimate extras replaced market role microsoft plus product sold prior consumer releases microsoft windows according microsoft barry goffe company goal ultimate extras delight customers purchased ultimate edition windows vista expensive retail edition operating system windows ultimate extras discontinued windows 7 operating system also removes installed extras upgrade windows vista ultimate microsoft released total nine ultimate extras users windows vista ultimate bitlocker drive preparation tool utility secure online key backup utility among first ultimate extras made available released coincide general retail availability windows vista bitlocker drive preparation tool prepares hard drive encrypted bitlocker whereas secure online key backup enabled users create off-site backup bitlocker recovery password encrypting file system recovery certificates digital locker part windows marketplace digital distribution platform secure online key backup rendered inoperable digital locker shut august 2009 unlike previous versions windows windows vista language-independent language architecture separates language resources user interface binary code operating system support installing additional languages included enterprise ultimate editions windows vista ultimate edition functionality made available windows update ultimate extras microsoft stated 16 languages made available january 30 2007 company released remaining language packs october 23 2007 total 35 language packs additional 36th language pack version available windows vista supports traditional chinese characters hong kong encoding character set microsoft tinker puzzle game players must navigate robot mazes obstacles total 60 levels included players create levels level editor hold 'em poker card game released january 29 2007 fundamentally similar texas hold 'em hold 'em allows users play five computer players three levels difficulty also allows users customize aspects game appearance game relies directx produce hardware-accelerated 3d animations effects optimal performance hold 'em requires computer windows experience index rating 2.0 higher according paul thurrott hold 'em originally intended bundled alongside premium games— chess titans mahjong titans inkball —included default home premium ultimate editions windows vista instead made ultimate extra gambling themes total three sound schemes windows vista released ultimate extras glass ultimate extras pearl microsoft tinker first two made available april 22 2008 latter made available day microsoft tinker glass pearl sound schemes similar default sound scheme included windows vista also developed accordance design language principles windows aero graphical user interface windows dreamscene utility enables mpeg wmv videos displayed desktop backgrounds dreamscene requires windows aero graphical user interface enabled order function feature relies desktop window manager display videos desktop additional extras also proposed released including podcast creation application game performance optimization utility custom themes exclusive access online content services windows movie maker effects transitions templates windows dvd maker digital publications group shot photo manipulation application developed microsoft research shown bill gates consumer electronics show 2007 although considered ultimate extras company ultimate extras team also released two wallpapers users windows vista ultimate titled start strands wallpapers based design windows vista ultimate retail packaging made available three different display resolutions reaction windows ultimate extras mixed microsoft praised creating value proposition users purchased expensive edition windows vista company criticized delays delivery updates perceived lack quality delivered updates lack transparency regarding development early concerns features would live users expectations company announced several ultimate extras january 2007 fraction released five months later months without official update since january microsoft released apology delays stating intended ship remaining features end summer 2007 delays consecutive updates months silence led speculation development team within company responsible features quietly disbanded microsoft announced intentions release remaining ultimate extras released apology delays paul thurrott stated company dropped ball features ed bott wrote ultimate extras probably biggest mistake microsoft made vista company would downplay ultimate edition windows 7 result bott would later list among decade worth windows mistakes microsoft also criticized changing description ultimate extras within operating system offerings slated made available initially described cutting-edge programs innovative services unique publications description features within control panel applet later modified windows vista service pack 1 modest interpreted attempt made company avoid fulfilling prior expectations emil protalinski ars technica wrote ultimate edition windows vista would looked fine without joke 'ultimate extras features supposed provide incentive consumers purchase edition give critics something point laugh second part review windows 7 peter bright ars technica wrote value proposition ultimate extras nothing short piss-poor bright would later criticize microsoft decision release internet explorer 10 windows vista would go state still bad ultimate extras farce | [
11270,
5643,
4624,
537,
6171,
540,
3102,
9762,
8227,
8740,
1577,
10281,
2101,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
9819,
8798,
3170,
617,
622,
9839,
4210,
7796,
1656,
6265,
7290,
4731,
10879,
8841,
67... | None |
5,005 | 3 | Enterprise_interoperability_framework:enterprise interoperability framework enterprise interoperability framework used guideline collecting structuring knowledge/solution enterprise interoperability framework defines domain sub-domains interoperability research development order identify set pieces knowledge solving enterprise interoperability problems removing barriers interoperability existing works interoperability carried define interoperability framework reference models particular lisi reference model european interoperability framework eif ideas interoperability framework athena interoperability framework e-health interoperability framework existing approaches constitute basis enterprise interoperability framework necessity elaborate enterprise interoperability framework discussed existing interoperability frameworks explicitly address barriers interoperability basic assumption research aimed structuring interoperability knowledge respect ability remove various barriers enterprise interoperability framework three basic dimensions framework three basic dimensions shown enterprise interoperability framework allows enterprise interoperability framework aims structuring concepts defining research domain capturing knowledge also helping industries solve interoperability problems carrying interoperability project involving two particular enterprises interoperability concerns interoperability barriers two enterprises identified first mapped enterprise interoperability framework using framework existing interoperability degree characterised targeted interoperability degree defined objective meet knowledge/solutions associated barriers concerns searched framework solutions found proposed users possible adaptation and/or combination solutions remove identified barriers required interoperability established | [
7897,
7636,
2948,
11367
] | Test |
5,006 | 2 | Linux_Technology_Center:linux technology center ibm linux technology center ltc organization focused development linux kernel related open-source software projects 1999 ibm created ltc combine software developers interested linux open-source software single organization much ltc early effort focused making server platforms linux friendly ltc collaborated linux community make linux run optimally processor architectures x86 mainframe powerpc power isa recent years focus ltc expanded include several open source initiatives developers ltc contribute various open-source projects ltc worldwide team main locations australia brazil china germany india israel united states | [
10757,
6157,
4630,
4255,
9633,
3493,
6311,
10413,
5172,
9397,
823,
10040,
3771,
6850,
5450,
8792,
859,
10985,
9455,
499,
8439,
3960,
3323,
8700,
3966
] | Test |
5,007 | 4 | Medical_data_breach:medical data breach medical data breach data breach health information could include either personal health information individual electronic health record medical billing information health insurance united states rate breaches increased time 176 million records breached end 2017 february 2015 npr report claimed organized crime networks ways selling health data black market 2015 beazley group staffperson estimated medical records could sell black market -50 crime primary cause medical data breaches theft data loss hacking unauthorized account access ways medical data breaches happen among reported breaches medical information united states networked information systems accounted largest number records breached united states health insurance portability accountability act health information technology economic clinical health act require companies report data breaches affected individuals federal government | [
11347,
1251,
2558,
8471
] | None |
5,008 | 2 | Boehm_garbage_collector:boehm garbage collector computer science boehm–demers–weiser garbage collector often simply known boehm gc conservative garbage collector c c++ boehm gc free software distributed permissive free software licence similar x11 license developer describes operation collector follows boehm gc also run leak detection mode memory management still done manually boehm gc check done properly way programmer find memory leaks double deallocations boehm gc also distributed c string handling library called cords similar ropes c++ strings trees small arrays never change instead using reference counting proper deallocation relies garbage collection free objects cords good handling large texts modifications middle slicing concatenating keeping history changes undo/redo functionality garbage collector works unmodified c programs simply replacing malloc gc_malloc calls replacing realloc gc_realloc calls removing free calls code piece shows one use boehm instead traditional malloc free c. boehm gc used many projects implemented c c++ like inkscape well runtime environments number languages including crystal gnu compiler java runtime environment portable.net project embeddable common lisp gnu guile mono implementation microsoft .net platform also using precise compacting gc since version 2.8 libgc-d binding libgc programming language used primarily mci supports numerous operating systems including many unix variants macos microsoft windows provides number advanced features including incremental collection parallel collection variety finalizer semantics | [
2304,
4865,
4747,
6797,
9490,
11539,
10012,
541,
3871,
1954,
814,
7983,
3512,
8000,
2625,
1474,
1736,
4424,
6730,
6221,
5840,
5074,
6868,
11221,
86,
5080,
1247,
8545,
8573,
2152,
7403,
5492,
3705,
634,
2045,
7039
] | Test |
5,009 | 3 | Yamaha_CX5M:yamaha cx5m yamaha cx5m msx-system compatible computer expands upon normal features expected systems built-in eight-voice fm synthesizer module introduced 1984 yamaha corporation fm synth stereo audio outputs input purpose-built four-octave keyboard pair midi input/output ports could used normal midi second revision cx5m management data yamaha dx7 first model cx5m built msx standard included slots inserting programmed cartridges extended machine capability accepting range games office applications yamaha produced range cartridges including programmer yamaha dx range fm keyboards real-time sequencer two voice editor music composer allowed user program bank 48 sounds cx5 built synthesizer sequence eight channels music controlling built-in module external instruments via midi step-time using musical-stave input screen three versions cx5m released first contained fm module sfg-01 could receive external midi note information required proprietary keyboard used midi port output send data yamaha then-flagship dx7 second version cx5m ii cx7m/128 japan ref name= cx7/128 /ref upgraded fm system sfg-05 supported midi input thus allowed internal fm synth played external midi keyboard also later cx5m ii smaller differences later 1986 yamaha released yamaha fb-01 midi module effectively sfg-05 standalone portable case | [
9006,
5265,
8945,
8561
] | Validation |
5,010 | 4 | Global_Information_Assurance_Certification:global information assurance certification global information assurance certification giac information security certification entity specialises technical practical certification well new research form giac gold program sans institute founded certification entity 1999 term giac trademarked escal institute advanced technologies giac provides set vendor-neutral computer security certifications linked training courses provided sans giac specific leading edge technological advancement security order keep ahead black hat techniques papers written individuals pursuing giac certifications presented sans reading room giac website initially sans giac certifications required written paper practical specific area certification order achieve certification april 2005 sans organization changed format certification breaking two separate levels silver level certification achieved upon completion multiple choice exam gold level certification obtained completing research paper silver level prerequisite january 21 2017 giac granted 89,827 certifications worldwide | [
2437,
9607,
8462,
5010,
7968,
5284,
8613,
11182,
6834,
4789,
8635,
316,
2494,
830,
10307,
10437,
6475,
4049,
10196,
1493,
6105,
10717,
4834,
5475,
357,
7525,
9319,
3447,
2558
] | Test |
5,011 | 3 | After_Burner:burner game allows player control f-14 tomcat jet airplane player mission destroy enemy jets 18 stages start game player takes aircraft carrier called sega enterprise shares similar name one used 1986 film top gun also reference company name time sega enterprises ltd. arcade version jet employs machine gun limited number heat-seeking missiles master system version player unlimited missiles weapons replenished another aircraft beating stages aircraft cannon missile buttons controlled integrated flight stick game released two variations us standard upright cabinet rotating cockpit version cockpit version seat rotated horizontally cockpit rotated vertically featured two speakers head-level stereo sound seatbelt hold player cockpit rotated cabinets contained grey monitor frame flashing lights top indicated enemy lock player craft japan also got commander cabinet moves left right game ported amiga dos based pcs amstrad cpc atari st sharp x68000 fm towns commodore 64 master system pc engine sega saturn pc msx zx spectrum c64 two versions european version u.s. gold u.s. version activision weebee games port burner 32x done rutubo games known burner complete japan europe unlicensed nes port game developed tengen also exists reworked sunsoft japanese-exclusive port console port burner game boy advance included arcade 4 pack named sega arcade gallery computer gaming world reviewed burner master system citing aircraft depicted remarkable detail spectacular scenery excellent explosions later review pc much critical giving game one star five stating inferior arcade version zx spectrum 1988 conversion burner activision well-received sinclair user describing top-class coin-op conversion destined top charts giving 90 whilst crash magazine gave 86 overall reviewing 32x version gamepro commented graphics sound gameplay great difference genesis version burner ii minor graphical audio enhancements making worthwhile gamers never played burner game burner followed burner ii released year consider game revision predecessor rather entirely new game practice later repeated sega galaxy force galaxy force 2 although burner brand long dormant sega created number aerial combat games centered f-14 tomcat many similar features frequently regarded part series include sequel strike fighter later rebranded burner iii home release later games associated series include sky target retained similar gameplay presentation original addition 3d graphics sega strike fighter arcade flight combat game featured free-roaming movement boasting similar music f/a-18 hornet main plane 2006 sega released new sequel sega lindbergh hardware burner climax first arcade game bear brand since burner ii burner climax later ported xbox live arcade psn followed spinoff psp 2007 burner climax de-listed december 2014 leaving game longer available purchase march 2019 burner climax brought back digital platforms free ads sega ’ “ sega forever ” brand name emulated version burner playable in-game arcade shenmue 2 burner stage hazard final stage madworld shown replica jet spewing flames immediately incinerate enemy thrown plane burner makes cameo fighters megamix accessed cheat code music burner appears remix chapter 8 entitled route 666 bayonetta 2009 developed platinumgames published sega remix reused super smash bros. wii u super smash bros ultimate bayonetta stage umbra clock tower level based burner appears 2012 racing game sonic all-stars racing transformed f-14 tomcat also appears air vehicle unlockable character ages song burner ii appears 2010 rhythm game playable level sung character meiko arcade game appears 1990 hbo film dawn early light flight ready room b-52 bomber pilots lead character seen playing game tomcat crashing arcade version appears 1991 movie suburban commando starring hulk hogan shep ramsey plays game arcade scene however child playing acted space shooter game instead deluxe cabinet appears played john connor t-1000 searches galleria | [
3307,
8300,
4716,
9006,
9166,
629,
11448,
986,
11452,
11231
] | Test |
5,012 | 8 | URL_redirection:url redirection url redirection also called url forwarding world wide web technique making web page available one url address web browser attempts open url redirected page different url opened similarly domain redirection domain forwarding pages url domain redirected different domain wikipedia.com wikipedia.net automatically redirected wikipedia.org url redirection done various reasons several reasons use url redirection user might mistype url example example.com exmaple.com organizations often register misspelled domains redirect correct location example.com addresses example.com example.net could redirect single domain web page example.org technique often used reserve top-level domains tld name make easier true .edu .net redirect recognizable .com domain web pages may redirected new domain three reasons url redirects incoming links outdated url sent correct location links might sites realized change bookmarks/favorites users saved browsers applies search engines often older/outdated domain names links database send search users old urls using moved permanently redirect new url visitors still end correct page also next search engine pass search engine detect use newer url access logs web servers keep detailed information visitors came browsed hosted site however log links visitors left visitor browser need communicate original server visitor clicks outgoing link information captured several ways one way involves url redirection instead sending visitor straight site links site direct url original website domain automatically redirects real target technique bears downside delay caused additional request original website server added request leave trace server log revealing exactly link followed also privacy issue technique also used corporate websites implement statement subsequent content another site therefore necessarily affiliated corporation scenarios displaying warning causes additional delay web applications often include lengthy descriptive attributes urls represent data hierarchies command structures transaction paths session information practice results url aesthetically unpleasant difficult remember may fit within size limitations microblogging sites url shortening services provide solution problem redirecting user longer url shorter one sometimes url page changes even though content stays therefore url redirection help users bookmarks routinely done wikipedia whenever page renamed post/redirect/get prg web development design pattern prevents duplicate form submissions user clicks refresh button submitting form creating intuitive interface user agents users redirects effectively used targeting purposes like geotargeting device targeting become increasingly important rise mobile clients two approaches serve mobile users make website responsive redirect mobile website version mobile website version offered users mobile clients automatically forwarded corresponding mobile content device targeting client-side redirects non-cacheable server-side redirects used geotargeting approach offer localized content automatically forward user localized version requested url helpful websites target audience one location and/or language usually server-side redirects used geotargeting client-side redirects might option well depending requirements redirects used manipulate search engines unethical intentions e.g. url hijacking goal misleading redirects drive search traffic landing pages enough ranking power remotely related search target approach requires rank range search terms number urls would utilize sneaky redirects forward searcher target page method revival uprise mobile devices device targeting url hijacking off-domain redirect technique exploited nature search engine handling temporary redirects temporary redirect encountered search engines decide whether assign ranking value url initializes redirect redirect target url url initiates redirect may kept show search results redirect indicates temporary nature certain circumstances possible exploit behaviour applying temporary redirects well-ranking urls leading replacement original url search results url initialized redirect therefore stealing ranking method usually combined sneaky redirects re-target user stream search results target page search engines developed efficient technologies detect kinds manipulative approaches major search engines usually apply harsh ranking penalties sites get caught applying techniques like url redirection sometimes used part phishing attacks confuse visitors web site visiting modern browsers always show real url address bar threat lessened however redirects also take sites otherwise attempt attack ways example redirect might take user site would attempt trick downloading antivirus software installing trojan sort instead link clicked browser sends along http request field called referer indicates source link field populated url current web page end logs server serving external link since sensitive pages may sensitive urls example codice_2 desirable codice_1 url leave organization redirection page performs referrer hiding could embedded external urls transforming example codice_4 codice_5 technique also eliminates potentially sensitive information referer url session id reduce chance phishing indicating end user passed clear gateway another site several different kinds response browser result redirection vary whether affect http headers html content techniques used typically depend role person implementing access different parts system example web author control headers might use refresh meta tag whereas web server administrator redirecting pages site likely use server configuration simplest technique ask visitor follow link new page usually using html anchor like method often used fall-back — browser support automatic redirect visitor still reach target document following link http protocol used world wide web redirect response status code beginning 3 causes browser display different page client encounters redirect needs make number decisions handle redirect different status codes used clients understand purpose redirect handle caching request method use subsequent request http/1.1 defines several status codes redirection rfc 7231 status codes require url redirect target given location header http response 300 multiple choices usually list choices body message show default choice location header status codes 304 modified 305 use proxy redirects http response 301 moved permanently redirect looks like http/1.1 301 moved permanently location http //www.example.org/ content-type text/html content-length 174 html head title moved /title /head body h1 moved /h1 p page moved href= http //www.example.org/ http //www.example.org/ /a /p /body /html web authors producing html content ca n't usually create redirects using http headers generated automatically web server program serving html file usually true even programmers writing cgi scripts though servers allow scripts add custom headers e.g enabling non-parsed-headers many web servers generate 3xx status code script outputs location header line example php one use header function headers may required prevent caching programmer must ensure headers output body may fit easily natural flow control code help frameworks server-side content generation buffer body data asp scripting language also accomplished using codice_6 codice_7 http/1.1 allows either relative uri reference absolute uri reference uri reference relative client computes required absolute uri reference according rules defined rfc 3986 apache http server mod_alias extension used redirect certain requests typical configuration directives look like flexible url rewriting redirection apache mod_rewrite used e.g. redirect requests canonical domain name configuration applied one sites server server configuration files single content directory codice_8 file nginx integrated http rewrite module used perform advanced url processing even web-page generation return directive showing example advanced use rewrite module mdoc.su implements deterministic url shortening service entirely help nginx configuration language alone example request /dragonflybsd/hammer.5 come along would first redirected internally /d/hammer.5 first rewrite directive affecting internal state without http replies issued client yet second rewrite directive http response 302 found status code would issued client actually redirect external cgi script web-man netscape introduced meta refresh feature refreshes page certain amount time specify new url replace one page another supported web browsers timeout zero seconds effects immediate redirect treated like 301 permanent redirect google allowing transfer pagerank target page example simple html document uses technique technique used web authors meta tag contained inside document meta tag must placed head section html file number 0 example may replaced another number achieve delay many seconds anchor body section users whose browsers support feature effect achieved http codice_9 header response easier generate cgi programs one need change default status code simple cgi program effects redirect note usually http server adds status line content-length header automatically w3c discourage use meta refresh since communicate information either original new resource browser search engine w3c web content accessibility guidelines 7.4 discourage creation auto-refreshing pages since web browsers allow user disable control refresh rate articles written issue include w3c web content accessibility guidelines 1.0 ensure user control time-sensitive content changes use standard redirects n't break back button core techniques web content accessibility guidelines 1.0 section 7 javascript cause redirect setting codice_10 attribute e.g window.location='http //www.example.com/' normally javascript pushes redirector site url browser history cause redirect loops users hit back button following command prevent type behaviour window.location.replace 'http //www.example.com/ however http headers refresh meta tag may preferred security reasons javascript executed browsers many web crawlers slightly different effect achieved creating inline frame one main difference redirect methods frame redirect browser displays url frame document url target page url bar cloaking technique may used reader sees memorable url fraudulently conceal phishing site part website spoofing html5 effect could done html frame contains target page one redirect may lead another example url http //wikipedia.com *.com domain first redirected https //www.wikipedia.org/ domain name .org navigate language-specific site unavoidable different links chain served different servers though minimised rewriting url much possible server returning browser redirect wikipedia redirecting pages https default since 2015 sometimes mistake cause page end redirecting back possibly via pages leading infinite sequence redirects browsers stop redirecting certain number hops display error message http/1.1 standard states client detect intervene cyclical redirections i.e. infinite redirection loops note earlier version specification recommended maximum five redirections rfc 2068 section 10.3 content developers need aware clients might implement fixed limitation note urls sequence might repeat e.g http //www.example.com/1 http //www.example.com/2 http //www.example.com/3 ... exist services perform url redirection demand need technical work access web server site hosted redirect service information management system provides internet link redirects users desired content typical benefit user use memorable domain name reduction length url web address redirecting link also used permanent address content frequently changes hosts similarly domain name system hyperlinks involving url redirection services frequently used spam messages directed blogs wikis thus one way reduce spam reject edits comments containing hyperlinks known url redirection services however also remove legitimate edits comments may effective method reduce spam recently url redirection services taken using ajax efficient user friendly method creating shortened urls major drawback url redirection services use delay pages frame based advertising generate revenue first redirect services took advantage top-level domains tld .to tonga .at austria .is iceland goal make memorable urls first mainstream redirect service v3.com boasted 4 million users peak 2000 v3.com success attributed wide variety short memorable domains including r.im go.to i.am come.to start.at v3.com acquired fortunecity.com large free web hosting company early 1999 sales price top level domains started falling 70.00 per year less 10.00 use redirection services declined launch tinyurl 2002 new kind redirecting service born namely url shortening goal make long urls short able post internet forums since 2006 140 character limit extremely popular twitter service short url services heavily used redirection services hide referrer placing intermediate page page link destination although conceptually similar url redirection services serve different purpose rarely attempt shorten obfuscate destination url intended side-effect hide referrer information provide clear gateway websites type redirection often used prevent potentially-malicious links gaining information using referrer example session id query string many large community websites use link redirection external links lessen chance exploit could used steal account information well make clear user leaving service lessen chance effective phishing simplistic example service written php example check called e.g referrer although could spoofed also check url provided means malicious person could link redirection page using url parameter his/her selection page uses web server resources url redirection abused attackers phishing attacks open redirect covert redirect open redirect application takes parameter redirects user parameter value without validation covert redirect application takes parameter redirects user parameter value without sufficient validation disclosed may 2014 mathematical doctoral student wang jing nanyang technological university singapore | [
2945,
1667,
7044,
10756,
3462,
7304,
5641,
8202,
9737,
7949,
10103,
914,
11154,
10390,
10263,
7962,
8093,
8224,
10275,
3237,
8747,
2227,
2485,
1723,
10815,
8644,
2887,
3145,
7370,
1495,
3032,
5724,
9053,
2016,
865,
6498,
6762,
1643,
1899,
... | None |
5,013 | 6 | Bcachefs:bcachefs bcachefs copy-on-write cow file system linux-based operating systems primary developer kent overstreet first announced 2015 efforts ongoing included mainline linux kernel intended compete modern features zfs btrfs speed performance ext4 xfs bcachefs copy-on-write cow file system linux-based operating systems planned existing features bcachefs include caching full file-system encryption using chacha20 poly1305 algorithms native compression via zlib lz4 zstandard snapshots crc-32c 64-bit checksumming use multiple block devices including raid configurations bcachefs provides functionality bcache block-layer cache system linux bcachefs shares 80 code primary development kent overstreet developer bcache describes prototype ideas became bcachefs overstreet intends bcachefs replace bcache overstreet stated development bcachefs began bcache developers realized codebase evolving ... full blown general-purpose posix filesystem really clean elegant design within took direction time bcache merged 2013 mainline linux kernel overstreet left job google work full-time bcachefs years unfunded development overstreet announced bcachefs 2015 point called code less feature complete called testers contributors intended advanced file system modern features like zfs btrfs speed performance file systems ext4 xfs 2017 overstreet receiving financial support development bcachefs via patreon mid-2018 on-disk format settled patches submitted review bcachefs included mainline linux kernel yet accepted | [
5120,
2051,
6669,
3598,
10257,
6677,
5142,
8214,
9762,
5158,
3629,
11323,
8772,
4708,
9836,
7789,
9333,
6263,
9335,
9343,
7818,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
5286,
10405,
5293,
7344,
2230,
5816,
1212,
8380,
10951,
9420,
... | Test |
5,014 | 3 | Sakhr_Computers:sakhr computers sakhr computers developed kuwaiti company al alamiah produced arabic-language version msx computers 1980s products included msx2 msx2+ yamaha ax100 models latter known sakhr msx ax170 company also first convert basic computer language arabic | [
9006
] | Test |
5,015 | 7 | ASCI_White:asci white asci white supercomputer lawrence livermore national laboratory california briefly fastest supercomputer world computer cluster based ibm commercial rs/6000 sp computer 512 nodes interconnected asci white node containing sixteen 375mhz ibm power3-ii processors total asci white 8,192 processors 6terabytes tb memory 160tb disk storage almost exclusively used large-scale computations requiring dozens hundreds thousands processors computer weighed 106tons consumed 3mw electricity 3mw needed cooling theoretical processing speed 12.3teraflops tflops system ran ibm aix operating system asci white made three individual systems 512-node white 28-node ice 68-node frost system built poughkeepsie new york completed june 2000 transported specially built facilities california officially dedicated august 15 2001 peak performance 12.3tflops achieved widely accepted linpack tests system cost us 110 million built stage three accelerated strategic computing initiative asci started u.s. department energy national nuclear security administration build simulator replace live wmd testing following moratorium testing started president george h. w. bush 1992 extended bill clinton 1993 machine decommissioned beginning july 27 2006 | [
1480,
3978,
1933,
2135,
3323,
1725
] | Validation |
5,016 | 4 | GPGMail:gpgmail gpgmail extension apple mail provides public key email encryption signing gpgmail works macos actual cryptographic functionality handled gnu privacy guard gpgmail first released february 7 2001 stéphane corthésy since 2010 maintained gpgtools gnu privacy guard free open-source software use gpgmail requires purchase support plan september 21 2018 developer introduced gpgmail 3.0 part gpg suite 2018.4 new software release included support macos mojave release developer removed free license option gpgmail lot users relied automated upgrades caught surprise prompted significant backlash community licensing change identified release notes gpg suite 2018.4 many believed big change required prominent notification avoid perception bait switch | [
2050,
9451,
11046,
7983
] | None |
5,017 | 7 | ServiceMax:servicemax servicemax global market-leader service execution management software category includes field service management asset service management servicemax provides cloud-based software platform improves productivity complex equipment-centric service execution oems operators 3rd-party service providers servicemax platform saas software service software running salesforce force.com cloud technology servicemax cloud-based mobile-ready field service software solution supports companies across industries manage work orders plan schedule work assignments provide mobile technician enablement contracts entitlements proactive maintenance parts inventory management servicemax platform designed optimize service execution processes used service technicians dispatchers service planners managers customers include medical device manufacturing industrial manufacturing food beverage equipment buildings construction technology oil gas power utilities industries servicemax software primarily used enterprise size customers october 2018 servicemax introduced asset service management solution equipment operators augmenting existing field service management software typically used original equipment manufacturers service organizations commercial service operations february 2019 servicemax acquired zinc adding secure real-time communications solution portfolio zinc mode communications offering provides 1:1 group messaging voice video content sharing top-down broadcasts hotlines communications analytics recent areas innovation include capabilities complex jobs functionality crew management shift planning maxplore technologies founded athani krishnaprasad hari subramanian consulting company focusing customer relationship management client requested maxplore build field service module salesforce platform project took 2 weeks 2007 entered “ appexchange challenge ” dreamforce conference project 2 million funding emergence capital went win force million dollar challenge 2008 company changed name servicemax february 2019 servicemax acquired zinc company providing frictionless way service workers get share knowledge real-time 2016 servicemax received 204 million funding company completed 82 million series f round august 2015 led premjiinvest ge march 2014 company received 71 million series e funding led meritech capital partners november 2012 servicemax received 27 million series funding round june 2011 company received 14 million series c funding led mayfield fund april 2010 servicemax received 8 million series b funding led trinity ventures november 14 2016 general electric co. ge digital unit announced deal buy servicemax 915 million acquisition completed january 10 2017 december 13 2018 ge digital silverlake announced agreement ge digital sell majority stake servicemax ge retained 10 equity ownership company | [
10090,
467
] | Test |
5,018 | 4 | Reboot_to_restore_software:reboot restore software ‘ reboot restore ’ system restore technology enables restoring user-defined system configuration computing device every restart technology helps maintain systems optimum working conditions useful especially multi-user computing environments deploying solutions based reboot restore technology enables users define particular system configuration desired state baseline point would restored reboot baseline set reboot restore software continues restore particular configuration every time device restarted switched shutdown reboot restore software helps maintaining optimal system configuration quite effective multi-user computing environment technology prevents types alterations baseline configuration whether user inflicted automatic alterations end-users primarily changes system settings installing uninstalling software applications enabling disabling specific functionalities automatic alterations include cookies add-ons browser extensions several types temporary files often get downloaded background online session also rolls back malicious alterations made malware elusively penetrate system attempts corrupt reboot restore software solutions built simplify process maintaining optimal system configuration devices multi-user computing environment public libraries computer labs educational institutes k-12 colleges universities training centers public access kiosks due constant use multiple people wide range purposes devices become susceptible performance deterioration malware infiltration events system malfunction failure takes considerably longer time troubleshoot issue using conventional practices like resetting reimaging may lead prolonged downtime causing poor user experience potential loss business opportunity higher maintenance costs restore reboot functionality ensures best system configuration pristine state maintained every public-access computer without long-drawn troubleshooting steps instant restoration technology empowers end-users resolve system issues simply restarting device significantly reduces intervention end-users experience optimum system performance pristine configuration restored every reboot technology helps deliver maximum system uptime improves operational efficiency resource utilization system administrators corporates deploy reboot restore solutions create prestige environments without need constant troubleshooting use software protect system drive allocate separate data partition user application data stored redirected initially named shared computer toolkit windows steadystate freeware reboot restore solution offered microsoft compatible windows xp windows vista operating systems windows steadystate discontinued december 2010 software primarily used educational institutes public libraries steadystate features windows disk protection wdp functionality enabled redirects user-generated changes cache software three modes discard persist commit discard mode clears cache reboot restores original configuration persist mode retains cache specific time admins could opt discard commit changes commit mode changes permanently written hard disk usual deep freeze faronics one first rollback software solutions leverage reboot restore technology releasing first windows solution 1999 followed mac os solution 2005 deep freeze uses patented technology redirects information written hard drive partition allocation table leaving original data intact redirected information allocation table longer referenced computer restarted therefore restoring computer back original state disk sector level last byte extending functionalities reboot restore technology software provision thawspaces thawed partitions permanently saving user-generated data without altering baseline configuration thawspace virtual space system administrators create within deep freeze ecosystem hard disk partition content stored thawspace retained across reboots thawed partitions parts hard disk exempted effects reboot restore technology microsoft apple inc. offer restoration tools though based reboot restore technology embedded respective operating systems system restore inbuilt feature windows available latest versions os reverts system files settings previous point time without affecting personal files enabled software automatically creates restore points regular intervals every major instance configuration alteration like driver update new application installation device malfunctions running system restore rolls back configuration restore point particular issue exist reset option introduced windows 8 used restoring systems factory defaults re-installs windows os permanently discards files system settings pre-installed applications time machine macos functions backup utility restoration program creates incremental snapshots system configuration periodically requires external storage device backing macos backup later used restore previous configuration required software also used restore specific items like deleted emails older versions files rather entire configuration also introduced windows 8 refresh re-installs windows os retains user files pre-installed applications installed users running reset option advised refresh fails resolve issue | [
7380,
925
] | Test |
5,019 | 2 | Nokia_N810:nokia n810 nokia n810 internet tablet internet appliance nokia announced 17 october 2007 web 2.0 summit san francisco despite nokia strong association cellular products n810 like preceding tablets produced nokia phone instead allowed user browse internet communicate using wi-fi networks mobile phone via bluetooth built hardware software nokia n800 features added removed nokia n810 featured maemo linux distribution operating system based maemo 4.0 featured microb mozilla-based mobile browser gps navigation application new media player refreshed interface nokia n810 much common n800 internet tablet os 2008 operated significant differences two new features nokia n810 1 april 2008 nokia announced wimax equipped version n810 called n810 wimax edition device identical specifications original n810 included wimax radio use initially sprint xohm network featured color change light gray dark blue black well larger case-back bulge accommodate antenna efficient required bands production wimax edition nokia n810 ended january 2009 n810 like nokia internet tablets ran maemo similar many handheld operating systems provided home screen — central point applications settings accessed home screen divided areas launching applications menu bar large customisable area could display information rss reader internet radio player google search box example maemo modified version debian gnu/linux n810 bundled several applications including mozilla-based microb browser adobe flash gizmo skype mobile firefox fennec also made available n810 promised make users forget clunky stripped-down mobile web 're used installation added mozilla repository application manager allowing automatic notification updates | [
1537,
3585,
529,
10770,
5143,
2072,
5659,
6178,
4132,
40,
3626,
9266,
10802,
7220,
5175,
10820,
6216,
11337,
9292,
7246,
1615,
5201,
7253,
5211,
6748,
1633,
109,
2179,
3205,
9359,
1682,
10393,
5274,
669,
6310,
167,
5290,
10410,
7866,
1728... | Validation |
5,020 | 5 | Frequency-hopping_spread_spectrum:frequency-hopping spread spectrum frequency-hopping spread spectrum fhss method transmitting radio signals rapidly switching carrier among many frequency channels using pseudorandom sequence known transmitter receiver used multiple access method code division multiple access cdma scheme frequency-hopping code division multiple access fh-cdma available frequency band divided sub-frequencies signals rapidly change hop among predetermined order interference specific frequency affect signal short interval fhss however cause interference adjacent direct-sequence spread spectrum dsss systems adaptive frequency-hopping spread spectrum afh specific type fhss used bluetooth wireless data transfer spread-spectrum transmission offers three main advantages fixed-frequency transmission spread-spectrum signals highly resistant deliberate jamming unless adversary knowledge spreading characteristics military radios use cryptographic techniques generate channel sequence control secret transmission security key transec sender receiver share advance frequency hopping provides limited protection eavesdropping jamming modern military frequency hopping radios also employ separate encryption devices ky-57 speech security equipment u.s. military radios use frequency hopping include jtids/mids family quick aeronautical mobile communications system sincgars combat net radio link-16 us since federal communications commission fcc amended rules allow frequency hopping spread spectrum systems unregulated 2.4 ghz band many consumer devices band employed various spread-spectrum modes walkie-talkies employ frequency-hopping spread spectrum technology developed unlicensed use 900 mhz band several radios marketed name extreme radio service exrs despite name similarity frs allocation system proprietary design rather official fcc allocated service frequency-hopping spread spectrum technology also used many hobby rc radio controlled transmitters receivers used model cars airplanes drones type multiple access achieved allowing hundreds transmitter/receiver pairs operated simultaneously band contrast previous fm rc systems limited simultaneous channels motorola deployed business-banded license-free digital radio uses fhss technology dtr series models 410 550 650 overall bandwidth required frequency hopping much wider required transmit information using one carrier frequency however transmission occurs small portion bandwidth given time effective interference bandwidth really providing extra protection wideband thermal noise frequency-hopping approach reduce degradation caused narrowband interference sources one challenges frequency-hopping systems synchronize transmitter receiver one approach guarantee transmitter use channels fixed period time receiver find transmitter picking random channel listening valid data channel transmitter data identified special sequence data unlikely occur segment data channel segment also checksum integrity checking identification transmitter receiver use fixed tables channel sequences synchronized maintain communication following table channel segment transmitter send current location table us fcc part 15 unlicensed spread spectrum systems 902–928 mhz 2.4 ghz bands permits power allowed non-spread-spectrum systems frequency hopping direct sequence systems transmit 1 watt thousand-fold increase 1 milliwatt limit non-spread-spectrum systems federal communications commission fcc also prescribes minimum number channels maximum dwell time channel real multipoint spread spectrum radio system space allows possibility multiple transmissions frequency using multiple radios geographic area creates possibility system data rates higher shannon limit single channel spread spectrum systems violate shannon limit spread spectrum systems rely excess signal noise ratios sharing spectrum property also seen mimo dsss systems beam steering directional antennas also facilitate increased system performance providing isolation remote radios 1899 guglielmo marconi experimented frequency-selective reception attempt minimise interference earliest mentions frequency hopping open literature us patent 725,605 awarded nikola tesla march 17 1903 radio pioneer jonathan zenneck book wireless telegraphy german 1908 english translation mcgraw hill 1915 although zenneck states telefunken already tried nikola tesla ’ mention phrase “ frequency hopping ” directly certainly alludes entitled method signaling patent describes system would enable radio communication without danger signals messages disturbed intercepted interfered way german military made limited use frequency hopping communication fixed command points world war prevent eavesdropping british forces technology follow sequence polish engineer inventor leonard danilewicz came idea 1929 several patents taken 1930s including one willem broertjes issued aug. 2 1932 world war ii us army signal corps inventing communication system called sigsaly incorporated spread spectrum single frequency context however sigsaly top-secret communications system existence become known 1980s 1942 actress hedy lamarr composer george antheil received secret communications system intended early version frequency hopping supposed use piano-roll change among 88 frequencies intended make radio-guided torpedoes harder enemies detect jam record working device ever produced patent rediscovered 1950s patent searches private companies independently developed code division multiple access non-frequency-hopping form spread-spectrum cited numerous times since practical application frequency hopping developed ray zinn co-founder micrel corporation zinn developed method allowing radio devices operate without need synchronize receiver transmitter using frequency hopping sweep modes zinn method primarily applied low data rate wireless applications utility metering machine equipment monitoring metering remote control 2006 zinn received wireless device method using frequency hopping sweep modes adaptive frequency-hopping spread spectrum afh used bluetooth improves resistance radio frequency interference avoiding crowded frequencies hopping sequence sort adaptive transmission easier implement fhss dsss key idea behind afh use “ good ” frequencies avoiding bad frequency channels—perhaps bad frequency channels experiencing frequency selective fading perhaps third party trying communicate bands perhaps bands actively jammed therefore afh complemented mechanism detecting good/bad channels however radio frequency interference dynamic strategy “ bad channel removal ” applied afh might work well example several colocated frequency-hopping networks bluetooth piconet mutually interfering strategy afh fails avoid interference problem dynamic interference gradual reduction available hopping channels backward compatibility legacy bluetooth devices resolved version 1.2 bluetooth standard 2003 strategies dynamic adaptation frequency hopping pattern reported literature situation often happen scenarios use unlicensed spectrum addition dynamic radio frequency interference expected occur scenarios related cognitive radio networks devices exhibit frequency-agile operation chirp modulation seen form frequency-hopping simply scans available frequencies consecutive order communicate concept also use combination frequency hopping spread spectrum ofdm non-orthogonal frequency-division multiplexing n-ofdm signals increase data performance | [
10112,
2306,
388,
8708,
3847,
9863,
2057,
10381,
1550,
2968,
11288,
2458,
5664,
11686,
1192,
7723,
11181,
1070,
1969,
2994,
5304,
7490,
3140,
7108,
9284,
11591,
5321,
7498,
2911,
3040,
1121,
2785,
3168,
5092,
8160,
5863,
2920,
7400,
2802
] | None |
5,021 | 5 | LAPB:lapb link access procedure balanced lapb implements data link layer defined x.25 protocol suite lapb bit-oriented protocol derived hdlc ensures frames error free correct sequence lapb specified itu-t recommendation x.25 iso/iec 7776 implements connection-mode data link service osi reference model defined itu-t recommendation x.222 lapb used manage communication packet framing data terminal equipment dte data circuit-terminating equipment dce devices x.25 protocol stack lapb essentially hdlc asynchronous balanced mode abm lapb sessions established either dte dce station initiating call determined primary responding station secondary lapb mainly used transfer data upper layer frame flag – value flag always 0x7e order ensure bit pattern frame delimiter flag appear data field frame therefore cause frame misalignment technique known bit stuffing used transmitter receiver address field – lapb field meaning since protocol works point point mode dte network address represented layer 3 packets byte therefore put different use separates link commands responses two values 0x01 0x03 01 identifies frames containing commands dte dce responses commands dce dte 03 used frames containing commands dce dte responses dte dce therefore one side must configured layer 2 dte layer 2 dce must confuse familiar layer 1 dce dte designations control field – serves identify type frame addition includes sequence numbers control features error tracking according frame type modes operation – lapb works asynchronous balanced mode abm mode balanced i.e. master/slave relationship signified sabm e /sm frame station may initialize supervise recover errors send frames time dte dce treated equals fcs – frame check sequence enables high level physical error control allowing integrity transmitted frame data checked window size – lapb supports extended window size modulo 128 modulo 32768 maximum number outstanding frames acknowledgment raised 7 modulo 8 127 modulo 128 32767 modulo 32768 lapb master/slave node relationships sender uses poll bit command frames insist immediate response response frame bit becomes receivers final bit receiver always turns final bit response command sender poll bit set p/f bit generally used either end becomes unsure proper frame sequencing possible missing acknowledgment necessary re-establish point reference also used trigger acknowledgment outstanding i-frames following table shows addresses placed lapb frame issuing commands responses dte dce dce dte using single link operation multilink operation | [
7360,
9860,
1893,
11332,
1127,
3847,
4543,
8138,
6544,
1297,
8432,
5875,
5118,
10647,
7865,
2206,
2431
] | Test |
5,022 | 2 | Xerox_Operating_System:xerox operating system xerox operating system xos operating system xds sigma series computers optimized direct replacement ibm dos/360 installations provide real-time timesharing support system developed beginning 1969 xerox french firm bull xos successful europe us unable compete ibm 1972 35 xos installations europe compared 2 us | [
2179,
10499,
10883,
394,
1147,
1804,
3978,
6797,
273,
7057,
6675,
7187,
11539,
9366,
11667,
6296,
25,
10776,
8092,
4637,
7325,
9887,
10016,
9762,
421,
5158,
10235,
2345,
7983,
3248,
7217,
11184,
6837,
823,
9784,
4409,
10809,
6075,
7483,
6... | Test |
5,023 | 9 | Scilab_Image_Processing:scilab image processing sip toolbox processing images scilab sip meant free complete useful image toolbox scilab goals include tasks filtering blurring edge detection thresholding histogram manipulation segmentation mathematical morphology color image processing though sip still early development currently import output image files many formats including bmp jpeg gif png tiff xpm pcx sip uses imagemagick accomplish sip licensed gpl | [
6797,
8079,
7983,
823,
2045
] | Test |
5,024 | 4 | Hacking_Team:hacking team hackingteam milan-based information technology company sells offensive intrusion surveillance capabilities governments law enforcement agencies corporations remote control systems enable governments corporations monitor communications internet users decipher encrypted files emails record skype voice ip communications remotely activate microphones camera target computers company criticized providing capabilities governments poor human rights records though hackingteam states ability disable software used unethically italian government restricted license business countries outside europe hackingteam employs around 40 people italian office subsidiary branches annapolis washington d.c. singapore products use dozens countries across six continents hackingteam founded 2003 two italian entrepreneurs david vincenzetti valeriano bedeschi 2007 company invested two italian vc fondo next innogest milan police department learned company hoping use tool spy italian citizens listen skype calls police contacted vincenzetti asked help hackingteam became first sellers commercial hacking software police ” according former employee alberto pelliccione company began security services provider offering penetration testing auditing defensive capabilities clients pelliccione states malware offensive capabilities developed accounted larger percentage revenues organization pivoted offensive direction became increasingly compartmentalized pelliccione claims fellow employees working aspects platform – example android exploits payloads – would communicate one another possibly leading tensions strife within organization february 2014 report citizen lab identified organisation using hosting services linode telecom italia rackspace noc4hosts notorious bullet proof hosting company santrex july 5 2015 company suffered major data breach customer data software code internal documents e-mails see § 2015 data breach april 2nd 2019 hackingteam acquired inthecyber create memento labs hackingteam enables clients perform remote monitoring functions citizens via rcs remote control systems including da vinci galileo platforms hackingteam uses advanced techniques avoid draining cell phone batteries could potentially raise suspicions methods avoid detection malware payloads android blackberry apple ios linux mac os x symbian well microsoft windows windows mobile windows phone class operating systems rcs management platform allows operators remotely deploy exploits payloads targeted systems remotely manage devices compromised exfiltrate data remote analysis hackingteam criticized selling products services governments poor human rights records including sudan bahrain venezuela saudi arabia june 2014 united nations panel monitoring implementation sanctions sudan requested information hackingteam alleged sales software country contravention united nations weapons export bans sudan documents leaked 2015 data breach hackingteam revealed organization sold sudanese national intelligence security service access remote control system software 2012 960,000 euros response united nations panel company responded january 2015 currently selling sudan follow-up exchange hackingteam asserted product controlled weapon request beyond scope panel need disclose previous sales considered confidential business information u.n. disagreed view panel software ideally suited support military electronic intelligence elint operations may potentially fall category 'military ... equipment 'assistance related prohibited items secretary wrote march thus potential use targeting belligerents darfur conflict interest panel fall 2014 italian government abruptly froze hackingteam exports citing human rights concerns lobbying italian officials company temporarily back right sell products abroad july 5 2015 twitter account company compromised unknown individual published announcement data breach hackingteam computer systems initial message read since nothing hide 're publishing e-mails files source code ... provided links 400 gigabytes data including alleged internal e-mails invoices source code leaked via bittorrent mega announcement data breach including link bittorrent seed retweeted wikileaks many others social media material voluminous early analysis appeared reveal hackingteam invoiced lebanese army sudan spy tools also sold bahrain kazakhstan hackingteam previously claimed never done business sudan leaked data revealed zero-day cross-platform flash exploit cve number cve-2015-5119 dump included demo exploit opening calculator test webpage adobe patched hole july 8 2015 another vulnerability involving adobe revealed dumps took advantage buffer overflow attack adobe open type manager dll included microsoft windows dll run kernel mode attack could perform privilege escalation bypass sandbox also revealed leaked data hackingteam employees use weak passwords including 'p4ssword 'wolverine 'universo hours without response hackingteam member christian pozzi tweeted company working closely police attackers claiming regarding company true also claimed leaked archive contains virus constituted false info shortly tweets pozzi twitter account apparently compromised responsibility attack claimed hacker known phineas fisher phisher twitter phineas previously attacked spyware firm gamma international produce malware finfisher governments corporations 2016 phineas published details attack spanish english how-to others explained motivations behind attack internal documents revealed details hackingteam contracts repressive governments 2016 italian government revoked company license sell spyware outside europe without special permission hackingteam clientele include governments also corporate clients barclay bank british telecom bt united kingdom well deutsche bank germany full list hackingteam customers leaked 2015 breach disclosed documents show hackingteam 70 current customers mostly military police federal provincial governments total company revenues disclosed exceeded 40 million euros | [
1024,
5636,
10756,
3092,
4117,
8726,
535,
9761,
4644,
4133,
1087,
9791,
1608,
3657,
2634,
8779,
4703,
8288,
8292,
10875,
3711,
8320,
7809,
127,
5764,
2187,
6797,
4240,
1169,
2709,
1688,
2717,
9375,
2208,
2734,
9904,
9395,
6326,
8886,
3789... | Test |
5,025 | 4 | Festi:festi festi rootkit botnet created basis works operating systems windows family autumn 2009 first time festi came view companies engaged development sale antivirus software time estimated botnet consisted roughly 25.000 infected machines spam volume capacity roughly 2.5 billion spam emails day festi showed greatest activity 2011-2012 recent estimates dated august 2012 display botnet sending spam 250,000 unique ip addresses quarter total amount one million detected ip sending spam mails main functionality botnet festi spam sending implementation cyberattacks like distributed denial service distribution carried scheme ppi pay-per-install use preventing detection antiviruses loader extends ciphered complicates signature based detection represented data architecture botnet gathered research eset antivirus company loader downloads sets bot represents kernel-mode driver adds list drivers launching together operating system hard disk drive part bot stored responsible communication command center loading modules starting bot periodically asks command center receiving configuration loading modules jobs necessary execution researches carried specialists antivirus company eset known festi least two modules one intends spam sending botspam.dll another implementation cyberattacks like distributed denial service botdos.dll module implementation cyberattacks like distributed denial service supports following types cyberattacks namely tcp-flood udp-flood dns-flood http -flood also flood packets random number issue used protocol expert kaspersky lab researching botnet drew output modules used list includes module socks-server implementation botsocks.dll tcp udp protocols module remote viewing control computer user botremote.dll module implementing search disk remote computer local area network botsearch.dll remote computer connected grabber-modules browsers known present time botgrabber.dll modules never saved hard disk drive almost impossible detection bot uses client-server model functioning implements protocol network interaction command center used receiving configuration botnet loading modules also obtaining jobs command center notification command center execution data encoded interferes determination contents network traffic case installation bot switches system firewall hides kernel-mode driver keys system registry necessary loading operation protects registry keys deleting operation network occurs low level allows bypass network filters antivirus software easily use network filters observed prevent installation bot checks whether launched virtual machine case positive result check stops activities festi periodically checks existence debugger able remove breakpoints festi created use object-oriented technology software development strongly complicates researches method reverse engineering bot easily ported operating systems control botnet festi implemented means web interface carried via browser according specialists antivirus company eset american journalist blogger brian krebs expert information security field according american journalist new york times newspaper andrew kramer also sources close russian intelligence services architect developer botnet festi — russian hacker igor artimovich conclusion possible tell botnet festi one powerful botnets sending spam carrying attacks like distributed denial service principles festi botnet constructed increase bot lifetime system much possible hinder bot detection antivirus software network filters mechanism modules allows expand functionality botnet side means creation loading necessary modules achievement different purposes object-oriented approach development complicates botnet researching use methods reverse engineering gives chance bot porting operating systems accurate demarcation specific concrete operating system functionality remaining logic bot powerful systems counteraction detection debugging make festi bot almost invisible stealthy system bindings use reserve command centers gives chance restoration control botnet change command center festi atypical example malicious software authors approached process development extremely seriously | [
7809,
131,
2213,
8805,
8998,
2222,
4689,
4883,
9688,
7515,
10173,
9791
] | Test |
5,026 | 5 | Beaker_(web_browser):beaker web browser beaker free open-source web browser currently development blue link labs beaker browser peer-to-peer technology allow users self-publish websites web apps directly browser without need set administrate separate web server host contents third-party server files websites transferred using dat hypermedia peer-to-peer protocol allows files shared hosted several users browser also supports http protocol connect traditional servers beaker built using electron framework therefore uses chromium browser renderer webpages files stored local folder published dat website made accessible users peer-to-peer protocol files seeded local folder browser active make also available browser closed user may use several alternative options host content | [
513,
6657,
9736,
2579,
6171,
9757,
7713,
10791,
9770,
559,
4661,
3639,
10808,
3643,
9275,
64,
5707,
10834,
6231,
8281,
6747,
3676,
1642,
9834,
9841,
115,
9843,
4728,
637,
1664,
2182,
6797,
10910,
8351,
7340,
9394,
9908,
185,
11449,
4797,
... | None |
5,027 | 2 | OPOS:opos opos full name ole retail pos platform specific implementation unifiedpos point sale device standard microsoft windows operating systems initiated microsoft ncr epson fujitsu-icl managed association retail technology standards opos api first published january 1996 standard uses component object model languages support com controls i.e visual c++ visual basic c used write applications opos standard specifies two levels opos control control object presents abstract hardware interface family devices receipt printer service object handles interface control object actual physical device specific model receipt printer division functionality provides way application development write abstract hardware interface allowing application work variety different hardware requirement hardware vendor supplies opos compatible service object particular hardware offering typically manufacturer point sale terminals provide along terminal operating system opos control object package software utility used configure opos settings utility specify settings opos control object indicate service object used particular opos profile point sale application starts loads opos control object opos control object turn loads service object specified current opos profile windows registry typically used persistent store device settings hardware device manufacturer normally provide utility device specific settings used service object opos deployed following operating systems | [
8576,
9137,
10029,
847
] | Test |
5,028 | 3 | Broadcom_Corporation:broadcom corporation broadcom corporation american fabless semiconductor company made products wireless broadband communication industry acquired avago technologies 2016 operates wholly owned subsidiary merged entity broadcom inc. broadcom corporation founded professor-student pair henry samueli henry nicholas ucla 1991 1995 company moved westwood los angeles office irvine california 1998 broadcom became public company nasdaq exchange ticker symbol brcm employs 11,750 people worldwide 15 countries broadcom among gartner top 10 semiconductor vendors revenue broadcom first landed fortune 500 2009 2012 broadcom total revenue 8.01 billion 2013 broadcom stood 327 fortune 500 climbed 17 places 2012 ranking 344 may 28 2015 chip maker avago technologies ltd. agreed buy broadcom corp. 37 billion cash stock closing completed february 1 2016 broadcom shareholders held 32 new singapore-based company called broadcom limited hock tan avago president ceo named ceo new combined company dr. samueli became chief technology officer member combined company board dr. nicholas serves strategic advisory role within new company new merged entity named broadcom limited inherits ticker symbol avgo brcm ticker symbol retired may 2016 cypress semiconductor announced acquire broadcom corporation full portfolio iot products 550 million deal cypress acquires broadcom iot products intellectual property wi-fi bluetooth zigbee connectivity well broadcom wiced platform sdk developers deal combined broadcom developer tools connectivity technologies iot devices cypress programmable system-on-a-chip soc products provide memory computing graphics processing low-power devices april 26 2009 broadcom settled four years legal battles wireless patents qualcomm inc. another fabless semiconductor company headquartered san diego california deal ended patent litigation well complaints anti-competitive behavior trade commissions united states europe south korea part settlement qualcomm paid 891 million cash broadcom four-year period ending june 2013 june 2007 u.s. international trade commission blocked import new cell phone models based particular qualcomm microchips found qualcomm microchips infringe patents owned broadcom january 2017 ftc sued qualcomm allegedly engaging unlawful tactics maintain monopoly cellular-communications chips january 17 2018 reported ftc investigating whether broadcom engaged anti-competitive tactics negotiations customers probe ongoing several months july 14 2006 broadcom announced subtract 750 million earnings due stock options irregularities september 8 2006 amount doubled 1.5 billion company may also owe additional taxes january 24 2007 announced restatement financial results 1998 2005 totaled 2.22 billion may 15 2008 broadcom cto samueli resigned chairman board took leave absence chief technology officer named civil complaint u.s. securities exchange commission sec june 5 2008 broadcom co-founder former ceo henry nicholas former cfo william ruehle indicted charges illegal stock-option backdating nicholas also indicted violations federal narcotics laws however december 2009 federal judge cormac j. carney threw options backdating charges nicholas ruehle finding federal prosecutors improperly tried prevent three defense witnesses testifying broadcom product line spans computer telecommunication networking company products enterprise/metropolitan high-speed networks well products soho small-office home-office networks products include transceiver processor ics ethernet wireless lans cable modems digital subscriber line dsl servers home networking devices router switches port-concentrators cellular phones gsm/gprs/edge/w-cdma/lte also known series high-speed encryption co-processors offloading processor-intensive work dedicated chip thus greatly speeding tasks utilize encryption many practical benefits e-commerce pgp gpg secure communications company also produces ics carrier access equipment audio/video processors digital set-top boxes digital video recorders bluetooth wi-fi transceivers rf receivers/tuners satellite tv major customers include apple hewlett-packard motorola ibm dell asus lenovo linksys logitech nintendo nokia nortel avaya tivo tenda cisco systems september 2011 broadcom shut digital tv operations broadcom also shut blu-ray chip business closure businesses began september 19 2011 june 2 2014 broadcom announced intentions exit cellular baseband business vendors included broadcom nics products example dell poweredge m-series blade-server products may fitted dell-supplied dual port broadcom netxtreme 5709 gigabit ethernet port adapters another large market hardware switches vendors offer switching equipment based broadcom hardware firmware e.g dell powerconnect classics well-known vendors use broadcom hardware write firmware latest broadcom trident+ asic used many high-speed 10gb+ switches largest switch-vendors cisco nexus switches running nx-os dell force10 dell networking running ftos/dnos arista 7050-series switches ibm/bnt 8264 juniper qfx3500 latest 'member trident family trident ii xgs support 32 x 40g ports 104 x 10g ports mix single chip examples switches using trident ii xgs chip dell networking s6000 cisco nexus 9000 smaller vendors like edgecore as6700 penguin arctica 3200xl quantamesh t5032 videocore gpu found systems-on-a-chip soc broadcom widely known one bcm2835 containing videocore iv found raspberry pi broadcom crystal hd video acceleration broadcom bcm43 series chips provide wifi support many android iphone devices models include bcm4339 used phones nexus 5 2013 bcm4361 used samsung galaxy s8 2017 soc devices cortex r4 processing mac mlme layers proprietary broadcom processor 802.11 physical layer chips also handle wi-fi direct bluetooth nfc april 2017 google project zero investigated broadcom soc wifi stack found lacked basic exploit mitigations including stack cookies safe unlinking access permission protection allowing full device takeover wi-fi proximity alone requiring user interaction numerous smartphones apple samsung google affected broadcom authored voip codecs 2002 released open source lgpl license 2009 free open source drivers available included linux kernel source tree 802.11b/g/a/n family wireless chips broadcom produces since release 2.6.26 kernel broadcom chips kernel support require external firmware built 2003 free software foundation accused broadcom complying gnu general public license broadcom distributed gpl code driver 802.11g router chipset without making code public chipset adopted linksys later purchased cisco cisco eventually published source code firmware wrt54g wireless broadband router gpl-license 2012 linux foundation listed broadcom one top 10 companies contributing development linux kernel 2011 placing top 5 percent estimated 226 contributing companies foundation linux kernel development report also noted course year broadcom submitted 2,916 changes kernel october broadcom released parts raspberry pi userland bsd-style license according raspberry pi foundation made first arm-based multimedia soc fully functional vendor-provided opposed partial reverse-engineered fully open-source drivers although due substantial binary firmware code must executing parallel operating system executes independently prior loading operating system claim universally accepted broadcom provided linux driver broadcom crystal hd also hired eric anholt former intel employee work free open-source graphics device driver videocore iv broadcom organizes fabrication processor chip recently bcm2837 chip wifi processor bcm43438 used charitable raspberry pi foundation foundation requested help broadcom making raspberry pi card motherboard free drm corporate control kind interact hardware bought controlled children jericho2 programmable ethernet switch chip 10 tb/s switching capacity per device tomahawk 3 series supports high-density standards based 400gbe 200gbe 100gbe switching routing hyperscale cloud networks broadcom divulged bringing two variants tomahawk-3 market first full-tilt-boogie 12.8 tb/sec 256 serdes fired supporting 32 ports 400 gb/sec 64 ports 200 gb/sec 128 ports 100 gb/sec second variant tomahawk-3 160 256 serdes fired delivers 8 tb/sec aggregate bandwidth broadcom suggesting 80 ports 100 gb/sec 48 ports 100 gb/sec plus either 8 ports 400 gb/sec 16 ports 200 gb/sec 96 ports 50 gb/sec plus either 8 ports 400 gb/sec 16 ports 200 gb/sec broadcom known fabless company outsources semiconductor manufacturing foundries globalfoundries semiconductor manufacturing international corporation silterra tsmc united microelectronics corporation company based irvine california university research park university california irvine campus 2007 move previous campus near irvine spectrum many research development sites including silicon fen cambridge uk bangalore hyderabad india richmond near vancouver markham near toronto canada sophia antipolis france september 2011 broadcom bought netlogic microsystems deal 3.7 billion cash excluding around 450 million netlogic employee shareholdings transfer broadcom besides netlogic microsystems acquisition years broadcom acquired many smaller companies quickly enter new markets broadcom logo designed eliot hochberg based logo company previous name broadband telecom broadband telecom logo designed co-founder henry nicholas then-wife stacey nicholas inspired mathematical sinc function 2009 company founded broadcom foundation non-profit corporation 50m investment direction henry samueli company co-founder broadcom chief executive scott mcgregor cited history science fair involvement factor success mcgregor named foundation first president chairman | [
1024,
4609,
2050,
4098,
9732,
11267,
8711,
11282,
9235,
535,
11289,
4124,
1057,
9761,
4644,
4133,
38,
4139,
8237,
2097,
8253,
10303,
7745,
7234,
7747,
1608,
3657,
2635,
8779,
8283,
4703,
8288,
99,
8292,
6247,
9320,
6250,
6252,
6253,
8812,... | None |
5,029 | 7 | Message_passing:message passing computer science message passing technique invoking behavior i.e. running program computer invoking program sends message process may actor object relies process supporting infrastructure select invoke actual code run message passing differs conventional programming process subroutine function directly invoked name message passing key models concurrency object-oriented programming message passing used ubiquitously modern computer software used way objects make program work means objects systems running different computers e.g. internet interact message passing may implemented various mechanisms including channels message passing technique invoking behavior i.e. running program computer contrast traditional technique calling program name message passing uses object model distinguish general function specific implementations invoking program sends message relies object select execute appropriate code justifications using intermediate layer essentially falls two categories encapsulation distribution encapsulation idea software objects able invoke services objects without knowing caring services implemented encapsulation reduce amount coding logic make systems maintainable e.g. rather if-then statements determine subroutine function call developer send message object object select appropriate code based type one first examples used domain computer graphics various complexities involved manipulating graphic objects example simply using right formula compute area enclosed shape vary depending shape triangle rectangle ellipse circle traditional computer programming would result long if-then statements testing sort object shape calling appropriate code object-oriented way handle define class called codice_1 subclasses codice_2 codice_3 turn subclasses codice_4 codice_5 simply send message codice_1 asking compute area codice_1 object invoke subclass method formula appropriate kind object distributed message passing provides developers layer architecture provides common services build systems made sub-systems run disparate computers different locations different times distributed object sending message messaging layer take care issues synchronous message passing occurs objects running time used object-oriented programming languages java smalltalk synchronous messaging analogous synchronous function call function caller waits function completes sending process waits receiving process completes make synchronous communication unworkable applications example large distributed systems may perform well enough usable large distributed systems may need operate subsystems maintenance etc imagine busy business office 100 desktop computers send emails using synchronous message passing exclusively one worker turning computer cause 99 computers freeze worker turns computer back process single email asynchronous message passing receiving object busy requesting object sends message continuing function call analogy like function call returns immediately without waiting called function complete messages sent queue stored receiving process requests receiving process processes messages sends results queue pickup original process designated next process asynchronous messaging requires additional capabilities storing retransmitting data systems may run concurrently generally handled intermediary level software often called middleware common type message-oriented middleware mom buffer required asynchronous communication cause problems full decision made whether block sender whether discard future messages blocked sender may lead deadlock messages dropped communication longer reliable synchronous communication built top asynchronous communication using synchronizer example α-synchronizer works ensuring sender always waits acknowledgement message receiver sender sends next message acknowledgement received hand asynchronous communication also built top synchronous communication example modern microkernels generally provide synchronous messaging primitive asynchronous messaging implemented top using helper threads message-passing systems use either distributed local objects distributed objects sender receiver may different computers running different operating systems using different programming languages etc case bus layer takes care details converting data one system another sending receiving data across network etc remote procedure call rpc protocol unix early example note type message passing requirement sender receiver use object-oriented programming procedural language systems wrapped treated large grained objects capable sending receiving messages examples systems support distributed objects onc rpc corba java rmi dcom soap .net remoting ctos qnx neutrino rtos openbinder d-bus distributed object systems called shared nothing systems message passing abstraction hides underlying state changes may used implementation sending messages distributed asynchronous message-passing additional overhead compared calling procedure message-passing arguments must copied new message arguments contain megabytes data must copied transmitted receiving object traditional procedure calls differ message-passing terms memory usage transfer time locality arguments passed receiver typically general purpose registers requiring additional storage transfer time parameter list containing arguments addresses bits address-passing possible distributed systems since systems use separate address spaces web browsers web servers examples processes communicate message-passing url example referencing resource without exposing process internals subroutine call method invocation exit invoked computation terminated asynchronous message-passing contrast result response arriving significant time request message sent message-handler general process messages one sender means state change reasons unrelated behavior single sender client process contrast typical behavior object upon methods invoked latter expected remain state method invocations words message-handler behaves analogously volatile object prominent mathematical models message passing actor model pi calculus mathematical terms message single means pass control object object responds message method message alan kay argued message passing important objects oop objects often over-emphasized live distributed objects programming model builds upon observation uses concept distributed data flow characterize behavior complex distributed system terms message patterns using high-level functional-style specifications | [
9224,
9225,
4107,
4622,
7187,
7699,
8725,
9248,
545,
8229,
6694,
1586,
58,
8252,
9791,
9794,
8275,
8304,
3705,
1152,
7318,
9366,
9887,
2222,
7880,
2262,
8406,
225,
8929,
10470,
4333,
5363,
2804,
10486,
256,
1280,
11027,
10007,
1826,
7461,... | Test |
5,030 | 9 | Rule_of_least_power:rule least power programming rule least power design principle suggests choosing least powerful computer language suitable given purpose stated alternatively given choice among computer languages classes range descriptive declarative procedural less procedural descriptive language one chooses one data stored language rule application principle least privilege protocol design originally proposed axiom good design term extension kiss principle applied choosing among range languages ranging explained tim berners-lee | [
10413,
10835,
10452,
2901,
502
] | None |
5,031 | 9 | Clojure:clojure clojure like closure modern dynamic functional dialect lisp programming language java platform. ref name= platform/android /ref like lisps clojure treats code data lisp macro system. ref name= reference/lisps /ref current development process community-driven ref name= dev/dev /ref overseen rich hickey benevolent dictator life bdfl clojure advocates immutability immutable data structures encourages programmers explicit managing identity states. ref name= about/state /ref focus programming immutable values explicit progression-of-time constructs intended facilitate developing robust especially concurrent programs. ref name= about/rationale /ref ref name= msdn/inside-clojure /ref type system entirely dynamic recent efforts also sought implementation gradual typing commercial support clojure provided cognitect annual clojure conferences organized every year across globe famous clojure/conj rich hickey creator clojure language clojure developed dotlisp similar project based .net platform three earlier attempts provide interoperability lisp java java foreign language interface common lisp jfli foreign object interface lisp foil lisp-friendly interface java servlets lisplets hickey spent 2½ years working clojure releasing publicly much time working exclusively clojure outside funding end time hickey sent email announcing language friends common lisp community development process community-driven managed clojure jira project page issues may filed general development discussion occurs clojure google group anyone submit issues ideas contribute patches one must sign clojure contributor agreement jira issues processed team screeners finally rich hickey approves changes rich hickey developed clojure wanted modern lisp functional programming symbiotic established java platform designed concurrency clojure approach state characterized concept identities represented series immutable states time since states immutable values number workers operate parallel concurrency becomes question managing changes one state another purpose clojure provides several mutable reference types well-defined semantics transition states clojure runs java platform result integrates java fully supports calling java code clojure ref name= about/jvm_hosted /ref clojure code called java also community uses leiningen project automation providing support maven integration leiningen handles project package management dependencies configured using clojure syntax like lisps clojure syntax built s-expressions first parsed data structures reader compiled. ref name= reference/reader /ref clojure reader supports literal syntax maps sets vectors addition lists compiled mentioned structures directly clojure lisp-1 intended code-compatible dialects lisp since uses set data structures incompatible lisps lisp dialect clojure supports functions first-class objects read–eval–print loop repl macro system clojure lisp macro system similar common lisp exception clojure version backquote termed syntax quote qualifies symbols namespace helps prevent unintended name capture binding namespace-qualified names forbidden possible force capturing macro expansion must done explicitly clojure allow user-defined reader macros reader supports constrained form syntactic extension clojure supports multimethods interface-like abstractions protocol based polymorphism data type system using records providing high-performance dynamic polymorphism designed avoid expression problem clojure support lazy sequences encourages principle immutability persistent data structures functional language emphasis placed recursion higher-order functions instead side-effect-based looping automatic tail call optimization supported jvm support natively possible explicitly using codice_1 keyword parallel concurrent programming clojure provides software transactional memory reactive agent system channel-based concurrent programming clojure 1.7 introduced reader conditionals allowing embedding clojure clojurescript code namespace transducers added method composing transformations transducers enable higher-order functions map fold generalize source input data traditionally functions operate sequences transducers allow work channels let user define models transduction primary platform clojure java target implementations exist notable clojurescript compiles ecmascript 3 clojureclr full port .net platform interoperable ecosystem survey clojure community 1,060 respondents conducted 2013 found 47 respondents used clojure clojurescript working clojure 2014 number increased 55 2015 based 2,445 respondents 66 popular clojurescript projects include implementations react library reagent re-frame rum om continued interest functional programming clojure adoption software developers java platform kept increasing language also either preferred recommended renowned software development veterans james gosling paul graham robert c. martin colloquially known uncle bob jvm ecsosystem report 2018 claimed largest survey ever java developers prepared collaboration snyk java magazine clojure ranked 2nd used programming language behind java main applications clojure used industry firms apple atlassian funding circle netflix puppet walmart well government agencies nasa also used creative computing including visual art music games poetry thoughtworks assessing functional programming languages technology radar expressed favor toward clojure simple elegant implementation lisp jvm 2010 promoted status adopt 2012 growing number unofficial experimental implementations platforms testify popularity language tooling clojure development seen significant improvement years following list popular ides/editors plug-ins combined provide excellent support clojure development addition tools provided community official clojure cli tools ref name= guides/deps_and_cli /ref also become available gnu/linux macos windows since clojure 1.9 following examples run clojure repl one started clojure cli tools online repl one available repl.it strong emphasis simplicity typical clojure programs consist mostly functions simple data structures i.e. lists vectors maps sets like lisps one iconic features clojure interactive programming repl note following examples codice_2 starts line comment codice_3 indicates output unlike runtime environments names get compiled away clojure runtime environment easily introspectable using normal clojure data structures similar lisps clojure homoiconic also known code data example see easy write code modifies code threading macros codice_4 codice_5 friends syntactically express abstraction piping collection data series transformations also achieved efficiently using transducers thread-safe generator unique serial numbers though like many lisp dialects clojure built-in codice_6 function uses internally anonymous subclass codice_7 n't write anything macro using silence prints within clojure created ground embrace host platforms one design goals thus provides excellent language interoperability java 10 threads manipulating one shared data structure consists 100 vectors one containing 10 initially sequential unique numbers thread repeatedly selects two random positions two random vectors swaps changes vectors occur transactions making use clojure software transactional memory system | [
10752,
11269,
2056,
7176,
6154,
9224,
2062,
9231,
6160,
2577,
6161,
7184,
2069,
9749,
8728,
4633,
4122,
9245,
8226,
5677,
11310,
3119,
1591,
2105,
572,
3132,
6717,
8258,
8771,
10819,
7750,
8262,
1613,
9299,
10841,
3675,
8289,
2658,
7267,
... | None |
5,032 | 9 | Expect:expect expect extension tcl scripting language written libes program automates interactions programs expose text terminal interface expect originally written 1990 unix platform since become available microsoft windows systems expect used automate control interactive applications telnet ftp passwd fsck rlogin tip ssh others expect uses pseudo terminals unix emulates console windows starts target program communicates human would via terminal console interface tk another tcl extension used provide gui expect serves glue link existing utilities together general idea figure make expect use system existing tools rather figure solve problem inside expect key usage expect involves commercial software products many products provide type command-line interface usually lack power needed write scripts built service users administering product company often spend resources fully implement robust scripting language expect script spawn shell look environmental variables perform unix commands retrieve information enter product command-line interface armed necessary information achieve user goal retrieving information interacting product via command-line interface script make intelligent decisions action take every time expect operation completed results stored local variable called expect_out allows script harvest information feedback user also allows conditional behavior send next based circumstances common use expect set testing suite whether programs utilities embedded systems dejagnu testing suite written using expect use testing used extensively testing gcc well suited testing remote targets embedded development one automate generation expect script using tool called 'autoexpect tool observes actions generates expect script using heuristics though generated code may large somewhat cryptic one always tweak generated script get exact code spawn telnet remote_server expect username send my_user_id\r expect password send my_password\r expect send my_command\r expect set results expect_out buffer send exit\r expect eof another example script automates ftp set timeout -1 spawn ftp remote_server expect username send my_user_id\r expect password send my_password\r expect ftp send bin\r expect ftp send prompt\r expect ftp send mget *\r expect ftp send bye\r expect eof example automates sftp password proc connect passw set user lindex argv 0 set passw lindex argv 1 set host lindex argv 2 set location lindex argv 3 set file1 lindex argv 4 set file2 lindex argv 5 user == || passw == || host == || location == || file1 == || file2 == spawn sftp user host set rez connect passw rez == 0 puts \nerror connecting server host user user password passw \n exit 1 using passwords command-line arguments like example huge security hole user machine read password running ps however add code prompt password rather giving password argument secure see example stty -echo send_user -- enter password expect_user -re \n send_user \n stty echo set pass expect_out 1 string another example automated ssh login user machine set timeout 60 spawn ssh user machine 1 wait close spawn_id various projects implement expect-like functionality languages c java scala groovy perl python ruby shell go generally exact clones original expect concepts tend similar | [
2786,
7364,
10341,
8582,
11112,
8554,
10732,
6797,
7343,
4528,
7983,
5106,
692,
5492,
9780,
8504,
9245
] | Validation |
5,033 | 9 | MLisp:mlisp mlisp variant lisp algol-like syntax based m-expressions function syntax original description lisp john mccarthy mccarthy m-expressions never implemented mlisp first implemented ibm 360 horace enea reimplemented pdp 10 david canfield smith second implementation also supported special kind lambdas fexpr evaluate arguments lisp-1 scheme single namespace variables functions mlisp preprocessor alternative reader-friendly syntax lisp descendant mlisp 2 introduced new concepts mlisp2 called transitional language authors larry tesler improved pattern matching system implement successor language called lisp70 completed preliminary version though path lisp evolution widely neglected resembles features later found ml scheme m-lisp second branch—independent mlisp approach— described author essentially hybrid m-expression lisp scheme multiple third-party implementations infix-notation lisps lisp-like lisp-derived languages notable examples include | [
512,
4992,
10752,
11269,
3334,
6919,
2056,
7562,
2062,
9231,
1301,
9749,
9877,
8728,
4633,
8474,
6556,
3869,
10012,
2335,
6047,
1953,
8226,
4516,
5031,
9128,
5803,
2352,
2225,
10547,
11255,
311,
2105,
7867,
6717,
4799,
5569,
6594,
8771,
4... | None |
5,034 | 1 | Data_store:data store data store repository persistently storing managing collections data include repositories like databases also simpler store types simple files emails etc database series bytes managed database management system dbms file series bytes managed file system thus database file series bytes stored called data store matlab cloud storage systems like vmware firefox os use datastore term abstracting collections data inside respective applications data store refer broad class storage systems including | [
3906,
9762,
9286,
7175,
7816,
6153,
4490,
1196,
6156,
19,
7347,
2901,
9397,
5047,
7288,
7326
] | None |
5,035 | 3 | Test_register:test register test register intel 80386 intel 80486 processor register used processor usually self-test registers undocumented used specialized software test registers named tr3 tr7 regular programs n't usually require registers work pentium test registers replaced variety model-specific registers msrs two test registers tr6 tr7 provided purpose testing tr6 test command register tr7 test data register registers accessed variants mov instruction test register may either source operand destination operand mov instructions defined real-address mode protected mode test registers privileged resources protected mode mov instructions access executed privilege level 0 attempt read write test registers executing privilege level causes general protection exception also instructions generate invalid opcode exception cpu newer 80486 | [
5080,
499,
8851,
1247
] | None |
5,036 | 2 | LUnix:lunix lunix short little unix unix-like multi-tasking operating system designed run natively commodore 64 commodore 128 home computer systems supports tcp/ip networking slip ppp using rs232 interface unlike unix-like systems lunix written 6502 assembly language instead c. first version lunix released 1993 current version 0.21 dates 2004 amongst others supports preemptive multitasking unix pipes variety protocols like tcp/ip slip ppp rs232 dynamic memory management virtual consoles contains web server clients telnet pop3 ftp act terminal terminal server rs232 lunix developed daniel dallmann contributed ilker ficicilar stefan haubenthal paul gardner-stephen late 1990s first generation lunix support faster rs232 via clever software tricks 80 column vic vdc screen support ps/2 keyboard support small set standard unix commands possible first distribution attach two keyboards two monitors one rs232 terminal set three simultaneous multitasking sessions c128 lunix also supports 2 mhz mode boot disk convenience c128 platform lunix came extensive documentation time well-defined library calls relocatable code support decent memory management functions made possible develop software lunix easily | [
6787,
10891,
6412,
7188,
5397,
1304,
3487,
3241,
7983,
3248,
2995,
8499,
9141,
823,
9784,
9151,
7364,
10436,
477,
225,
6369,
11112,
8432,
5492,
2424,
633,
2045
] | Test |
5,037 | 9 | Sound_Object_(SndObj)_Library:sound object sndobj library sound object sndobj library c++ object-oriented programming library music audio development composed 100+ classes signal processing audio midi file i/o available cross-platform linux windows mac os x irix unix-like systems library development cooperative project hosted sourceforge new versions released twice-yearly development versions available via concurrent versions system cvs library also provides bindings python aka pysndobj java common lisp cffi | [
1668,
7172,
6797,
2062,
7571,
5397,
6933,
6810,
5677,
823,
3665,
10321,
7769,
9565,
7550,
8554,
7535,
2804,
8958
] | Validation |
5,038 | 7 | Widen_(company):widen company widen software company founded 1948 plate-engraving business developed digital print company eventually software company company founded 1948 eponymous emily arthur widen private plate engraving business focused newspaper presses 1985 company began focusing color printing scanning mid-1990s widen began investing digital printing services well software services internet developing image database system saas digital asset management company company changed name widen colourgraphics ltd. widen enterprises 1997 company headquartered monona wisconsin ranked comparably one top smes united states terms management widen ’ ceo matthew gonnering though company renamed position chief eudaimonia officer reflect philosophy management style appointed 2009 transitioned company largely prepress printing company software firm widen software focuses digital asset management houses corporate information helps develop digital projects like websites advertising cataloguing example widen ’ cloud software hosts corporate information companies like brooks running shoes widen provides services public services private companies | [] | Validation |
5,039 | 9 | Mordechai_Ben-Ari:mordechai ben-ari mordechai moti ben-ari professor computer science education weizmann institute science ben-ari published numerous textbooks computer science developed software tools teaching computer science written many influential papers computer science education primary focus books tools learning theoretical concepts computer science concurrency mathematical logic collaboration university joensuu finland group developed jeliot program animation system teaching elementary computer science programming ben-ari received 2004 acm sigcse award outstanding contributions computer science education named acm distinguished educator 2009 | [
9224,
3529,
428
] | None |
5,040 | 2 | Call_stack:call stack computer science call stack stack data structure stores information active subroutines computer program kind stack also known execution stack program stack control stack run-time stack machine stack often shortened stack although maintenance call stack important proper functioning software details normally hidden automatic high-level programming languages many computer instruction sets provide special instructions manipulating stacks call stack used several related purposes main reason one keep track point active subroutine return control finishes executing active subroutine one called yet complete execution control handed back point call activations subroutines may nested level recursive special case hence stack structure example subroutine codice_1 calls subroutine codice_2 four different places codice_2 must know return execution completes accomplish address following instruction jumps codice_2 return address pushed onto call stack call since call stack organized stack caller pushes return address onto stack called subroutine finishes pulls pops return address call stack transfers control address called subroutine calls yet another subroutine push another return address onto call stack information stacking unstacking program dictates pushing consumes space allocated call stack error called stack overflow occurs generally causing program crash adding subroutine entry call stack sometimes called winding conversely removing entries unwinding usually exactly one call stack associated running program accurately task thread process although additional stacks may created signal handling cooperative multitasking setcontext since one important context referred stack implicitly task however forth programming language data stack parameter stack accessed explicitly call stack commonly referred stack see high-level programming languages specifics call stack usually hidden programmer given access set functions memory stack example abstraction assembly languages hand require programmers involved manipulating stack actual details stack programming language depend upon compiler operating system available instruction set noted primary purpose call stack store return addresses subroutine called location address instruction calling routine later resume needs saved somewhere using stack save return address important advantages alternative calling conventions one task stack thus subroutine thread-safe active simultaneously different tasks different things another benefit providing reentrancy recursion automatically supported function calls recursively return address needs stored activation function later used return function activation stack structures provide capability automatically depending language operating-system machine environment call stack may serve additional purposes including example typical call stack used return address locals parameters known call frame environments may fewer functions assigned call stack forth programming language example ordinarily return address counted loop parameters indexes possibly local variables stored call stack environment named return stack although data temporarily placed using special return-stack handling code long needs calls returns respected parameters ordinarily stored separate data stack parameter stack typically called stack forth terminology even though call stack since usually accessed explicitly forths also third stack floating-point parameters call stack composed stack frames also called activation records activation frames machine dependent abi-dependent data structures containing subroutine state information stack frame corresponds call subroutine yet terminated return example subroutine named codice_2 currently running called subroutine codice_1 top part call stack might laid like adjacent picture diagram like drawn either direction long placement top direction stack growth understood furthermore independently architectures differ whether call stacks grow towards higher addresses towards lower addresses logic diagram independent addressing choice stack frame top stack currently executing routine stack frame usually includes least following items push order stack frame sizes differ different functions invocations particular function popping frame stack constitute fixed decrement stack pointer function return stack pointer instead restored frame pointer value stack pointer function called stack frame contains stack pointer top frame immediately stack pointer mutable register shared invocations frame pointer given invocation function copy stack pointer function invoked locations fields frame defined relative either top frame negative offsets stack pointer relative top frame positive offsets frame pointer location frame pointer must inherently defined negative offset stack pointer systems stack frame field contain previous value frame pointer register value caller executing example stack frame codice_2 would memory location holding frame pointer value codice_1 uses shown diagram value saved upon entry subroutine restored upon return field known location stack frame enables code access frame successively underneath currently executing routine frame also allows routine easily restore frame pointer caller frame returns programming languages support nested subroutines also field call frame points stack frame latest activation procedure closely encapsulates callee i.e immediate scope callee called access link static link keeps track static nesting dynamic recursive calls provides routine well routines may invoke access local data encapsulating routines every nesting level architectures compilers optimization cases store one link enclosing level immediately enclosing deeply nested routines access shallow data traverse several links strategy often called display access links optimized away inner function access non-constant local data encapsulation case pure functions communicating via arguments return values example historical computers burroughs large systems special display registers support nested functions compilers modern machines ubiquitous x86 simply reserve words stack pointers needed purposes stack frame subroutine caller considered overlap overlap consisting area parameters passed caller callee environments caller pushes argument onto stack thus extending stack frame invokes callee environments caller preallocated area top stack frame hold arguments supplies subroutines calls area sometimes termed outgoing arguments area callout area approach size area calculated compiler largest needed called subroutine usually call stack manipulation needed site call subroutine minimal good since many call sites subroutine called values actual arguments evaluated call site since specific particular call either pushed onto stack placed registers determined used calling convention actual call instruction branch link typically executed transfer control code target subroutine called subroutine first code executed usually termed subroutine prologue since necessary housekeeping code statements routine begun instruction set architectures instruction used call subroutine puts return address register rather pushing onto stack prologue commonly save return address pushing value onto call stack although called subroutine call routines may leave value register similarly current stack pointer and/or frame pointer values may pushed frame pointers used prologue typically set new value frame pointer register stack pointer space stack local variables allocated incrementally changing stack pointer forth programming language allows explicit winding call stack called return stack subroutine ready return executes epilogue undoes steps prologue typically restore saved register values frame pointer value stack frame pop entire stack frame stack changing stack pointer value finally branch instruction return address many calling conventions items popped stack epilogue include original argument values case usually stack manipulations need done caller calling conventions however caller responsibility remove arguments stack return returning called function pop top frame stack perhaps leaving return value general act popping one frames stack resume execution elsewhere program called stack unwinding must performed non-local control structures used used exception handling case stack frame function contains one entries specifying exception handlers exception thrown stack unwound handler found prepared handle catch type thrown exception languages control structures require general unwinding pascal allows global goto statement transfer control nested function previously invoked outer function operation requires stack unwound removing many stack frames necessary restore proper context transfer control target statement within enclosing outer function similarly c codice_11 codice_12 functions act non-local gotos common lisp allows control happens stack unwound using codice_13 special operator applying continuation stack logically unwound rewound stack continuation way implement continuations example using multiple explicit stacks application continuation simply activate stack wind value passed scheme programming language allows arbitrary thunks executed specified points unwinding rewinding control stack continuation invoked call stack sometimes inspected program running depending program written compiled information stack used determine intermediate values function call traces used generate fine-grained automated tests cases like ruby smalltalk implement first-class continuations example gnu debugger gdb implements interactive inspection call stack running paused c program taking regular-time samples call stack useful profiling performance programs subroutine pointer appears call stack sampling data many times likely code bottleneck inspected performance problems language free pointers non-checked array writes c mixing control flow data affects execution code return addresses saved frame pointers simple program data parameters return values call stack security risk possibly exploitable stack buffer overflows common type buffer overflows one attacks involves filling one buffer arbitrary executable code overflowing buffer overwrite return address value points directly executable code result function returns computer executes code kind attack easily blocked w^x similar attacks succeed even w^x protection enabled including return-to-libc attack attacks coming return-oriented programming various mitigations proposed storing arrays completely separate location return stack case forth programming language | [
6664,
9224,
9739,
2062,
3603,
8231,
3630,
5176,
2105,
2620,
2115,
2627,
8262,
585,
1103,
7760,
6742,
602,
10333,
6754,
8301,
9330,
9331,
9854,
642,
10883,
136,
655,
10395,
1702,
9896,
7858,
692,
9911,
11447,
1724,
7870,
9921,
2253,
2255,
... | None |
5,041 | 2 | Bare_machine:bare machine computer science bare machine bare metal refers computer executing instructions directly logic hardware without intervening operating system modern operating systems evolved various stages elementary present day complex highly sensitive systems incorporating many services development programmable computers require physical changes run different programs prior development operating systems sequential instructions executed computer hardware directly using machine language without system software layer approach termed bare machine precursor modern operating systems today mostly applicable embedded systems firmware generally time-critical latency requirements conventional programs run runtime system overlaid operating system pdp-11 machine allowed programmers load program supplied machine code ram resulting operation program could monitored lights output derived mag tape print devices storage bare machine programming remains common practice embedded systems microcontrollers microprocessors often boot directly monolithic single-purpose software without loading separate operating system embedded software vary structure simplest form may consist infinite main loop calling subroutines responsible checking inputs performing actions writing outputs | [
7905,
7983,
7217,
11601,
7507,
5363,
3413,
10803,
8509,
7421
] | Test |
5,042 | 3 | Gamebike:gamebike game bike interactive fitness bike requires user exercise order play video games user must pedal bike order character accelerate must turn handlebars steer game bike allows users control character game getting exercise game bike name interactive fitness device first invented patented edward h. ted parks m.d 2000 dr parks sold rights patent cateye co ltd japanese company expertise electronic bicycle accessories bike lights speedometers cateye initial embodiment parks design used traditional bicycle attached referred gb100 system front tire placed turn style platform used read direction sensors placed rear wheel mounted bicycle trainer measure speed cateye co ltd. first started production game bike gb100 form project handled group new jersey redesigned product single package incorporated stand-alone indoor exercise bike gb200 born immediate need commercial version soon covered introduction popular gb-300 game bike late 2008 cateye co ltd. stopped international distribution fitness line game bike production done source distributors inc. dallas texas source distributors produced bike made modifications unit improve controller serviceability game bike popular product within school ymca markets thousands bikes sold since start 2003 game bike owned hudson fitness llc game bike currently available hudson fitness llc continues supporting game bike service compatible titles include speed-based video game ps2/ps3/game cube/xbox | [] | Test |
5,043 | 2 | MK-DOS:mk-dos mk-dos one widespread operating systems elektronika bk personal computers developed mikhail korolev dmitriy butyrskiy 1in like andos system provided full compatibility models emulating bk-0010 environments modern bk-0011 bk-0011m machines program requests magnetic tape made proper rom functions redirected disk system supported 4 physical disk drives actual number limited disk rom installed many hard disk partitions number letters latin alphabet could used separate logical drives volume 32 mb see also drive letter assignment starting version 3.0 system also supported mounting disk images logical drives booted bk-0011 bk-0011m system automatically created ram disk computer memory widespread file system along mk-dos users microdos support file fragmentation like file system used rt-11 required frequent spatial reallocation maintain optimum contiguous free space rt-11 users would use 'squeeze command worked way *compact command acorn dfs bbc micro although mk-dos incompatible rt-11 file system shared many principles microdos file system read-only support andos filename length limited 14 symbols filename extension recognized separately considered part filename minimal installation system took little 8 kb computer memory functional norton commander-like file manager called mcommander also shipped number utilities including drivers rt-11 fat12 csi-dos file systems add-ons file manager | [
9762,
2179,
1253,
7983,
3512,
11033,
1853,
7358
] | Test |
5,044 | 2 | STXIT:stxit stxit macro instruction dos/360 operating system ibm system/360 series mainframe computers successors later mainframe series also available univac series 90 mainframes running tos/dos operating system later vs/9 operating system macro abbreviation term set exit used programs written assembly language used create recovery routine event program errors similar signal handlers c try/finally blocks c++ java object oriented languages stxit macro would provide error recovery address several major types errors certain operator signals errors covered depended upon operating system general errors provided recovery included timer interrupt stxit provided mechanism sampling program execution used various legacy performance analyzers essentially psw gathered time interval used later analysis determine hot spots program check stxit provided mechanism program animation via deliberate introduction invalid opcodes fly locations target programs exit recovery entered original opcode would restored ready later resumption new location set format macro call depended upon system used upon dos/vse one two forms either macro call establish create stxit routine handle appropriate event macro call de-establish longer handle event establish stxit routine would code stxit routine completes returns point invoked via exit macro return appropriate point called unless ab routine case permitted return must issue termination macro eoj cancel detach dump de-establish cancel stxit routine would code cancel routine event everything beginning one space parameter comment z/system vse stxit functions provided previously ibm dos/vse still supported addition new stxit macro function 'disabled timer appendage die available use supervisor mode key 0 psw privilege bit =1 format die means routine handle disabled interval timer event rtnaddr address handle expiration interval timer set tod event coded address may instead specified 1 meaning address stored register 1 routine subject strict restrictions including changing register contents using svcs univac vs/9 stxit macro vs/9 parameter based missing entries entered commas e.g third item handled format would remove one handlers stxit macro re-invoked blank entry handlers removed one stxit macro call effect time class event handled omitted would two commas row indicate unhandled class event causes error handled operating system default handler events representing critical errors abend progcheck program terminated eo79 error user option request pdump non-critical events event ignored later error recovery systems would provide specifying errors explicitly opposed position parameter stxit macro univac vs/9 continued support stxit also added crtn contingency routine macro provide even powerful error recovery well recovery errors stxit capture originally crtn stxit could used together later releases operating system provided crtn stxit macro used crtn handled events covered stxit used cover event stxit routine handled event crtn routine invoked | [
1219,
1253,
7274,
10508,
5677,
7983,
5457,
10235,
477
] | Train |
5,045 | 4 | Mausezahn:mausezahn typical applications mausezahn include mausezahn allows sending arbitrary sequence bytes directly network interface card integrated packet builder provides simple command line interface complicated packets since version 0.38 mausezahn offers multi-threaded mode cisco-style command line interface version 0.38 mausezahn supports following features mausezahn sends exactly packet user specified therefore rather less suited vulnerability audits additional algorithms required detect open ports behind firewall automatically evade intrusion detection systems ids however network administrator could implement audit routines via script utilizes mausezahn creating actual packets mausezahn currently runs linux systems plans port windows operating system | [
6273,
138,
4373,
11413,
5402,
9381,
1580,
10924,
7983,
2739,
9780,
823,
11321,
5437,
2887,
7901,
11486,
5472,
2045
] | Test |
5,046 | 2 | AOS/VS_II:aos/vs ii aos/vs ii discontinued operating system data general 32-bit mv/eclipse computers aos/vs ii operating system released 1988 originally simply rev 8.00 aos/vs operating system however introduced new file system compatible original aos aos/vs file system also contained new features like access control list acl groups since customers want upgrade new file system invest new hardware data general agreed continue bug-fix support “ immortal ” revision aos/vs became known colloquially aos/vs “ classic ” new development would proceed aos/vs ii revision numbers rolled back 1.00 vs-classic rev 7.7x vs-ii rev 3.2x updated survive year 2000 problem although time obsolescent among new features part aos/vs ii full tcp/ip stack nfs support expanded kernel address space using ring-1 logical disk-level user data cache /vs classic file system metadata cache user data cache | [
96,
9762,
8902,
7983,
1971,
8502
] | Test |
5,047 | 1 | Apache_Cassandra:apache cassandra apache cassandra free open-source distributed wide column store nosql database management system designed handle large amounts data across many commodity servers providing high availability single point failure cassandra offers robust support clusters spanning multiple datacenters asynchronous masterless replication allowing low latency operations clients avinash lakshman one authors amazon dynamo prashant malik initially developed cassandra facebook power facebook inbox search feature facebook released cassandra open-source project google code july 2008 march 2009 became apache incubator project february 17 2010 graduated top-level project facebook developers named database trojan mythological prophet cassandra classical allusions curse oracle releases graduation include cassandra introduced cassandra query language cql cql simple interface accessing cassandra alternative traditional structured query language sql cql adds abstraction layer hides implementation details structure provides native syntaxes collections common encodings language drivers available java jdbc python dbapi2 node.js helenus go gocql c++ example keyspace creation including column family cql 3.0 gives cassandra 1.0 cassandra row level consistent meaning inserts updates table affect row processed approximately time may affect non-key columns inconsistent ways one update may affect one column another affects resulting sets values within row never specified intended cassandra 1.1 solved issue introducing row-level isolation tombstones known cause performance degradation severe consequence levels cassandra wide column store essentially hybrid key-value tabular database management system data model partitioned row store tunable consistency rows organized tables first component table primary key partition key within partition rows clustered remaining columns key columns may indexed separately primary key tables may created dropped altered run-time without blocking updates queries cassandra joins subqueries rather cassandra emphasizes denormalization features like collections column family called table since cql 3 resembles table rdbms relational database management system column families contain rows columns row uniquely identified row key row multiple columns name value timestamp unlike table rdbms different rows column family share set columns column may added one multiple rows time key cassandra corresponds value object key values columns columns grouped together sets called column families thus key identifies row variable number elements column families could considered tables table cassandra distributed multi dimensional map indexed key furthermore applications specify sort order columns within super column simple column family cassandra java-based system managed monitored via java management extensions jmx jmx-compliant nodetool utility instance used manage cassandra cluster adding nodes ring draining nodes decommissioning nodes nodetool also offers number commands return cassandra metrics pertaining disk usage latency compaction garbage collection since cassandra 2.0.2 2013 measures several metrics produced via dropwizard metrics framework may queried via jmx using tools jconsole passed external monitoring systems via dropwizard-compatible reporter plugins according db-engines ranking cassandra popular wide column store september 2014 became 9th popular database | [
3,
6161,
1047,
1049,
8217,
11303,
5677,
9789,
7742,
7233,
9285,
7750,
11343,
2130,
7261,
8799,
8294,
8295,
8810,
2163,
6774,
7816,
10377,
8860,
1701,
10413,
2234,
7359,
6338,
1222,
4294,
6860,
6359,
8408,
8425,
747,
3819,
11017,
8460,
115... | Test |
5,048 | 9 | Adobe_ColdFusion:adobe coldfusion adobe coldfusion commercial rapid web-application development platform created j. j. allaire 1995 programming language used platform also commonly called coldfusion though accurately known cfml coldfusion originally designed make easier connect simple html pages database version 2 1996 became full platform included ide addition full scripting language one distinguishing features coldfusion associated scripting language coldfusion markup language cfml cfml compares scripting components asp jsp php purpose features tag syntax closely resembles html script syntax resembles javascript coldfusion often used synonymously cfml additional cfml application servers besides coldfusion coldfusion supports programming languages cfml server-side actionscript embedded scripts written javascript-like language known cfscript originally product allaire released july 2 1995 coldfusion developed brothers joseph j. allaire jeremy allaire 2001 allaire acquired macromedia turn acquired adobe systems inc 2005 coldfusion often used data-driven websites intranets also used generate remote services rest services websockets soap web services flash remoting especially well-suited server-side technology client-side ajax coldfusion also handle asynchronous events sms instant messaging via gateway interface available coldfusion mx 7 enterprise edition coldfusion provides number additional features box main features include implementations cfml offer similar enhanced functionality running .net environment image manipulation engine written c featured among things built-in scripting language cfscript plugin modules written java syntax similar html equivalent html element coldfusion tag begins letters cf followed name indicative tag interpreted html e.g cfoutput begin output variables content addition cfscript plugins described cfstudio provided design platform wysiwyg display addition coldfusion cfstudio also supports syntax languages popular backend programming perl addition making backend functionality easily available non-programmer version 4.0 forward particular integrated easily apache web server internet information services versions coldfusion prior 6.0 written using microsoft visual c++ meant coldfusion largely limited running microsoft windows although allaire successfully port coldfusion sun solaris starting version 3.1 allaire company sold macromedia macromedia sold adobe earlier versions robust versions available version 4.0 forward release coldfusion mx 6.0 engine re-written java supported runtime environment easily replaced configuration options runtime environment sun version 6.1 included ability code debug shockwave flash version 3.1 brought port sun solaris operating system cold fusion studio gained live page preview html syntax checker cold fusion moniker renamed simply coldfusion possibly distinguish cold fusion theory version 4.5 brought ability natively invoke java objects execute system commands talk directly java ee server first release macromedia allaire corporation acquisition last legacy coded specific platform january 16 2001 allaire announced pending merger macromedia macromedia continued development released product name coldfusion 5.0 retained name coldfusion remainder version 5 releases prior 2000 edwin smith allaire architect jrun later flash player initiated project codenamed neo project later revealed coldfusion server re-written completely using java made portability easier provided layer security server ran inside java runtime environment june 2002 macromedia released version 6.0 product slightly different name coldfusion mx allowing product associated macromedia brand original branding coldfusion mx completely rebuilt ground based java ee platform coldfusion mx also designed integrate well macromedia flash using flash remoting release coldfusion mx cfml language api released oop interface release coldfusion 7.0 february 7 2005 naming convention amended rendering product name macromedia coldfusion mx 7 codename cfmx7 blackstone cfmx 7 added flash-based xforms-based web forms report builder output adobe pdf well flashpaper rtf excel adobe pdf output also available wrapper html page converting page quality printable document enterprise edition also added gateways provide interaction non-http request services im services sms directory watchers asynchronous execution xml support boosted version include native schema checking coldfusion mx 7.0.1 codename merrimack added support mac os x improvements flash forms rtf support cfreport new cfcproxy feature java/cfc integration coldfusion mx 7.0.2 codenamed mystic included advanced features working adobe flex 2 well improvements cf report builder july 30 2007 adobe systems released coldfusion 8 dropping mx name beta testing codename used scorpio eighth sign zodiac eighth iteration coldfusion commercial product 14,000 developers worldwide active beta process many testers 5,000 adobe systems originally expected coldfusion development team consisted developers based newton/boston massachusetts offshore bangalore india new features cfpdfform tag enables integration adobe acrobat forms image manipulation functions microsoft .net integration cfpresentation tag allows creation dynamic presentations using adobe acrobat connect web-based collaboration solution formerly known macromedia breeze addition coldfusion administrator enterprise version ships built-in server monitoring coldfusion 8 available several operating systems including linux mac os x windows server 2003 additions coldfusion 8 built-in ajax widgets file archive manipulation cfzip microsoft exchange server integration cfexchange image manipulation including automatic captcha generation cfimage multi-threading per-application settings atom rss feeds reporting enhancements stronger encryption libraries array structure improvements improved database interaction extensive performance improvements pdf manipulation merging capabilities cfpdf interactive debugging embedded database support apache derby ecmascript compliant cfscript development coldfusion applications several tools available primarily adobe dreamweaver cs4 macromedia homesite 5.x cfeclipse eclipse others tag updaters available applications update support new coldfusion 8 features coldfusion 9 codenamed centaur released october 5 2009 new features cf9 include coldfusion 10 codenamed zeus released may 15 2012 new improved features available editions standard enterprise developer include limited additional new improved features coldfusion enterprise developer editions include limited lists obtained adobe web site pages describing new features listed first links following list cf10 originally referred codename zeus first confirmed coming adobe adobe max 2010 much prerelease period also commonly referred coldfusion next coldfusion x blogs twitter etc. adobe finally confirmed would coldfusion 10 much 2010 coldfusion product manager adam lehman toured us setting countless meetings customers developers user groups formulate master blueprint next feature set september 2010 presented plans adobe given full support approval upper management first public beta coldfusion 10 released via adobe labs 17 february 2012 coldfusion 11 codenamed splendor released april 29 2014 new improved features available editions standard enterprise developer include coldfusion 11 also removed many features previously identified simply deprecated longer supported earlier releases example cflog tag long offered date time attributes deprecated redundant date time always logged cf11 use would cause cflog tag fail adobe coldfusion 2016 release codenamed raijin also known generically coldfusion 2016 released february 16 2016 new improved features available editions standard enterprise developer include adobe coldfusion 2018 release known generically coldfusion 2018 released july 12 2018 coldfusion 2018 codenamed aether prerelease new improved features available editions standard enterprise developer include august 13 2012 adobe announced new roadmap coldfusion including code names splendor thunder dazzle next two release versions adobe announced new features coldfusion including limited mobile streamlined mobile application development revamped new pdf functionalities enabling enterprise easily integrate social media streams enterprise mobility support responsive multi screen content digital marketing – web mobile social analytics customizable enterprise video portal adobe also announced roadmap upcoming cloud enhancements roadmap projects coldfusion development year 2021 coldfusion generate pdf documents using standard html i.e additional coding needed generate documents print cfml authors place html css within pair cfdocument tags new coldfusion 11 cfhtmltopdf tags generated document either saved disk sent client browser coldfusion 8 introduced also cfpdf tag allow control pdf documents including pdf forms merging pdfs tags however use adobe pdf engine cfdocument uses combination commercial jpedal java pdf library free open source java library itext cfhtmltopdf uses embedded webkit implementation coldfusion originally object-oriented programming language like php versions 3 coldfusion falls category oo languages support multiple inheritance along java smalltalk etc. mx release 6+ coldfusion introduced basic oo functionality component language construct resembles classes oo languages component may contain number properties methods one component may also extend another inheritance components support single inheritance object handling feature set performance enhancing occurred subsequent releases release coldfusion 8 java-style interfaces supported coldfusion components use file extension cfc differentiate coldfusion templates .cfm component methods may made available web services additional coding configuration required method access declared 'remote coldfusion automatically generates wsdl url component manner nowiki http //path/to/components/component.cfc wsdl /nowiki aside soap services offered flash remoting binary format methods declared remote may also invoked via http get post request consider get request shown br invoke component search function passing query strict arguments type invocation well-suited ajax-enabled applications coldfusion 8 introduced ability serialize coldfusion data structures json consumption client coldfusion server automatically generate documentation component navigate url insert appropriate code within component declarations application component introspection available developers coldfusion components access component documentation requires password developer view documentation components known coldfusion server navigating coldfusion url interface resembles javadoc html documentation java classes coldfusion provides several ways implement custom markup language tags i.e included core coldfusion language especially useful providing familiar interface web designers content authors familiar html imperative programming traditional common way using cfml standard cfml page interpreted tag tag name corresponding file name prefixed cf_ example file imap.cfm used tag cf_imap attributes used within tag available attributes scope tag implementation page cfml pages accessible directory calling page via special directory coldfusion web application via cfimport tag calling page latter method necessarily require cf_ prefix tag name second way developments cfx tags using java c++ cfx tags prefixed cfx_ example cfx_imap tags added coldfusion runtime environment using coldfusion administrator jar dll files registered custom tags finally coldfusion supports jsp tag libraries jsp 2.0 language specification jsp tags included cfml pages using cfimport tag standard coldfusion installation allows deployment coldfusion war file ear file deployment standalone application servers macromedia jrun ibm websphere coldfusion also deployed servlet containers apache tomcat mortbay jetty platforms officially support coldfusion leave many features inaccessible coldfusion 10 macromedia jrun replaced apache tomcat coldfusion java ee application coldfusion code mixed java classes create variety applications use existing java libraries coldfusion access underlying java classes supports jsp custom tag libraries access jsp functions retrieving jsp page context getpagecontext prior coldfusion 7.0.1 coldfusion components could used java .net declaring web services however beginning coldfusion mx 7.0.1 coldfusion components used directly within java classes using cfcproxy class recently much interest java development using alternate languages jython groovy jruby coldfusion one first scripting platforms allow style java development coldfusion 8 natively supports .net within cfml syntax coldfusion developers simply call .net assembly without needing recompile alter assemblies way data types automatically translated coldfusion .net example .net datatable → coldfusion query unique feature java ee vendor coldfusion 8 offers ability access .net assemblies remotely proxy without use .net remoting allows coldfusion users leverage .net without installed windows operating system acronym coldfusion markup language cfml coldfusion templates saved disk traditionally given extension .cfm .cfml .cfc extension used coldfusion components original extension dbm dbml stood database markup language talking coldfusion users use acronym cf used numerous coldfusion resources user groups cfugs sites cfmx common abbreviation coldfusion versions 6 7 a.k.a coldfusion mx coldfusion originated proprietary technology based web technology industry standards however becoming less closed technology availability competing products alternative products include alphabetical order argument made coldfusion even less platform-bound raw java ee .net simply coldfusion run top .net app server new atlanta top servlet container java ee application server jrun websphere jboss geronimo tomcat resin server jetty web server etc. theory coldfusion application could moved unchanged java ee application server .net application server march 2013 known issue affecting coldfusion 8 9 10 left national vulnerability database open attack vulnerability identified patch released adobe cf9 cf10 january april 2013 coldfusion vulnerability blamed linode intrusion linode manager control panel website security bulletin hotfix issued adobe week earlier may 2013 adobe identified another critical vulnerability reportedly already exploited wild targets recent versions coldfusion servers web-based administrator api locked vulnerability allows unauthorized users upload malicious scripts potentially gain full control server security bulletin hotfix issued adobe 6 days later april 2015 reported cross-site scripting xss vulnerability adobe coldfusion 10 update 16 coldfusion 11 update 5 allowed remote attackers inject arbitrary web script html however exploitable users authenticated administration panel | [
9217,
519,
2576,
11291,
8739,
5677,
4658,
9780,
575,
8262,
595,
84,
102,
10854,
7274,
9834,
11371,
628,
5255,
6797,
148,
8854,
6819,
8883,
9909,
7862,
190,
5314,
7364,
9926,
6860,
8408,
6385,
10994,
10486,
9467,
1802,
10510,
5395,
1812,
... | Validation |
5,049 | 3 | Adaptive_Domain_Environment_for_Operating_Systems:adaptive domain environment operating systems adeos adaptive domain environment operating systems nanokernel hardware abstraction layer hal hypervisor operates computer hardware operating system runs distinct nanokernels low level layer outer kernel instead intended run several kernels together makes similar virtualization technologies adeos provides flexible environment sharing hardware resources among multiple operating systems among multiple instances single os thereby enabling multiple prioritized domains exist simultaneously hardware adeos successfully inserted beneath linux kernel opening range possibilities smp clustering efficient virtualization patchless kernel debugging real-time systems linux unusually among hals adeos loaded linux loadable kernel module allow another os run along fact adeos developed context rtai real-time application interface modularize separate hal real-time kernel two categories existing solutions enable multiple operating systems run system first simulation-based provides virtual environment run additional operating systems second suggests usage nanokernel layer enable hardware sharing simulation category tools vmware plex86 virtualpc simos also kvm similar adeos rt requires specific virtualization hardware support solutions used users desire run applications foreign base os provide control whatsoever base os user simulation never meant used production environment nanokernel category tools space cache kernel exokernel suggest building miniature hardware management facilities thereafter used build production operating systems problem approach address issue currently existing operating systems user base adeos addresses requirements categories application providing simple layer inserted unmodified running os thereafter provides required primitives mechanisms allow multiple oses share hardware environment adeos attempt impose restrictions hardware ’ usage different oses necessary adeos ’ operation instead actual restriction imposed system administrator system programmer exposes system mismanagement idea behind adeos give back control system administrators programmers adeos implements queue signals time peripheral sends signal different operating systems running machine awakened turn must decide accept handle ignore discard terminate signal signals handled discarded os passed next os chain signals terminated propagated latter stages adeos ensure equal trusted access hardware takes control hardware commands issued different oses also must intrude much different oses ’ normal behavior os encompassed domain total control domain may include private address space software abstractions process virtual memory file-systems etc adeos attempt impose policy usage hardware except needed survival task determining policy left system architect adeos uses interrupt pipe propagate interrupts different domains running hardware domains may prefer first receive hardware interrupts adeos provides mechanism domains access priority interrupt dispatching effect adeos places requesting domain interrupt handler accompanying tables may called interrupt mechanism space terminology first stages interrupt pipeline domains control whether accept ignore discard terminate interrupts different effect controlled differently accepting interrupts normal state domain interrupt mechanism adeos encounters domain accepting interrupts summons interrupt handler set required cpu environment stack content interrupt handler operate correctly os may decide operate number operations including task scheduling os done pipeline proceeds planned propagating interrupts pipeline os domain want interrupted reason asks adeos stall stage domain occupies interrupt pipeline interrupts go pipeline stalled stage occupied domain os done wanting uninterrupted asks adeos install pipeline thereafter interrupts stalled corresponding stage follow route stages pipeline domain discarding interrupts interrupt passes stage occupied domain continues onto stages domain terminates interrupts interrupts terminated propagated latter stages interrupt discarding termination possible os domain recognizes adeos since oses recognize adeos possible create domain serves handler os hence interrupt pipeline stage always precedes handled domain stage may take actions domain adeos order provide handled domain os illusion normal system operation adeos done traversing pipeline checks domains dormant case calls idle task task remains active occurrence next interrupt domains n't dormant restores processor state prior interrupt entering pipeline execution continues left since adeos much hardware dependent many details specific one particular implementations general-purpose operating system resource sharing one main objectives adeos provide environment enables multiple general purpose oses share hardware developing oses usually complicated process sometimes requires extra hardware in-circuit emulators probe hardware os running using adeos os development eased since undesired behavior may controlled appropriate domain handler also provide default domain handler os development developers may controlled direct access hardware meant control adeos kernel-module development domain handlers may developed independently adeos adeos provides way kernel debuggers probers take control linux without modifying linux adeos domains facilities would load normal kernel modules would thereafter request ring-zero domain adeos done may request priority interrupt dispatching interrupt pipeline hence linux gets handle interrupts able intercept interrupts carry requested debugging tasks also extended performance profilers development tools | [
5378,
6150,
6153,
2058,
3082,
7561,
4238,
8466,
7187,
6300,
2212,
6438,
295,
10537,
11180,
7983,
7349,
7733,
823,
9525,
9655,
10809,
2236,
10813,
318,
5697,
5702,
2761,
9931,
7248,
1362,
7507,
4695,
5976,
9176,
2910,
1513,
6128,
10482,
53... | Test |
5,050 | 4 | NeDi:nedi nedi open source software tool discovers maps inventories network devices tracks connected end-nodes contains lot features user-friendly gui managing enterprise networks example mac address mapping/tracking traffic error graphing uptime monitoring correlate collected syslog trap messages customizable notification drawing network maps extensive reporting features device software poe usage disabled interfaces link errors switch usage many modular architecture allows simple integration tools example cacti graphs created purely based discovered information due nedi versatility things like printer resources monitored well development started 2001 paul scherrer institute remo rickli released public gpl2 2003 next decade nedi grew reasonable network management suite help community partners 2014 remo rickli founded nedi consulting providing commercial support development around nedi since major update released every year e.g 1.5 2015 access latest version bought support yearly subscription basis last year version released public gpl3 premium modules included free community edition | [
8582,
3462
] | Test |
5,051 | 1 | IBM_BLU_Acceleration:ibm blu acceleration ibm blu acceleration collection technologies ibm research development labs analytical database workloads blu acceleration integrates number different technologies including in-memory processing columnar data actionable compression uses approximate huffman encoding compress pack data tightly cpu acceleration exploits simd technology provides parallel vector processing data skipping allows data use current active workload ignored term ‘ blu ’ stand anything particular however indirect play ibm traditional corporate nickname big blue ten ibm research development facilities around world filed 25 patents working blink ultra project resulted blu acceleration blu acceleration require indexes aggregates tuning blu acceleration integrated version 10.5 ibm db2 linux unix windows db2 luw uses storage memory constructs i.e. storage groups table spaces buffer pools sql language interfaces administration tools traditional db2 luw databases blu acceleration available ibm power x86 processor architectures blu acceleration second generation technology originated blink project started ibm almaden research center 2006 aimed primarily read-mostly business intelligence bi query processing blink combined scale-out multi-core processors dynamic random-access memory dram store copy data mart completely memory also used proprietary compression techniques algorithms allowed sql queries performed directly compressed data opposed requiring data decompressed processing could take place eventually blink incorporated two ibm products ibm smart analytics optimizer db2 z/os mainframe version db2 released november 2010 informix warehouse accelerator released march 2011 blu acceleration optimized accessing data ram however even data size grows extent longer fits ram intermediate results may spill disk blu acceleration perfected integrated db2 collaboration db2 product development ibm systems optimization competency center ibm research—this collaboration resulted addition columnar processing broader sql support i/o cpu efficiencies integration db2 sql compiler query optimizer storage layer four main advances part blu acceleration design blu acceleration optimized accessing data ram however even data size grows extent longer fits ram intermediate results may spill disk order-preserving frequency-based compression referred actionable compression blu acceleration allows wide variety comparative operations performed without decompression—and efficient use cpu memory cache registers actionable compression values appear frequently compressed higher level values appear less often actionable compression uses entropy encoding algorithm lossless data compression developed david a. huffman ph.d. student mit base offset coding another compression optimization technique used blu acceleration offset coding useful numeric data instead trying compress values 100 101 102 103 example db2 store single value 100 offsets value 1 2 3 etc. similar way db2 compresses index record ids rids —one three autonomic index compression algorithms db2 dynamically apply indexes blu acceleration values compressed order preserved means compared compressed.this allows common comparisons sql predicates performed encoded values without needing decompress data thereby accelerating evaluations reducing memory requirements lowering processing needs queries runtime. encoded data packed tightly possible collection bits equal register width cpu server used results fewer i/os data smaller better memory utilization data stored memory fewer cpu cycles data register aligned data skipping enables db2 detect ranges column values needed satisfy query avoid reading pages containing values disk data skipping utilizes secondary object called synopsis table tiny column-organized table created maintained automatically blu acceleration keeps metadata describes minimum maximum range data values chunks data 1,000 records table metadata automatically maintained insert update delete operations allows db2 blu acceleration automatically detect large sections data needed query processing effectively ignore conceptually blu acceleration ‘ data skipping similar zone map technology found puredata system analytics family however unlike zone maps metadata stored synopsis table ‘ tied particular page extent boundary―instead ‘ tied specific chunk data records data skipping deliver order magnitude savings across compute resources cpu ram i/o blu acceleration takes advantage single instruction multiple data simd processing available hardware used exploiting simd instructions low-level specific cpu instructions blu acceleration perform operation multiple points data simultaneously consequently db2 blu acceleration use single simd instruction get results multiple data elements example perform equality predicate processing —provided register db2 also put 128 bits simd register evaluate data single instruction level performance achieved ultimately determined hardware resources blu acceleration work said even server ‘ simd enabled blu acceleration emulate simd hardware smid software using bitmasking achieve parallelism deliver benefits simd offer addition blu acceleration engineered majority memory access occurs cpu cache accessing data ram operating almost exclusively data cpu cache ram blu acceleration minimizes latency able keep cpus busy designed process data substantially larger memory in-memory speeds blu acceleration prefetches streams data processing engine—advancing beyond system memory in-cpu memory optimization uses specialized in-memory optimized columnar prefetching algorithm determine milliseconds advance data loaded ram every algorithm designed minimize access ram maximize processing time l3 l2 caches order magnitude faster ram. | [
1801,
10505,
1037,
11024,
3219,
8340,
4630,
2456,
10137,
4255,
9634,
2089,
4781,
10413,
10675,
9911,
6850,
2901,
7767,
2775,
2780,
734,
3045,
10734,
499,
8052,
6775,
2168,
1146
] | None |
5,052 | 4 | Dialed_Number_Identification_Service:dialed number identification service dialed number identification service dnis service sold telecommunications companies corporate clients identifies originally dialed telephone number inbound call client may use information call routing internal destinations activation special call handling dnis service telephone company sends sequence typically four ten digits call setup direct inward dial service also provides dnis example company may different toll-free telephone number product line sells multilingual customer support call center handling calls multiple product lines corporate telephone system receives call analyzes dnis signaling may play appropriate recorded greeting interactive voice response ivr systems dnis used routing information dispatching purposes determine script service activated based number dialed reach ivr platform dnis commonly provided 800 900 services | [
8192,
11170
] | Test |
5,053 | 9 | Domain-specific_entertainment_language:domain-specific entertainment language domain-specific entertainment languages group domain-specific languages used describe computer games environments potentially used entertainment video music | [
7144,
11227,
9926
] | Test |
5,054 | 5 | Firefox_3.6:firefox 3.6 mozilla firefox 3.6 version firefox web browser released january 2010 release main improvement firefox 3.5 improved performance due speed improvements tracemonkey javascript engine uses gecko 1.9.2 engine compared 1.9.1 ff 3.5 improves compliance web standards codenamed namoroka version support x bitmap images dropped release marked beginning new development cycle firefox well receiving major updates browser also received minor updates new features allow users receive new features quickly dawn new roadmap reflected changes superseded firefox 4 released next year although ff 3.6 prolonged period use version 4 noted user interface changes firefox 3.6 last major version official firefox release run powerpc-based macintoshes see tenfourfox much-more-recent version firefox powerpc-based computers running mac os x soon 4 much less weight given major version numbers 6 numbers used september year 4 5 6 7 8 9 compared 3 nearly decade firefox development 1 2 3 firefox versions 4 9 reached end-of-life status mozilla continued supporting firefox 3.6 security updates coinciding proposal cater enterprise users optional extended support releases beginning 2012 based upon firefox 10 mozilla discontinued support firefox 3.6 april 24 2012 automatic update firefox 12 pushed compatible devices june 2012 development version started december 1 2008 first alpha version 3.6 released august 7 2009 first beta version released october 30 followed beta 2 november 10 beta 3 november 17 beta 4 november 26 beta 5 december 17 release candidate 1 released january 8 2010 followed release candidate 2 january 17 final version released january 21 2010 firefox 3.6.2 released march 23 2010 followed version 3.6.3 april 1 closed bugs aslr dep handling found pwn2own contest 2010 firefox developers created new feature called lorentz named lorentz national park preview version lorentz firefox 3.6.3plugin1 made available april 8 2010 betas firefox 3.6.4 made available starting april 20 2010 firefox 3.6.4 released june 22 2010 windows linux versions incorporate out-of-process plug-ins oopp isolates execution plug-ins adobe flash apple quicktime microsoft silverlight default separate process significantly reduces number firefox crashes experienced users watching online videos playing games user simply refresh page continue mozilla states 30 browser crashes caused third-party plugins support plug-ins default oopp mac os x platform become available firefox 4 firefox 3.6.6 lengthens amount time plug-in allowed unresponsive point plug-in quits firefox 3.6.7 security stability update fixed several issues firefox 3.6.8 security update released mere three days 3.6.7 fix another security fault firefox 3.6.9 addition fixing security stability issues introduced support codice_1 http response header help prevent clickjacking firefox 3.6.10 security stability update fixed several issues firefox 3.6.11 security stability update fixed several issues firefox 3.6.12 security update fixed critical security issue firefox 3.6.13 security stability update fixed several issues firefox 3.6.14 security stability update fixed several issues firefox 3.6.15 stability update fixed java applets issue firefox 3.6.16 security update blacklisted invalid https certificates firefox 3.6.17 security stability update fixed several issues firefox 3.6.18 security stability update fixed several issues firefox 3.6.19 stability update fixed several issues firefox 3.6.20 security stability update fixed several issues firefox 3.6.21 security update blacklisted compromised https certificate firefox 3.6.22 security update revoked ssl certificates staten der nederlanden due fraudulent ssl certificate issuance well fixing error .gov.uk domain names firefox 3.6.23 security stability update fixed several issues firefox 3.6.24 security stability update fixed several issues firefox 3.6.25 security stability update fixed several issues firefox 3.6.26 security stability update fixed several issues firefox 3.6.27 security update fixed several issues firefox 3.6.28 security stability update fixed several issues new features firefox 3.6 include mozilla discontinued support firefox 3.6 april 24 2012 27 months support made longest supported version firefox even longer firefox 2 26 months total support underlying gecko 1.9.2 engine continued used updates camino | [
6657,
9736,
2579,
6171,
9757,
7713,
3110,
10791,
9770,
559,
2095,
4661,
3639,
5176,
9275,
64,
9281,
5707,
10834,
6231,
8281,
6747,
11363,
1642,
9834,
10860,
115,
9843,
3191,
119,
4728,
637,
1664,
6791,
6797,
11418,
10910,
8351,
7340,
1713... | Test |
5,055 | 4 | Generally_Accepted_Privacy_Principles:generally accepted privacy principles generally accepted privacy principles gapp framework intended assist chartered accountants certified public accountants creating effective privacy program managing preventing privacy risks framework developed joint consultation canadian institute chartered accountants cica american institute certified public accountants aicpa aicpa/cica privacy task force gapp framework previously known aicpa/cica privacy framework founded single privacy principle personally identifiable information must collected used retained disclosed compliance commitments entity privacy notice criteria set gapp issued aicpa/cica privacy objective supported ten main principles seventy objectives associated measurable criteria privacy defined generally accepted privacy principles rights obligations individuals organizations respect collection use retention disclosure disposal personal information | [] | Test |
5,056 | 3 | National_Interop:national interop national interop systems integration company earliest experience radio ip technologies deployed public safety communications company founded public safety personnel one principals company testified u.s. senate 2007 applicability radio ip roip alternative expensive statewide interoperable radio systems proposed funding federal government costs us 1b per state company designed implemented roip-powered system air evac lifeteam spanning 14 states 80+ radio towers 24x7 9-1-1 type dispatch center well numerous smaller roip systems national interop works roip technologies may best suited particular public safety application | [] | Validation |
5,057 | 4 | Windows_Live_OneCare:windows live onecare windows live onecare previously windows onecare live codenamed a1 computer security performance enhancement service developed microsoft windows core technology onecare multi-platform rav reliable anti-virus microsoft purchased gecad software srl 2003 subsequently discontinued software available annual paid subscription could used three computers 18 november 2008 microsoft announced windows live onecare would discontinued 30 june 2009 instead offering users new free anti-malware suite called microsoft security essentials available however virus definitions support onecare would continue subscription expires end-of-life announcement microsoft noted windows live onecare would upgraded work windows 7 would also work windows xp mode windows live onecare entered beta state summer 2005 managed beta program launched public beta located betaplace microsoft former beta delivery system 31 may 2006 windows live onecare made official debut retail stores united states beta version windows live onecare 1.5 released early october 2006 microsoft version 1.5 released manufacturing 3 january 2007 made available public 30 january 2007 4 july 2007 beta testing started version 2.0 final version released 16 november 2007 microsoft acquired komoku 20 march 2008 merged computer security software windows live onecare windows live onecare 2.5 build 2.5.2900.28 final released 3 july 2008 day microsoft also released windows live onecare server 2.5 windows live onecare features integrated anti-virus personal firewall backup utilities tune-up utility integrated functionality windows defender malware protection future addition registry cleaner considered added significant customer advantages functionality version 2 added features multi-pc home network management printer sharing support start-time optimizer proactive fixes recommendations monthly reports centralized backup online photo backup windows live onecare built ease-of-use designed home users onecare also attempts minimal interface lessen user confusion resource use adds icon notification area tells user glance status system health using three alert colors green good yellow fair red risk version 1.5 onecare compatible 32 bit versions windows xp windows vista version 2 onecare supports 64 bit compatibility vista version 2.5 microsoft released windows live onecare server supports windows server 2008 standard 64-bit windows small business server 2008 standard premium editions edition onecare operates safe mode windows live onecare support windows 7 development discontinued replaced microsoft security essentials windows live onecare requires users activate product wish continue using free trial period 90 days valid windows live id product activated grey message bar top program disappears subscription remains active 1 year date activation windows live onecare require operating system checked windows genuine advantage windows live onecare protection plus security component onecare suite consists three parts windows live onecare 1.5 onwards also monitors internet explorer 7 8 security settings ensures automatic website checking feature phishing filter enabled windows live onecare performance plus component performs monthly pc tune-up related tasks windows live onecare backup restore component aids backing important files files backed various recordable media external hard disks cds dvds restoring files entirety subset also restored networked computer long running onecare well backup restore component supports backup software features incremental backups scheduling windows live onecare criticized users competing security software companies microsoft acquisition gecad rav core technology onecare subsequent discontinuation product deprived gnu/linux platform others one leading virus scanning tools e-mail servers bringing microsoft ultimate intentions question 26 january 2006 windows live onecare criticized foundstone division competing mcafee anti-virus integrated firewall default white lists allow java applications digitally signed software bypass user warnings since neither applications carry assurances security flaws written malicious intent microsoft since responded criticism justifying decision java applications widely used third party applications popular trusted program among users highly unusual malware signed windows live onecare also criticized lack adherence industry firewall standards concerning intrusion detection tests conducted agnitum developers outpost firewall shown onecare failing detect trojans malware hijack applications already resident infected machine february 2007 first windows vista anti-virus product testing virus bulletin magazine sister company sophos developers sophos anti-virus found windows live onecare failed detect 18.6 viruses fifteen anti-virus products tested pass virus bulletin vb100 test anti-virus product detect 100 viruses av-comparatives also released results placed windows live onecare last testing seventeen anti-virus products response jimmy kuo microsoft security research response msrr team pledged add truly important actively spread malware soon possible test detection numbers get better better malware par majors arena also expressed confidence improvements soon majors need catch us april 2008 windows live onecare passed vb100 test windows vista sp1 business edition august 2008 windows live onecare placed 14th 16 anti-virus products on-demand virus detection rates hand may 2009 windows live onecare placed 2nd proactive/retrospective performance test conducted av-comparatives av-comparatives.org test issuer denotes false alarms good achievement publisher also points false positives cause much harm genuine infections furthermore anti-virus scanners prone false alarms essentially achieve higher detection scores | [
2049,
2563,
537,
7713,
550,
10790,
5673,
8753,
2046,
569,
5178,
9279,
2118,
10828,
4704,
8816,
10872,
6797,
1172,
10392,
2213,
5799,
3243,
1708,
704,
10433,
2244,
4814,
9423,
10451,
6364,
5860,
10986,
10987,
5356,
8943,
9971,
1273,
254,
9... | Train |
5,058 | 3 | Macintosh_II_family:macintosh ii family macintosh ii family personal computers designed manufactured sold apple computer inc. 1987 1993 macintosh ii initial model representing high-end macintosh line time course next six years seven models produced culminating short-lived macintosh iivi macintosh iivx models apple retired macintosh ii name moved motorola 68040 processors centris quadra names used instead unlike prior macintosh models all-in-one designs macintosh ii models modular systems include built-in monitors expandable beginning macintosh ii culminating macintosh iifx macintosh ii family apple high-end line 1987 introduction motorola 68040-based macintosh quadra computers 1991 expansion provided way nubus become standard expansion bus entire macintosh line almost decade macintosh ii first support color displays first apart macintosh xl support screen resolution larger 512x384 macintosh ii also first use motorola 68000 series processor motorola 68000 except original macintosh ii launched line motorola 68020 clocked 16 mhz exclusively used motorola 68030 microprocessor even motorola 68040 introduced apple would eventually adopt '040 introduction quadra 700 900 positioning models high-end workstation-class machines graphics scientific computing positioning macintosh ii family mainstream desktop computer macintosh ii series lifespan rose become among powerful personal computers available macintosh ii series replaced macintosh centris quadra macintosh lc performa families continued use ii 68030 technology long 68040 introduced powerbook continued use '030 power macintosh era | [
9732,
7697,
4114,
6165,
11289,
7706,
8222,
1057,
6183,
1576,
4139,
7211,
8253,
576,
1090,
8783,
4180,
10838,
10840,
9312,
9826,
7269,
8806,
6258,
10357,
7286,
4220,
10365,
10878,
6783,
7299,
4741,
7305,
8842,
6283,
7824,
147,
7830,
6807,
... | None |
5,059 | 9 | Local_variable:local variable computer science local variable variable given local scope local variable references function block declared override variable name larger scope programming languages two levels visibility local variables contrasted global variables hand many algol-derived languages allow number nested levels visibility private variables functions constants types hidden within either nested blocks nested functions local variables fundamental procedural programming generally modular programming variables local scope used avoid issues side-effects occur global variables local variables may lexical dynamic scope though lexical static scoping far common lexical scoping lexical scope also called static scoping static scope variable name scope certain block scope program text block definition within block text variable name exists bound variable value outside block text variable name exist contrast dynamic scoping dynamic scope variable name scope certain block scope block functions transitively called block except overridden another declaration block ends variable name exist languages like perl common lisp allow programmer choose static dynamic scoping defining redefining variable examples languages use dynamic scoping include logo emacs lisp shell languages bash dash mirbsd korn shell mksh local declaration languages provide lexically scoped local variables languages local variables automatic variables stored call stack directly means recursive function calls local variables instance function given distinct addresses hence variables scope declared written read without risk side-effects functions outside block declared programming languages employ call value semantics provide called subroutine local copy arguments passed languages local parameters treated local variables within subroutine contrast call reference call name semantics allow parameters act aliases values passed arguments allowing subroutine modify variables outside scope special type local variable called static local available many mainstream languages including c/c++ visual basic vb.net allows value retained one call function another – static variable local scope case recursive calls function also access single statically allocated variable languages static variables declared special storage class keyword e.g. codice_1 static locals global functions lifetime static global variables value remains memory life program function scope global scope automatic local variables distinct usages codice_1 keyword several different meanings various languages perl supports dynamic lexically-scoped local variables keyword codice_3 used define local dynamically-scoped variables codice_4 used local lexically-scoped variables since dynamic scoping less common today perl documentation warns codice_3 n't people think “ local ” instead codice_3 keyword gives temporary dynamically-scoped value global package variable lasts end enclosing block however variable visible function called within block create lexically-scoped local variables use codice_4 operator instead understand works consider following code output happens since global variable modified new temporary local meaning inside global value restored upon leaving scope using codice_4 case instead codice_3 would printed 1 three times since case codice_10 variable would limited static scope function seen randal l. schwartz tom phoenix argue operator codice_3 different name like codice_12 ruby language inspired also perl case notation made simpler global variable name must preceded sign like codice_13 local variable simply sign front name like codice_14 perl scalar values front note ruby provides built-in support statically-scoped local variables like perl codice_4 dynamically-scoped local variables like perl codice_3 least one library ruby provides dynamically-scoped variables | [
512,
1152,
2048,
2817,
3462,
8582,
8587,
2062,
655,
10510,
7445,
2327,
2204,
797,
9245,
3871,
5537,
4777,
5165,
5040,
10555,
2620,
6717,
3904,
6594,
2627,
8644,
2501,
8262,
10571,
6349,
847,
10584,
10075,
7398,
6633,
7147,
8822,
2045
] | None |
5,060 | 4 | Non-interference_(security):non-interference security non-interference strict multilevel security policy model first described goguen meseguer 1982 amplified 1984 simple terms computer modeled machine inputs outputs inputs outputs classified either low low sensitivity highly classified high sensitive viewed uncleared individuals computer non-interference property sequence low inputs produce low outputs regardless high level inputs low uncleared user working machine respond exactly manner low outputs whether high cleared user working sensitive data low user able acquire information activities high user let formula_1 memory configuration let formula_2 formula_3 projection memory formula_1 low high parts respectively let formula_5 function compares low parts memory configurations i.e. formula_6 iff formula_7 let formula_8 execution program formula_9 starting memory configuration formula_1 terminating memory configuration formula_11 definition non-interference deterministic program formula_9 following formula_13 strict policy computer system covert channels may comply say bell–lapadula model comply non-interference reverse could true reasonable conditions system labelled files etc except classified information startup exceptions noted however non-interference shown stronger non-deducibility strictness comes price difficult make computer system property may one two commercially available products verified comply policy would essentially simple switches one-way information filters although could arranged provide useful behaviour computer time=0 high i.e. classified information within low users create high information subsequent time=0 so-called write-up allowed many computer security policies computer legally leak high information low user still said comply non-interference policy low user able learn anything high user activities learn high information created means actions high users von oheimb 2004 computer systems comply bell-lapadula model suffer problem since explicitly forbid read-up consequently computer system complies non-interference necessarily comply bell-lapadula model thus bell–lapadula model non-interference model incomparable bell-lapadula model stricter regarding read-up non-interference model stricter respect covert channels legitimate multilevel security activities treat individual data records e.g. personal details sensitive allow statistical functions data e.g. mean total number released widely achieved non-interference machine | [
3616,
4420,
9061,
3624,
3924,
10968,
10170
] | Test |
5,061 | 1 | Recursive_join:recursive join recursive join operation used relational databases also sometimes called fixed-point join compound operation involves repeating join operation typically accumulating records time repetition makes change results compared results previous iteration example database family relationships searched record person mother father fields recursive join would one way retrieve person known ancestors first person direct parents records would retrieved parents information would used retrieve grandparents records new records found example many real cases repetition involves single database table specifically recursive self-join recursive joins time-consuming unless optimized indexing addition extra key fields techniques recursive joins highly characteristic hierarchical data therefore become serious issue xml data xml operations determining whether one element contains another extremely common recursive join perhaps obvious way implement xml data stored relational database standard way define recursive joins standard way recursive common table expressions database management systems support recursive ctes include microsoft sql server oracle postgresql others | [
10340,
11030,
10137,
8539,
479
] | Test |
5,062 | 6 | Romeo_file_system:romeo file system romeo extension iso 9660 file system optical media cd-roms developed adaptec allows use long filenames 128 characters however romeo backwards compatible iso 9660 discs authored using file system read windows 9x windows nt platforms thus allowing exchange files operating systems non-roman characters involved arabic japanese cyrillic example ü becomes ³ | [
5413,
7720,
1801,
8075,
6062,
5231,
7342,
8110,
188,
8976,
5816,
5596
] | Test |
5,063 | 5 | Gordano_Messaging_Suite:gordano messaging suite gms gms commercial mail groupware server developed gordano ltd runs windows linux solaris aix originally called ntmail first commercially available mail windows platform products rebranded gordano messaging suite august 2002 reflect support additional hardware platforms operating systems features gms include encrypted access using ssl anti-virus anti-spam protection over-the-air handheld synchronization web based webmail calendaring interfaces plugin microsoft outlook allowing microsoft exchange style functionality administration performed web browser using http native support full groupware features exists clients reviews version 15 | [
2208,
471,
2748,
10248,
76,
6797,
5230,
7983,
11500,
499,
5875,
9909,
823,
412,
4439,
1399
] | Test |
5,064 | 9 | Matt_Kaufmann:matt kaufmann matt kaufmann senior research scientist department computer sciences university texas austin united states recipient 2005 acm software system award along robert s. boyer j strother moore work boyer-moore theorem prover | [
11488,
11083,
9492,
4791
] | Test |
5,065 | 2 | Position-independent_code:position-independent code computing position-independent code pic position-independent executable pie body machine code placed somewhere primary memory executes properly regardless absolute address pic commonly used shared libraries library code loaded location program address space overlap uses memory example shared libraries pic also used older computer systems lacking mmu operating system could keep applications away even within single address space mmu-less system position-independent code executed memory address without modification differs absolute code must loaded specific location function correctly load-time locatable ltl code linker program loader modifies program execution run particular memory location generating position-independent code often default behavior compilers may place restrictions use language features disallowing use absolute addresses position-independent code use relative addressing instructions refer directly specific memory addresses sometimes execute faster replacing equivalent relative-addressing instructions may result slightly slower execution although modern processors make difference practically negligible early computers ibm 701 april 29 1952 ibm system/360 april 7 1964 code position-dependent program built loaded run particular address multitasking operating system allowed multiple jobs run using separate programs time operations scheduled two concurrent jobs would run programs required load addresses example payroll program accounts receivable program built run address 32k could run time ibm dos/360 1966 ability relocate programs loading sometimes multiple versions program maintained built different load address special class programs called self-relocating programs coded relocate loading ibm os/360 1966 relocated executable programs loaded memory one copy program required loaded program could moved way comparison early segmented systems burroughs mcp burroughs b5000 1961 multics 1964 paging systems ibm tss/360 1967 base bounds systems gecos ge 625 exec univac 1107 code inherently position-independent since addresses program relative current segment rather absolute position-independent code developed eliminate restrictions non-segmented systems position-independent program could loaded address memory invention dynamic address translation function provided mmu originally reduced need position-independent code every process could independent address space range addresses however multiple simultaneous jobs using code created waste physical memory two jobs run entirely identical programs dynamic address translation provides solution allowing system simply map two different jobs address 32k bytes real memory containing single copy program different programs may share common code example payroll program accounts receivable program may contain identical sort subroutine shared module shared library form shared module gets loaded mapped two address spaces procedure calls inside shared library typically made small procedure linkage table stubs call definitive function notably allows shared library inherit certain function calls previously loaded libraries rather using versions data references position-independent code usually made indirectly global offset tables gots store addresses accessed global variables one got per compilation unit object module located fixed offset code although offset known library linked linker links modules create shared library merges gots sets final offsets code necessary adjust offsets loading shared library later position independent functions accessing global data start determining absolute address got given current program counter value often takes form fake function call order obtain return value stack x86 special register powerpc sparc mips probably least risc processors esa/390 stored predefined standard register processor architectures motorola 68000 motorola 6809 wdc 65c816 knuth mmix arm x86-64 allow referencing data offset program counter specifically targeted making position-independent code smaller less register demanding hence efficient dynamic-link libraries dlls microsoft windows use variant e8 call instruction call near relative displacement relative next instruction instructions need fixed dll loaded global variables e.g arrays string literals virtual function tables expected contain address object data section resp code section dynamic library therefore stored address global variable needs updated reflect address dll loaded dynamic loader calculates address referred global variable stores value global variable triggers copy-on-write memory page containing global variable pages code pages global variables contain pointers code global data remain shared processes operation needs done os load dynamic library arbitrary address windows vista later versions windows relocation dlls executables done kernel memory manager shares relocated binaries across multiple processes images always relocated preferred base addresses achieving address space layout randomization aslr versions windows prior vista require system dlls prelinked non-conflicting fixed addresses link time order avoid runtime relocation images runtime relocation older versions windows performed dll loader within context process resulting relocated portions image longer shared processes handing dlls windows differs earlier os/2 procedure derives os/2 presents third alternative attempts load dlls position-independent dedicated shared arena memory maps loaded users dll able use in-memory copy multics procedure conceptually code segment linkage segment code segment contains code linkage section serves template new linkage segment pointer register 4 pr4 points linkage segment procedure call procedure saves pr4 stack loading pointer callee linkage segment procedure call uses indirect pointer pair flag cause trap first call dynamic linkage mechanism add new procedure linkage segment known segment table kst construct new linkage segment put segment numbers caller linkage section reset flag indirect pointer pair ibm s/360 time sharing system tss/360 tss/370 procedure may read-only public csect writable private prototype section psect caller loads v-constant routine general register 15 gr15 copies r-constant routine psect 19th word save area pointed gr13 dynamic loader load program pages resolve address constants first page fault position-independent executables pie executable binaries made entirely position-independent code systems run pic executables reasons used pie binaries used security-focused linux distributions allow pax exec shield use address space layout randomization prevent attackers knowing existing executable code security attack using exploits rely knowing offset executable code binary return-to-libc attacks apple macos ios fully support pie executables versions 10.7 4.3 respectively warning issued non-pie ios executables submitted approval apple app store hard requirement yet non-pie applications rejected openbsd pie enabled default architectures since openbsd 5.3 released support pie statically linked binaries executables codice_1 codice_2 directories added near end 2014 beginning fedora 23 fedora maintainers decided build packages pie enabled default ubuntu 17.10 pie enabled default across architectures gentoo new profiles support pie default android enabled support pies jelly bean removed non-pie linker support lollipop | [
1152,
1922,
8066,
8966,
6664,
6921,
9610,
9739,
9996,
6797,
10508,
11153,
4884,
7702,
7071,
1952,
6821,
1702,
7595,
6829,
9646,
7471,
2224,
5040,
7983,
11188,
823,
5176,
3386,
1724,
10176,
9921,
3010,
1219,
6596,
7234,
4424,
4553,
5065,
1... | Test |
5,066 | 7 | Apache_Drill:apache drill apache drill open-source software framework supports data-intensive distributed applications interactive analysis large-scale datasets drill open source version google dremel system available infrastructure service called google bigquery one explicitly stated design goal drill able scale 10,000 servers able process petabytes data trillions records seconds drill apache top-level project drill supports variety nosql databases file systems including alluxio hbase mongodb mapr-db hdfs mapr-fs amazon s3 azure blob storage google cloud storage swift nas local files single query join data multiple datastores example join user profile collection mongodb directory event logs hadoop drill datastore-aware optimizer automatically restructures query plan leverage datastore internal processing capabilities addition drill supports data locality drill datastore nodes apache drill 1.9 added dynamic user defined functions apache drill 1.11 added cryptographic-related functions pcap file format support drill primarily focused non-relational datastores including apache hadoop text files nosql cloud storage following datastores supported new datastore added developing storage plugin drill schema-free json data model enables query non-relational datastores in-situ papers influenced birth design partial list | [
10377,
11323,
8460,
1935,
1296,
6161,
7567,
1047,
8217,
11161,
6555,
8860,
3877,
10661,
11303,
1327,
7983,
4919,
5047,
4538,
1851,
6074,
6458,
7485,
7742,
9789,
7233,
6338,
4419,
11201,
3269,
1222,
1991,
4294,
6345,
7750,
8139,
4429,
4944,
... | Test |
5,067 | 2 | Package_manager:package manager package manager package-management system collection software tools automates process installing upgrading configuring removing computer programs computer operating system consistent manner package manager deals packages distributions software data archive files packages contain metadata software name description purpose version number vendor checksum list dependencies necessary software run properly upon installation metadata stored local package database package managers typically maintain database software dependencies version information prevent software mismatches missing prerequisites work closely software repositories binary repository managers app stores package managers designed eliminate need manual installs updates particularly useful large enterprises whose operating systems based linux unix-like systems typically consisting hundreds even tens thousands distinct software packages software package archive file containing computer program well necessary metadata deployment computer program source code compiled built first package metadata include package description package version dependencies packages need installed beforehand package managers charged task finding installing maintaining uninstalling software packages upon user command typical functions package management system include computer systems rely dynamic library linking instead static library linking share executable libraries machine instructions across packages applications systems complex relationships different packages requiring different versions libraries results challenge colloquially known dependency hell microsoft windows systems also called dll hell working dynamically linked libraries good package management vital systems framework system openstep attempt solving issue allowing multiple versions libraries installed simultaneously software packages specify version linked system administrators may install maintain software using tools package management software example local administrator may download unpackaged source code compile install may cause state local system fall synchronization state package manager database local administrator required take additional measures manually managing dependencies integrating changes package manager tools available ensure locally compiled packages integrated package management distributions based .deb .rpm files well slackware linux checkinstall recipe-based systems gentoo linux hybrid systems arch linux possible write recipe first ensures package fits local package database particularly troublesome software upgrades upgrades configuration files since package managers least unix systems originated extensions file archiving utilities usually either overwrite retain configuration files rather applying rules exceptions usually apply kernel configuration broken render computer unusable restart problems caused format configuration files changes instance old configuration file explicitly disable new options disabled package managers debian dpkg allow configuration installation situations desirable install packages default configuration overwrite configuration instance headless installations large number computers kind pre-configured installation also supported dpkg give users control kinds software allowing installed system sometimes due legal convenience reasons distributors side software often downloaded number software repositories user interacts package management software bring upgrade customary present user list actions executed usually list packages upgraded possibly giving old new version numbers allow user either accept upgrade bulk select individual packages upgrades many package managers configured never upgrade certain packages upgrade critical vulnerabilities instabilities found previous version defined packager software process sometimes called version pinning instance advanced package management features offer cascading package removal packages depend target package packages target package depends also removed although commands specific every particular package manager large extent translatable package managers offer similar functions arch linux pacman/rosetta wiki offers extensive overview package managers like dpkg existed early 1994 linux distributions oriented binary packages rely heavily package management systems primary means managing maintaining software mobile operating systems android linux-based ios unix-like windows phone rely almost exclusively respective vendors app stores thus use dedicated package management systems package manager often called install manager lead confusion package managers installers differences include software configuration management systems treat building software deploying software separate independent steps build automation utility typically takes human-readable source code files already computer automates process converting binary executable package computer later package manager typically running computer downloads pre-built binary executable packages internet installs however kinds tools many commonalities example dependency graph topological sorting used package manager handle dependencies binary components also used build manager handle dependency source components example many makefiles support building executables also installing codice_1 example every package manager portage sorcery homebrew etc supports converting human-readable source code binary executables installing tools maak a-a-p designed handle building deployment used either build automation utility package manager also known binary repository manager software tool designed optimize download storage binary files artifacts packages used produced software development process package managers aim standardize way enterprises treat package types give users ability apply security compliance metrics across artifact types universal package managers referred center devops toolchain common universal package managers sonatype nexus repository manager jfrog artifactory inedo proget package manager relies format metadata packages manage package managers need groups files bundled specific package manager along appropriate metadata dependencies often core set utilities manages basic installation packages multiple package managers use utilities provide additional functionality example yum relies rpm backend yum extends functionality backend adding features simple configuration maintaining network systems another example synaptic package manager provides graphical user interface using advanced packaging tool apt library turn relies dpkg core functionality alien program converts different linux package formats supporting conversion linux standard base lsb compliant .rpm packages .deb stampede .slp solaris .pkg slackware .tgz .txz .tbz .tlz packages mobile operating systems google play consumes android application package apk package format windows store uses appx xap formats google play windows store eponymous package managers nature free open source software packages similar compatible licenses available use number operating systems packages combined distributed using configurable internally complex packaging systems handle many permutations software manage version-specific dependencies conflicts packaging systems free open source software also released free open source software one typical difference package management proprietary operating systems mac os x windows free open source software linux free open source software systems permit third-party packages also installed upgraded mechanism whereas package managers mac os x windows upgrade software provided apple microsoft respectively exception third party drivers windows ability continuously upgrade third party software typically added adding url corresponding repository package management configuration file beside system-level application managers add-on package managers operating systems limited capabilities programming languages developers need latest libraries contrast system-level package managers application-level package managers focus small part software system typically reside within directory tree maintained system-level package manager however might case package managers deal programming libraries leading possible conflict package managers may claim file might break upgrades ian murdock commented package management single biggest advancement linux brought industry blurs boundaries operating system applications makes easier push new innovations ... marketplace ... evolve os | [
2050,
6154,
6158,
8209,
8213,
10270,
2095,
4150,
8248,
59,
8262,
4174,
6227,
2134,
89,
4192,
8289,
6244,
6257,
2168,
8319,
10368,
2178,
8326,
10382,
2195,
10394,
8347,
6301,
4279,
6333,
190,
10433,
2245,
4302,
6352,
2259,
10451,
4309,
636... | Validation |
5,068 | 3 | Diamond_Mine_(video_game):diamond mine video game diamond mine video game first published mrm software acorn electron bbc micro home computers 1984 reissued blue ribbon 1985 ported systems 1985 1986 blue ribbon also released sequel diamond mine ii time games similar 1982 arcade game anteater maze design limited pipe length non-stop movement make first game original diamond mine ii could considered anteater clone aim game guide pipe maze-like mine collect diamonds avoiding hitting walls patrolling monsters player set length pipe level pipe started moving stop retracted section pipe lost pipe hit monster hits wall twice amount pipe lost diamonds placed sporadically maze way kill monsters sequel similar fundamental changes game play pipe pause retracted time without penalty walls hit monsters killed touching end pipe move pipe retracted maze also populated regular diamonds resemble dots pac-man maze | [
9006,
3039
] | Test |
5,069 | 4 | Dr._Web:dr web dr.web software suite developed russian anti-malware company doctor web first released 1992 became first anti-virus service russia company also offers anti-spam solutions used yandex scan e-mail attachments also features add-on major browsers checks links online version dr web dr.web withdrawn av tests virus bulletin vb100 around 2008 stating believe virus scans viruses different subject real world malware attacks staunch anti-adware policy led software developers complaints dr web treated virus free applications virus receive responds dr web try contact dr web resolve issue dr.web discovered trojan backdoor.flashback variant affected 600,000 macs dr.web discovered trojan.skimer.18 trojan works like atm software skimmer trojan intercept transmit bank card information processed atms well data stored card pin code dr.web discovered ransomware linux.encoder.1 affected 2,000 linux users linux.encoder.2 discovered later turned earlier version ransomware doctor web received threat supposedly trojan writers criminal organization sponsoring malware development promotion march 31 two arson attacks carried igor daniloff anti-virus laboratory st. petersburg company received second threat doctor web released statement company considers duty provide users ultimate protection encroachments cybercriminals consequently efforts aimed identifying studying atm threats atm shield | [
2049,
7809,
131,
5891,
1925,
1417,
3981,
3342,
6797,
10637,
4374,
1052,
156,
6431,
2208,
2721,
5924,
2213,
550,
1318,
6823,
2601,
8614,
2859,
3243,
4013,
6699,
7983,
8615,
6834,
4403,
9523,
10166,
823,
7103,
704,
9537,
7362,
3395,
10308,
... | Validation |
5,070 | 2 | ProGet:proget proget package management system designed inedo software company allows users host manage personal enterprise-wide packages applications components originally designed private nuget package manager microsoft development platform manager symbol source server enterprises utilize proget “ package applications components ” aim ensuring software built deployed consistently across environments gartner lists proget tool aligned “ preprod ” section devops toolchain used “ hold/stage software ready release ” proget currently supports growing list package managers including nuget chocolatey bower npm maven powershell rubygems helm debian python visual studio extensions .vsix proget also supports docker containers jenkins build artifacts plugin vulnerability scanning possible monitor feeds proget interface features also available managed number clients interfaces proget main features include originally proget designed run microsoft windows beginning version 4.4 also run linux via docker proget used asos.com cellenza abanca webmd health services sitecore infragistics among others | [
8068,
6797,
1935,
9487,
788,
1813,
8213,
10900,
8476,
9121,
4775,
6828,
7983,
823,
5819,
190,
11201,
9671,
5578,
5067,
3918,
463,
3667,
6361,
2010,
2910,
2401,
1379,
741,
231,
6119,
9063,
7293
] | Test |
5,071 | 5 | Acknowledgement_(data_networks):acknowledgement data networks data networking telecommunications computer buses acknowledgement ack signal passed communicating processes computers devices signify acknowledgement receipt message part communications protocol negative-acknowledgement nak nack signal sent reject previously received message indicate kind error acknowledgements negative acknowledgements inform sender receiver state adjust state accordingly oftentimes data messages telecommunications contain checksums verify integrity payload header checksums work way single bit data corrupted checksum would different value provide inexpensive way check probable signal integrity message received invalid checksum data received would different checksum message receiver know information corrupted often checksums employed corrupted message received either served ack signal served nak signal ascii code used communicate computer terminals terminal send enquiry character request condition receiver character respond ack 0000110 6 indicate operating normally nak 0010101 15 indicate error condition unicode provides visible symbols characters u+2406 ␆ u+2415 ␕ many protocols acknowledgement-based meaning positively acknowledge receipt messages internet transmission control protocol tcp example acknowledgement-based protocol computers communicate via tcp received packets acknowledged sending back packet ack bit set tcp protocol allows acknowledgements included data sent opposite direction protocols send single acknowledgement per packet information protocols tcp zmodem allow many packets transmitted receiving acknowledgement procedure necessary fill high bandwidth-delay product links large number bytes flight protocols nak-based meaning respond messages problem examples include reliable multicast protocols send nak receiver detects missing packets still protocols make use naks acks binary synchronous communications bisync adaptive link rate energy-efficient ethernet examples still protocols rc-5 user datagram protocol udp x10 protocols perform blind transmission acknowledgement often transmitting message multiple times hopes least one copy message gets acknowledgement function used automatic repeat request arq function acknowledgement frames numbered coordination frames received sent transmitter allows transmitter avoid overflow underrun receiver become aware missed frames binary synchronous communications nak used indicate transmission error detected previously received block receiver ready accept retransmission block bisync use single ack character two control sequences alternate even/odd block acknowledgement computer buses dedicated acknowledge wire control bus used acknowledge bus operations dack used isa dma datack used stebus data transfer acknowledge pin motorola 68000 inspired title dtack grounded etc computer buses always acknowledge every write writes use posted write i²c serial bus time slot acknowledgment bit byte | [
1154,
7188,
11413,
2203,
10924,
1197,
7855,
562,
4918,
5439,
2752,
1474,
4423,
3273,
8138,
2640,
7269,
7017,
755,
4725,
1405
] | Test |
5,072 | 5 | Twitterrific:twitterrific twitterrific mac os x ios client social networking site twitter created iconfactory first twitter desktop client come mac os x lets users view tweets micro-blog posts twitter website real time well publish twitterrific closed source software program main window uses translucent black theme similar certain palettes used aperture iphoto apple inc. software users may choose view full public timeline friends feed users also click links view poster profile mark tweet favorite twitterrific also provides functionality upload images videos posting twitter version 2.1 twitterrific supports growl notifications enhanced applescript capabilities used sites services use twitter api version 3 changed twitterrific advertising supported shareware every hour ad refreshed top list users buy program receive ads changes version 3 mostly added compatibility mac os x 10.5 incorporated newer twitter features like direct messaging ios version twitterrific 2008 apple design award best iphone social networking application april 1 2010 iconfactory released twitterrific ipad version 1.0 ready ipad us launch april 3 june 24 version twitterrific launched version 3.0 universally compatible iphone ipod touch ipad february 14 2017 kickstarter project launched iconfactory try revive twitterrific mac application october 10 2017 mac application received 5.0 update added mac app store | [
576,
1346,
9922,
9732,
1960,
10602,
6539,
9964,
10059,
7983,
499,
8700,
3485,
7359
] | Test |
5,073 | 3 | Sandy_Bridge:sandy bridge sandy bridge codename microarchitecture used second generation intel core processors core i7 i5 i3 sandy bridge microarchitecture successor nehalem microarchitecture intel demonstrated sandy bridge processor 2009 released first products based architecture january 2011 core brand sandy bridge manufactured 32 nanometer process intel subsequent generation ivy bridge announced 2011 uses 22 nanometer die shrink known tick–tock model core i7 2600 sandy bridge cpu 3.4 ghz 1333 mhz ddr3 memory reaches 83 gflops performance whetstone benchmark 118,000 mips dhrystone benchmark last intel microarchitecture windows vista driver support officially exists intel demonstrated sandy bridge processor a1 stepping 2 ghz intel developer forum september 2009 upgraded features nehalem include sandy bridge processors one two four cores report cpuid model 0206a7h closely related stepping number seen cpuid pci configuration space later sandy bridge-e processors eight cores graphics using cpuids 0206d6h 0206d7h ivy bridge cpus cpuid 0306a9h date built four different configurations differing number cores l3 cache gpu execution units processors featuring intel hd 3000 graphics set bold processors feature hd 2000 graphics hd graphics pentium celeron models graphics core graphics clock rate indicated n/a suffixes denote note 3970x 3960x 3930k 3820 actually sandy bridge-e edition suffixes denote 31 january 2011 intel issued recall 67-series motherboards due flaw cougar point chipset hardware problem exists chipset sata ii ports may fail time causing failure connection sata devices though data risk intel claims problem affect 5 users 3 years however heavier i/o workloads exacerbate problem intel stopped production flawed b2 stepping chipsets began producing b3 stepping chipsets silicon fix shipping new chipsets started 14 february 2011 intel estimated full recovery volume april 2011 motherboard manufacturers asus gigabyte technology computer manufacturers dell hewlett-packard stopped selling products involved flawed chipset offered support affected customers options ranged swapping b3 motherboards product refunds sandy bridge processor sales temporarily hold one use cpu without motherboard however processor release dates affected two weeks intel continued shipping chipsets manufacturers agree set terms prevent customers encountering bug motherboard manufacturer websites instruction identify chipset stepping version using bios lshw produces partial output output says 'version 05 intel 6 series chipset intel c200 series chipset specification update google intel h61 revision 05 result 1 'pch device revision identification page 13 says '05h located 'b3 rev id 'b3 chipset stepping version suffix h means hexadecimal '05h means 5 sandy bridge intel tied speed every bus usb sata pci pci-e cpu cores uncore memory etc single internal clock generator issuing basic base clock bclk cpus multiplier locked way overclock increase bclk raised 5–7 without hardware components failing work around intel made available k/x-series processors feature unlocked multipliers multiplier cap 57 sandy bridge sandy bridge e platform alternative method known bclk ratio overclock idf intel developer forum 2010 intel demonstrated unknown sandy bridge cpu running stably overclocked 4.9 ghz air cooling non-k edition cpus overclock four bins turbo multiplier refer chipset support sandy ivy bridge processors vpro capability security features remotely disable pc erase information hard drives useful case lost stolen pc commands received 3g signals ethernet internet connections aes encryption acceleration available useful video conferencing voip applications sandy ivy bridge processors contain drm technology video streaming web sites rely restrict use content web sites offer 1080p streaming users cpus downgrade quality users introduction sandy bridge microarchitecture intel also introduced intel data plane development kit intel dpdk help developers communications applications take advantage platform packet processing applications network processors intel demonstrated haswell architecture september 2011 released 2013 successor sandy bridge ivy bridge | [
3586,
4108,
9741,
5649,
8231,
2088,
2638,
597,
1119,
7783,
4204,
8820,
2165,
4217,
8325,
7313,
8851,
6804,
8855,
1178,
9391,
4276,
2237,
5309,
6339,
8394,
5844,
6868,
9945,
10971,
5356,
5871,
1776,
3317,
5883,
5380,
5384,
5386,
6926,
4886... | Validation |
5,074 | 2 | Region-based_memory_management:region-based memory management computer science region-based memory management type memory management allocated object assigned region region also called zone arena area memory context collection allocated objects efficiently deallocated like stack allocation regions facilitate allocation deallocation memory low overhead flexible allowing objects live longer stack frame allocated typical implementations objects region allocated single contiguous range memory addresses similarly stack frames typically allocated simple example consider following c code allocates deallocates linked list data structure region *r createregion listnode *head null int 1 1000 i++ // ... // use list destroyregion r although required many operations construct linked list destroyed quickly single operation destroying region nodes allocated need traverse list simple explicit regions straightforward implement following description based hanson region implemented linked list large blocks memory block large enough serve many allocations current block maintains pointer next free position block block filled new one allocated added list region deallocated next-free-position pointer reset beginning first block list blocks reused next region created alternatively region deallocated list blocks appended global freelist regions may later allocate new blocks simple scheme possible deallocate individual objects regions overall cost per allocated byte scheme low almost allocations involve comparison update next-free-position pointer deallocating region constant-time operation done rarely unlike typical garbage collection systems need tag data type basic concept regions old first appearing early 1967 douglas t. ross aed free storage package memory partitioned hierarchy zones zone allocator zone could freed all-at-once making zones usable regions 1976 pl/i standard included area data type 1990 hanson demonstrated explicit regions c called arenas could achieve time performance per allocated byte superior even fastest-known heap allocation mechanism explicit regions instrumental design number early c-based software projects including apache http server calls pools postgresql database management system calls memory contexts like traditional heap allocation schemes provide memory safety possible programmer access region deallocated dangling pointer forget deallocate region causing memory leak 1988 researchers began investigating use regions safe memory allocation introducing concept region inference creation deallocation regions well assignment individual static allocation expressions particular regions inserted compiler compile-time compiler able way guarantee dangling pointers leaks occur early work ruggieri murtagh region created beginning function deallocated end use data flow analysis determine lifetime static allocation expression assign youngest region contains entire lifetime 1994 work generalized seminal work tofte talpin support type polymorphism higher-order functions standard ml functional programming language using different algorithm based type inference theoretical concepts polymorphic region types region calculus work introduced extension lambda calculus including regions adding two constructs due syntactic structure regions nested meaning r created r must also deallocated r result stack regions moreover regions must deallocated function created restrictions relaxed aiken et al extended lambda calculus intended serve provably memory-safe intermediate representation compiling standard ml programs machine code building translator would produce good results large programs faced number practical limitations resolved new analyses including dealing recursive calls tail recursive calls eliminating regions contained single value work completed 1995 integrated ml kit version ml based region allocation place garbage collection permitted direct comparison two medium-sized test programs yielding widely varying results 10 times faster four times slower depending region-friendly program compile times however order minutes ml kit eventually scaled large applications two additions scheme separate compilation modules hybrid technique combining region inference tracing garbage collection following development ml kit regions began generalized language environments systems using regions may experience issues regions become large deallocated contain large proportion dead data commonly called leaks even though eventually freed eliminating leaks may involve restructuring program typically introducing new shorter-lifetime regions debugging type problem especially difficult systems using region inference programmer must understand underlying inference algorithm examine verbose intermediate representation diagnose issue tracing garbage collectors effective deallocating type data timely manner without program changes one justification hybrid region/gc systems hand tracing garbage collectors also exhibit subtle leaks references retained data never used region-based memory management works best number regions relatively small contains many objects programs contain many sparse regions exhibit internal fragmentation leading wasted memory time overhead region management presence region inference problem difficult diagnose mentioned rc uses hybrid regions reference counting limiting overhead reference counting since references internal regions n't require counts updated 're modified similarly mark-region hybrid methods combine tracing garbage collection regions function dividing heap regions performing mark-sweep pass regions containing live objects marked freeing unmarked regions require continual defragmentation remain effective | [
2304,
7808,
4747,
5008,
9490,
11539,
541,
3871,
1954,
428,
814,
435,
8502,
11574,
3512,
4668,
2625,
1474,
1736,
4424,
6730,
6221,
10703,
5840,
6228,
6868,
86,
9559,
5080,
8539,
1247,
865,
8545,
8573,
8421,
2152,
7403,
634,
2045,
7039
] | Test |
5,075 | 0 | Transana:transana transana software package used analyze digital video audio data transana used gpl licensed software become proprietary software recent releases transana lets user analyze manage data transcribe identify analytically interesting clips assign keywords clips arrange rearrange clips create complex collections interrelated clips explore relationships applied keywords share analysis colleagues goal find new way focus data manage large collections video audio files clips transana product digital insight project developed funding national science foundation national partnership computational infrastructure san diego supercomputer center talkbank project carnegie mellon university | [
7983,
8554,
6797,
6135
] | None |
5,076 | 3 | SGI_Octane:sgi octane octane similar octane2 irix workstations marketed sgi two-way multiprocessing-capable workstations originally based mips technologies r10000 microprocessor newer octanes based r12000 r14000 octane2 four improvements compared octane revised power supply system board xbow octane2 also shipped vpro graphics supports vpro cards later revisions octane also included improvements introduced octane2 codenames octane octane2 racer speedracer respectively octane direct successor indigo2 succeeded tezro immediate sibling o2 sgi withdrew octane2 price book may 26 2004 ceased octane2 production june 25 2004 support octane2 ceased june 2009 new system named octane iii introduced early 2010 octane iii intel xeon-based desk-side cluster system confused octane octane2 octane system-board designated ip30 system based sgi xtalk architecture means use system bus instead crossbow application specific integrated circuit asic referred xbow dynamic crossbar switch connects xio ports hub one ports used processor memory subsystem one available pci-x expansion four xio slots packet-based high-bandwidth bus somewhat similar hypertransport makes similar single node origin 200 system xio could bridged pci-x using chip named bridge bridging included system board ioc3 multi-i/o chip two isp1040b scsi controllers rad1 audio menet cards four ioc3s pci cage used pci cards octane octane uses arcs boot firmware like contemporary sgi computer systems processors octane series computers octane series single dual cpu modules second cpu added option replace whole cpu module octane supports 256 mb 8 gb system memory using proprietary 200-pin dimms two system board revisions first revision part number 030-0887-003 supports 2 gb ram second part number 030-1467-001 allows 8 gb memory subsystem vast reserves bandwidth directly served xbow router xio card octane memory controller named heart acts bridge processor memory sdram xio bus graphics octane provided series cards si si+t ssi mxi updated xio versions solid impact si high impact si+t maximum impact mxi sgi indigo2 internally designated sgi 'mardigras boards accelerated reengineered faster geometry engine texture modules create new versions se se+t sse mxe si/se provides 13.5 mb framebuffer memory sse mxe 27 mb framebuffer '+t indicates additional high speed rambus rdram-based texture board gives 4 mb texture memory practically indispensable though quite expensive fragile si/se+t one texture board mxi/mxe 2 texture boards however 2 boards mxi/mxe double available texture memory system doubles texture performance later octanes octane2 support sgi vpro graphics board series designated 'odyssey first vpro series cards v6 v8 main differentiator v6 32 mb ram unlike mardigras option framebuffer memory texture memory come pool v8 128 mb later v10 32 mb v12 128 mb introduced main difference new vpro v10/v12 series double geometry performance older v6/v8 v6 v10 8 mb ram allocated textures 2x textured-enabled mardigras options v8 v12 108 mb ram used textures vpro graphics subsystem consists sgi proprietary chip set associated software chip set consists buzz asic pixel blaster jammer pb j asic associated sdram buzz asic single-chip graphics pipeline operates 251 mhz contains on-chip sram buzz asic three interfaces mardigras boards vpro boards support opengl mardigras opengl 1.1 sgi extensions vpro upgraded support opengl 1.2 opengl arb imaging extensions allowing hardware acceleration numerous imaging operations real-time rates note cards texture memory offer hardware accelerated texturing however add hardware texturing tramless card adding tram modules audio hardware standard even without extensions support low-latency 3 ms input-to-output audio streams alesis adat 8-channel 24-bit optical ports built-in along s/pdif aes/ebu optical coaxial ports makes octane respectable digital audio workstation octane cases large wxhxd 30x40x35 cm heavy 25 kg yet internal 5.25 drive bays external cd-rom drives must connected desired extensions include video i/o audio i/o networking realtime video compression boards external storage options scsi fibre-channel firewire octanes use standard pci cards optional pci cardcage provides 2-full length 1 half-length 5v pci-64 slots pci xio adapter known 'shoehorn provides single 3.3/5v 64-bit pci slot older octanes upgraded vpro graphics however v10 v12 graphics board require xbow revision 1.4 cherokee power supply vpro v6 v8 require xbow revision 1.3 cherokee power supply distinct difference cherokee 747 watt older lucent 623 watt power supplies mounting handle silver cherokee international manufactured power supplies original lucent manufactured ones black handles octane skins come three types original octane green skins original sgi 'cube logo later model octanes skins colour original octane2-style lettering logos octane2 systems blue skins modern lowercase letter-only sgi logo octane series two scsi controllers supports ultra wide scsi devices systems maximum three internal 3.5 scsi sca devices using proprietary mounting sleds also compatible origin 2000 origin 200 onyx2 external ultra wide scsi port used connecting external devices sgi octane impact-class graphics first supported irix version 6.4 vpro-class graphics supported since irix version 6.5.10 v6 v8 v10 v12 graphics supported 6.5.11 6.5.10 special driver patch linux runs octane series although patch experimental impact vpro graphics supported x window system available impactsr series openbsd port runs octane series well | [
5380,
5898,
7311,
5523,
2452,
5272,
6942,
3764,
7093,
823,
11447,
7234,
10051,
6858,
9932,
7001,
221,
6243,
6247,
5356,
1398,
1149
] | Test |
5,077 | 4 | Distributed_Access_Control_System:distributed access control system distributed access control system dacs light-weight single sign-on attribute-based access control system web servers server-based software dacs primarily used apache web servers provide enhanced access control web pages cgi programs servlets web-based assets federate apache servers released open-source license dacs provides modular authentication framework supports array common authentication methods rule-based authorization engine grant deny access resources named urls based identity requestor contextual information administrators configure dacs identify users employing authentication methods user accounts already available within organization resulting dacs identities recognized dacs jurisdictions federated addition simple web-based apis command-line interfaces also provided much functionality web-based apis return xml json documents development dacs began 2001 first open source release made available 2005 dacs use following authentication methods account types extensible architecture allows new methods introduced dacs distribution includes various cryptographic functionality message digests hmacs symmetric public key encryption ciphers chacha20 openssl digital signatures password-based key derivation functions hkdf pbkdf2 memory-hard key derivation functions scrypt argon2 much available simple scripting language dacs also act identity provider infocards function relying party although functionality deprecated dacs performs access control evaluating access control rules specified administrator expressed set xml documents rules consulted run-time determine whether access given resource granted denied access control rules arbitrary computations combines attribute-based access control role-based access control policy-based access control delegated access control approaches architecture provides many possibilities administrators | [
5397,
3629,
7983,
2737,
10801,
2485,
823,
5433,
4797,
5573,
7368,
10058,
479,
2143,
225,
865,
3309,
6651,
2558
] | Validation |
5,078 | 5 | Firefox:firefox mozilla firefox simply firefox free open-source web browser developed mozilla foundation subsidiary mozilla corporation firefox officially available windows 7 newer macos linux unofficial ports available various unix unix-like operating systems including freebsd openbsd netbsd illumos solaris unix sibling firefox android also available firefox uses gecko layout engine render web pages implements current anticipated web standards 2017 firefox began incorporating new technology code name quantum promote parallelism intuitive user interface additional version firefox ios released november 12 2015 due platform restrictions uses webkit layout engine instead gecko ios web browsers firefox created 2002 codename phoenix mozilla community members desired standalone browser rather mozilla application suite bundle beta phase firefox proved popular testers praised speed security add-ons compared microsoft then-dominant internet explorer 6 firefox released november 9 2004 challenged internet explorer dominance 60 million downloads within nine months firefox spiritual successor netscape navigator mozilla community created netscape 1998 acquisition aol firefox usage grew peak 32.21 end 2009 version 3.5 overtaking internet explorer 7 although versions internet explorer whole usage declined competition google chrome firefox 9.53 usage share desktop browser according statcounter making second-most popular browser google chrome 71.03 usage share across platforms lower 4.48 third-most popular overall according mozilla december 2014 half billion firefox users around world project began experimental branch mozilla project dave hyatt joe hewitt blake ross believed commercial requirements netscape sponsorship developer-driven feature creep compromised utility mozilla browser combat saw mozilla suite software bloat created stand-alone browser intended replace mozilla suite april 3 2003 mozilla organization announced planned change focus mozilla suite firefox thunderbird community-driven seamonkey formed eventually replaced mozilla application suite 2005 firefox project undergone several name changes nascent browser originally named phoenix mythical bird rose triumphantly ashes dead predecessor case ashes netscape navigator sidelined microsoft internet explorer first browser war phoenix renamed due trademark claim phoenix technologies replacement name firebird provoked intense response firebird database software project mozilla foundation reassured browser would always bear name mozilla firebird avoid confusion pressure mozilla firebird became mozilla firefox february 9 2004 name firefox said derived nickname red panda became mascot newly named project firefox project went many versions version 1.0 released november 9 2004 abbreviation firefox mozilla prefers fx fx though often abbreviated ff 2016 mozilla announced project known quantum sought improve firefox gecko engine components improve firefox performance modernize architecture transition browser multi-process model improvements came wake decreasing market share google chrome well concerns performance lapsing comparison despite improvements changes required existing add-ons firefox made incompatible newer versions favor new extension system designed similar chrome recent browsers firefox 57 released november 2017 first version contain enhancements quantum thus named firefox quantum mozilla executive stated quantum biggest update browser since version 1.0 may 3 2019 expiration intermediate signing certificate caused firefox automatically disable browser extensions add-ons mozilla began roll-out fix shortly thereafter using mozilla studies component features include tabbed browsing spell checking incremental search live bookmarking smart bookmarks download manager private browsing location-aware browsing also known geolocation based google service integrated search system uses google default markets additionally firefox provides environment web developers use built-in tools error console dom inspector extensions firebug recently integration feature pocket firefox hello implementation webrtc added october 2014 allows users firefox compatible systems video call extra feature screen file sharing sending link firefox hello scheduled removed september 2016 functions added add-ons created third-party developers add-ons primarily coded using html javascript api known webextensions designed similar google chrome microsoft edge extension systems firefox previously supported add-ons using xul xpcom apis allowed directly access manipulate much browser internal functionality compatible multi-process architecture xul add-ons deemed legacy add-ons longer supported firefox 57 newer firefox themes added users create download third parties change appearance browser firefox add-on website also gives users ability add applications games ad-blockers screenshot apps many apps firefox implements many web standards including html4 almost full html5 xml xhtml mathml svg 2 partial css extensions ecmascript javascript dom xslt xpath apng animated png images alpha transparency firefox also implements standards proposals created whatwg client-side storage canvas element standards implemented gecko layout engine spidermonkey javascript engine firefox passed acid2 standards-compliance test since version 3.0 mozilla originally stated intend firefox pass acid3 test fully believed svg fonts part test become outdated irrelevant due woff agreed upon standard major browser makers svg font tests removed acid3 test september 2011 firefox 4 greater scored 100/100 firefox also implements safe browsing proprietary protocol google used exchange data related phishing malware protection since version 38 windows vista newer firefox supports playback video content protected html5 encrypted media extensions eme security privacy reasons eme implemented within wrapper open source code allows execution proprietary drm module adobe systems—adobe primetime content decryption module cdm cdm runs within sandbox environment limit access system provide randomized device id prevent services uniquely identifying device tracking purposes drm module downloaded enabled disabled manner plug-ins since version 47 google widevine cdm windows mac os x streaming services like amazon video switch silverlight encrypted html5 video also supported mozilla justified partnership adobe google stating important step mozilla roadmap remove npapi plugin support upon introduction eme support builds firefox windows also introduced exclude support eme free software foundation cory doctorow condemned mozilla decision support eme html5 web standards test firefox 68 scores 513 582 points firefox allowed sandbox security model manage privileges accorded javascript code feature since deprecated limits scripts accessing data websites based same-origin policy also provides support smart cards web applications authentication purposes uses tls protect communications web servers using strong cryptography using https protocol freely available https everywhere add-on enforces https even regular http url entered firefox supports http/2 mozilla foundation offers bug bounty us 3,000 us 7,500 cash reward researchers discover severe security holes firefox official guidelines handling security vulnerabilities discourage early disclosure vulnerabilities give potential attackers advantage creating exploits firefox generally fewer publicly known security vulnerabilities internet explorer see comparison web browsers improved security often cited reason switch internet explorer firefox washington post reported exploit code known critical security vulnerabilities internet explorer available 284 days 2006 comparison exploit code known critical security vulnerabilities firefox available nine days mozilla issued patch remedy problem 2006 symantec study showed although firefox surpassed browsers number vendor-confirmed vulnerabilities year september vulnerabilities patched far quickly found browsers firefox vulnerabilities fixed average one day exploit code made available compared nine days internet explorer symantec later clarified statement saying firefox still fewer security vulnerabilities internet explorer counted security researchers 2010 study national institute standards technology nist based data compiled national vulnerability database nvd firefox listed fifth-most vulnerable desktop software internet explorer eighth google chrome first infoworld cited security experts saying firefox becomes popular vulnerabilities found claim mitchell baker president mozilla foundation denied idea market share alone make vulnerabilities relational said october 2009 microsoft security engineers acknowledged firefox vulnerable security issue found 'windows presentation foundation browser plug-in since february year .net framework 3.5 sp1 windows update silently installed vulnerable plug-in firefox vulnerability since patched microsoft firefox 3.6 known unpatched security vulnerabilities according secunia internet explorer 8 five unpatched security vulnerabilities worst rated less critical secunia mozilla claims patched vulnerabilities mozilla products publicly listed january 28 2013 mozilla recognized trusted internet company privacy 2012 study performed ponemon institute result survey 100,000 consumers united states february 2013 plans announced firefox 22 disable third-party cookies default however introduction feature delayed mozilla developers could collect analyze data effect blocking third-party cookies mozilla also collaborated stanford university cookie clearinghouse project develop blacklist whitelist sites used filter version 23 released august 2013 followed lead competitors blocking iframe stylesheet script resources served non-https servers embedded https pages default additionally javascript could also longer disabled firefox preferences javascript automatically re-enabled users upgraded 23 higher disabled change made due use across majority websites potential repercussions non-experienced users unaware impact along availability extensions noscript disable javascript controlled fashion following release added ability disable javascript developer tools testing purposes january 2015 torrentfreak reported using firefox connected internet using vpn serious security issue due browser support webrtc beginning firefox 44 extensions must signed mozilla used release beta versions firefox firefox 43 blocked unsigned extensions allowed enforcement extension signing disabled extensions must submitted mozilla add-ons subject code analysis order signed although extensions listed service order signed may 2 2019 mozilla announced would strengthening signature enforcement methods included retroactive disabling old extensions deemed insecure firefox update may 3 led bug reports extensions disabled found result overlooked certificate policy change set go effect june 10 firefox versions prior 7.0 information bar appears browser first start asking users whether would like send performance statistics telemetry mozilla enabled default development versions firefox release versions according mozilla privacy policy statistics stored aggregate format personally identifiable information transmitted user ip address november 2018 firefox began using sandbox isolate web tabs rest system lack feature previously earned negative comparisons google chrome microsoft edge since version 60 firefox includes option use dns https doh causes dns lookup requests sent encrypted https protocol use feature user must set certain preferences beginning network.trr trusted recursive resolver network.trr.mode 0 doh disabled 1 activates doh addition unencrypted dns 2 causes doh used unencrypted dns use doh value must 3 setting network.trr.uri url https //mozilla.cloudflare-dns.com/dns-query special cloudflare servers activated mozilla privacy agreement server host restricts collection information incoming dns requests may 21 2019 firefox updated include ability block scripts used computer cpu mine cryptocurrency without user permission firefox version 67.0 update also allowed users block known fingerprinting scripts track activity across web however resist fingerprinting july 2 2019 mozilla introduced mechanism allow firefox automatically trust os-installed certificates prevent tls errors firefox widely localized web browser first official release november 2004 available 24 different languages 28 locales including british english american english european spanish argentine spanish chinese traditional chinese characters simplified chinese characters currently supported versions 68.0.2 68.0.2esr 60.8.0esr available 89 locales 79 languages desktop version firefox available supported microsoft windows macos linux firefox android available android formerly firefox mobile also ran firefox os firefox source code may compiled various operating systems however officially distributed binaries provided following firefox 1.0 released windows 9x well windows nt 4.0 later users reported 1.x builds operable installable windows nt 3.51 september 2013 metro-style version firefox optimized touchscreen use introduced aurora release channel however project since cancelled mozilla citing lack user adoption beta versions version 43.0 included first x64 builds made windows 7 server 2008 r2 version 49.0 dropped support processors without sse2 instruction set windows april 2017 users firefox 52.0.2 windows xp windows vista windows server 2003 windows server 2008 automatic updates enabled migrated firefox 52 esr support projected end operating systems last release june 2018 first official release firefox version 1.0 supported macos called mac os x powerpc architecture mac os x builds ia-32 architecture became available via universal binary debuted firefox 1.5.0.2 2006 starting version 4.0 firefox released x64 architecture macos migrated since inception firefox linux supported 32-bit memory architecture ia-32 instruction set 64-bit builds introduced 4.0 release 46.0 release replaced gtk+ 2.18 3.4 system requirement linux systems running x.org starting 53.0 32-bit builds require sse2 instruction set firefox android codenamed fennec web browser smaller non-pc devices mobile phones pdas originally first released nokia maemo operating system specifically nokia n900 january 28 2010 march 29 2011 besides maemo version 4 added android release mobile version browser version number bumped 2 4 synchronizing future desktop releases firefox rendering engines used browsers version 7 last release maemo n900 user interface completely redesigned optimized small screens controls hidden away web content shown screen uses touchscreen interaction methods includes awesome bar tabbed browsing add-on support password manager location-aware browsing ability synchronize user computer firefox browser using firefox sync april 2013 then-mozilla ceo gary kovacs said firefox would come ios long apple required use webkit layout engine one reason given mozilla prior ios 8 apple supplied third-party browsers inferior version javascript engine hobbled performance making impossible match safari javascript performance ios platform apple later opened nitro javascript engine third-party browsers 2015 mozilla announced moving forward firefox ios preview release made available new zealand september year november 2016 firefox released new ios app titled firefox focus private web browser firefox also ported freebsd netbsd openbsd openindiana os/2 skyos beos/haiku unofficial rebranded version called timberwolf available amigaos 4 unofficial continuation mac os x powerpc release continues tenfourfox firefox port openbsd maintained landry breuil since 2010 firefox regularly built current branch operating system latest versions packaged release remain frozen next release 2017 landry began hosting packages newer firefox versions openbsd releases 6.0 onwards making available installations without ports system solaris port firefox including opensolaris maintained oracle solaris desktop beijing team march 2017 team disbanded also unofficial port firefox 3.6.x ibm aix v1.7.x unixware besides official releases mozilla provides development builds firefox distribution channels named order least stable beta developer edition former aurora renamed november 10 2014 nightly starting firefox 54 developer edition based beta build firefox esr version firefox organizations groups need extended support mass deployments esr release based regular version released time supported approximately one year unlike regular rapid releases esrs updated new features performance enhancements every six weeks rather updated high-risk-reduction high-impact security fixes major stability fixes point releases end esr cycle firefox source code free software released mozilla public license mpl version 2.0 license permits anyone view modify redistribute source code result several publicly released applications built netscape flock miro gnu icecat iceweasel songbird pale moon comodo icedragon past firefox licensed solely mpl version 1.1 free software foundation criticized weak copyleft license permitted limited ways proprietary derivative works additionally code licensed mpl 1.1 could legally linked code gpl address concerns mozilla re-licensed firefox tri-license scheme mpl 1.1 gpl 2.0 lgpl 2.1 since re-licensing developers free choose license received code suit intended use gpl lgpl linking derivative works one licenses chosen mpl use including possibility proprietary derivative works chose mpl however january 3 2012 mozilla released gpl-compatible mpl 2.0 release firefox 13 june 5 2012 mozilla used replace tri-licensing scheme crash reporting service initially closed-source switched version 3 program called talkback open-source breakpad socorro server name mozilla firefox registered trademark along official firefox logo may used certain terms conditions anyone may redistribute official binaries unmodified form use firefox name branding distribution restrictions placed distributions modify underlying source code name firefox derives nickname red panda mozilla placed firefox logo files open-source licenses trademark guidelines allow displaying altered similar logos contexts trademark law applies controversy mozilla foundation intentions stopping certain open source distributions using firefox trademark open source browsers enable greater choice innovation market rather aiming mass-market domination mozilla foundation chairperson mitchell baker explained interview 2007 distributions could freely use firefox trademark modify source-code mozilla foundation concern users getting consistent experience used firefox allow distributions code without using official branding firefox build system contains branding switch switch often used alphas auroras future firefox versions allows code compiled without official logo name allow derivative work unencumbered restrictions firefox trademark produced unbranded build trademarked logo name replaced freely distributable generic globe logo name release series modified version derived distributing modified versions firefox firefox name required explicit approval mozilla changes made underlying code required use official branding example permissible use name firefox without also using official logo debian project decided stop using official firefox logo 2006 mozilla copyright restrictions time incompatible debian guidelines told representative mozilla foundation acceptable asked either comply published trademark guidelines cease using firefox name distribution ultimately debian switched branding modified version firefox iceweasel 2016 switched back firefox along mozilla software gnu icecat another derived version firefox distributed gnu project maintains separate branding early firebird phoenix releases firefox considered reasonable visual designs fell short compared many professional software packages october 2003 professional interface designer steven garrity wrote article covering everything considered wrong mozilla visual identity shortly afterwards mozilla foundation invited garrity head new visual identity team release firefox 0.8 february 2004 saw introduction new branding efforts included new icon designs silverorange group web developers long-standing relationship mozilla final renderings jon hicks worked camino logo later revised updated fixing several flaws found enlarged animal shown logo stylized fox although firefox usually common name red panda panda according hicks n't really conjure right imagery widely known firefox icon trademark used designate official mozilla build firefox software builds official distribution partners reason software distributors distribute modified versions firefox use icon june 2019 firefox announced rebranding introduced new logo new logo meant encompass larger family products firefox adopted rapidly 100 million downloads first year availability followed series aggressive marketing campaigns starting 2004 series events blake ross asa dotzler called marketing weeks firefox continued heavily market releasing marketing portal dubbed spread firefox sfx september 12 2004 debuted along firefox preview release creating centralized space discussion various marketing techniques release manifesto stated mozilla project global community people believe openness innovation opportunity key continued health internet two-page ad edition december 16 new york times placed mozilla foundation coordination spread firefox featured names thousands people worldwide contributed mozilla foundation fundraising campaign support launch firefox 1.0 web browser sfx portal enhanced get firefox button program giving users referrer points incentive site lists top 250 referrers time time sfx team sfx members launch marketing events organized spread firefox website part spread firefox campaign attempt break world download record release firefox 3 resulted official certified guinness world record eight million downloads february 2011 mozilla announced would retiring spread firefox sfx three months later may 2011 mozilla officially closed spread firefox mozilla wrote currently plans create new iteration website spread firefox later date celebration third anniversary founding mozilla foundation world firefox day campaign established july 15 2006 ran september 15 2006 participants registered friend website nomination names displayed firefox friends wall digital wall displayed headquarters mozilla foundation firefox community also engaged promotion web browser 2006 firefox contributors oregon state university made crop circle firefox logo oat field near amity oregon near intersection lafayette highway walnut hill road firefox reached 500 million downloads february 21 2008 firefox community celebrated visiting freerice earn 500 million grains rice initiatives included live chat service mozilla launched 2007 allowed users seek technical support volunteers service later retired promote launch firefox quantum november 2017 mozilla partnered reggie watts produce series tv ads social media content december 2005 internet week ran article many readers reported high memory usage firefox 1.5 mozilla developers said higher memory use firefox 1.5 least partially due new fast backwards-and-forwards fastback feature known causes memory problems malfunctioning extensions google toolbar older versions adblock plug-ins older versions adobe acrobat reader pc magazine 2006 compared memory usage firefox 2 opera 9 internet explorer 7 found firefox used approximately much memory two browsers softpedia noted firefox 1.5 took longer start browsers confirmed speed tests ie 6 launched swiftly firefox 1.5 windows xp since many components built os loaded system startup workaround issue preloader application created loaded components firefox startup similar internet explorer windows vista feature called superfetch performs similar task preloading firefox used often enough tests performed pc world zimbra 2006 indicated firefox 2 used less memory internet explorer 7 firefox 3 used less memory internet explorer 7 opera 9.50 beta safari 3.1 beta firefox 2 tests performed mozilla cybernet browser world mid-2009 betanews benchmarked firefox 3.5 declared performed nearly ten times better xp microsoft internet explorer 7 january 2010 lifehacker compared performance firefox 3.5 firefox 3.6 google chrome 4 stable dev versions safari 4 opera 10.1 stable 10.5 pre-alpha versions lifehacker timed long browsers took start reach page right boot-up running least already timed long browsers took load nine tabs tested javascript speeds using mozilla dromaeo online suite implements apple sunspider google v8 tests measured memory usage using windows 7 process manager concluded firefox 3.5 3.6 fifth- sixth-fastest browsers respectively startup 3.5 third- 3.6 sixth-fastest load nine tabs 3.5 sixth- 3.6 fifth-fastest javascript tests also concluded firefox 3.6 efficient memory usage followed firefox 3.5 february 2012 tom hardware performance tested chrome 17 firefox 10 internet explorer 9 opera 11.61 safari 5.1.2 windows 7 tom hardware summarized tests four categories performance efficiency reliability conformance performance category tested html5 java javascript dom css 3 flash silverlight webgl webgl 2 current version 51 java silverlight stop working version 52 —they also tested start time page load time performance tests showed firefox either acceptable strong categories winning three categories html5 html5 hardware acceleration java finishing weak css performance efficiency tests tom hardware tested memory usage management category determined firefox acceptable performing light memory usage strong performing heavy memory usage reliability category firefox performed strong amount proper page loads final category conformance determined firefox strong conformance javascript html5 conclusion tom hardware determined firefox best browser windows 7 os narrowly beat google chrome june 2013 tom hardware performance tested firefox 22 chrome 27 opera 12 internet explorer 10 found firefox slightly edged browsers performance index examined wait times javascript execution speed html5/css3 rendering hardware acceleration performance firefox also scored highest non-performance index measured memory efficiency reliability security standards conformance finishing substantially ahead chrome runner-up tom hardware concluded declaring firefox sound winner performance benchmarks january 2014 benchmark testing memory usage firefox 29 google chrome 34 internet explorer 11 indicated firefox used least memory substantial number tabs open benchmark testing early 2015 high-end windows machine comparing microsoft edge internet explorer firefox chrome opera firefox achieved highest score three seven tests four different javascript performance tests gave conflicting results firefox bested others peacekeeper benchmark behind microsoft products tested sunspider measured mozilla kraken came second place chrome google octane challenge took third behind chrome opera firefox took lead webxprt runs several typical html5 javascript tasks firefox chrome opera achieved highest possible score oort online test measuring webgl rendering speed webgl 2 current terms html5 compatibility testing firefox ranked middle group similar set benchmark tests 2016 showed firefox javascript performance kraken newer jetstream tests trailing slightly behind tested browsers except internet explorer performed relatively poorly octane firefox came ahead ie safari slightly behind rest including vivaldi microsoft edge edge took overall first place jetstream octane benchmarks adoption firefox 57 mozilla quantum project entering production browsers november 2017 firefox tested faster chrome independent javascript tests demonstrated use less memory many browser tabs opened techradar rated fastest web browser may 2019 report downloads continued increasing rate since firefox 1.0 released november 9 2004 firefox already downloaded one billion times number include downloads using software updates third-party websites represent user count one download may installed many machines one person may download software multiple times software may obtained third-party july 2010 ibm asked employees 400,000 use firefox default browser firefox second-most used web browser november 2011 google chrome surpassed according mozilla firefox 450 million users firefox second-most widely used desktop browser position makes fourth-most popular approximately 11.78 worldwide usage share web browsers across platforms according firefox public data report mozilla active monthly count desktop clients decreased around 310 million 2017 260 million 2019 | [
513,
2050,
6657,
5636,
7683,
9736,
10253,
6158,
9745,
2579,
3603,
4117,
3097,
9241,
6171,
2076,
4637,
1054,
543,
7708,
7713,
3618,
8227,
9757,
3110,
6694,
9768,
3625,
9770,
10791,
7212,
559,
3634,
8754,
4661,
3638,
3639,
10808,
11319,
978... | None |
5,079 | 9 | Albatross_(programming_language):albatross programming language albatross general purpose programming language verified statically | [
9345,
8262,
11625,
5612,
7983,
4791,
8924
] | Test |
5,080 | 9 | Real_mode:real mode real mode also called real address mode operating mode x86-compatible cpus real mode characterized 20-bit segmented memory address space giving exactly 1 mib addressable memory unlimited direct software access addressable memory i/o addresses peripheral hardware real mode provides support memory protection multitasking code privilege levels release 80286 introduced protected mode real mode available mode x86 cpus backward compatibility x86 cpus start real mode reset though possible emulate real mode systems starting modes 286 architecture introduced protected mode allowing among things hardware-level memory protection using new features however required new operating system specifically designed protected mode since primary design specification x86 microprocessors fully backward compatible software written x86 chips 286 chip made start 'real mode – mode turned new memory protection features could run operating systems written 8086 8088 2018 current x86 cpus including x86-64 cpus able boot real mode operating systems run software written almost previous x86 chip without emulation virtualization pc bios ibm introduced operates real mode dos operating systems ms-dos dr-dos etc. early versions microsoft windows ran real mode windows/386 made possible make use protected mode fully realized windows 3.0 could run either real mode make use protected mode manner windows/386 windows 3.0 actually several modes real mode standard mode 386-enhanced mode latter required virtualization features 80386 processor thus would run 80286 windows 3.1 removed support real mode first mainstream operating environment required least 80286 processor windows 95 architecture evolution windows workgroups 386 enhanced mode none versions could considered modern x86 operating system since switched protected mode certain functions unix linux os/2 windows nt 3.x later etc considered modern os switch cpu protected mode startup never return real mode provide benefits protected mode time 64-bit operating systems use another stepping stone get long mode worth noting protected mode 80286 considerably primitive improved protected mode introduced 80386 latter sometimes called 386 protected mode mode modern 32-bit x86 operating systems run 8086 8088 80186 20-bit address bus unusual segmented addressing scheme intel chose processors actually produces effective addresses 21 significant bits scheme shifts 16-bit segment number left four bits making 20-bit number four least-significant zeros adding 16-bit address offset maximum sum occurs segment offset 0xffff yielding 0xffff0 0xffff 0x10ffef 8086 8088 80186 result effective address overflows 20 bits address wraps around zero end address range i.e taken modulo 2^20 2^20 1048576 0x10000 however 80286 24 address bits computes effective addresses 24 bits even real mode therefore segment 0xffff offset greater 0x000f 80286 would actually make access beginning second mebibyte memory whereas 80186 earlier would access address equal offset -0x10 beginning first mebibyte note 80186 earlier first kibibyte address space starting address 0 permanent immovable location interrupt vector table actual amount memory addressable 80286 later x86 cpus real mode 1 mib 64 kib – 16 b 1114096 b programs predating 80286 designed take advantage wrap-around modulo memory addressing behavior 80286 presented problem backward compatibility forcing 21st address line actual logic signal wire coming chip logic low representing zero results modulo-2^20 effect match earlier processors address arithmetic 80286 internal capability perform function ibm used 80286 ibm pc/at solved problem including software-settable gate enable disable force zero a20 address line a20 pin 80286 system bus known gate-a20 a20 gate still implemented pc chipsets day versions himem.sys extended memory driver ibm-/ms-dos famously displayed upon loading message installed a20 handler piece software control gate-a20 coordinate needs programs protected mode a20 line needs enabled else physical addressing errors occur likely leading system crash intel introduced protected mode x86 family intention operating systems used would run entirely new mode programs running protected mode operating system would run protected mode well substantial differences real mode even rather limited 286 protected mode programs written real mode run protected mode without rewritten therefore wide base existing real mode applications users depended abandoning real mode posed problems industry programmers sought way switch modes however intel consistent intentions processor usage provided easy way switch protected mode 80286 easy way switch back real mode 386 way switch protected mode back real mode reset processor reset always starts real mode compatible earlier x86 cpus back 8086 resetting processor clear system ram awkward inefficient actually feasible protected mode processor state saved memory processor reset restarts real mode executes real mode code restore saved state memory run real mode code program ready switch back protected mode switch real mode costly terms time technique allows protected mode programs use services bios runs entirely real mode designed originally 8088-based ibm personal computer model machine type 5150 mode-switching technique also one used dpmi real emulated dos dos extenders like dos/4gw allow protected mode programs run dos dpmi system dos extender switches real mode invoke dos bios calls switches back return application program runs protected mode changing towards nt kernel resulted operating system needing dos boot computer well unable use need restart computer real mode ms-dos declined windows 3.1x longer supported windows way currently running dos applications require real mode within newer versions windows using emulators dosbox x86 virtualization products | [
2304,
5380,
389,
6150,
10757,
6153,
6797,
5008,
8976,
9490,
10768,
4884,
11539,
6297,
7323,
541,
11550,
3871,
1954,
3496,
5035,
814,
7983,
178,
9525,
823,
1848,
3512,
4928,
2625,
1474,
5312,
6596,
1736,
4424,
6730,
6221,
7501,
9166,
5840,... | None |
5,081 | 9 | Function-level_programming:function-level programming computer science function-level programming refers one two contrasting programming paradigms identified john backus work programs mathematical objects value-level programming 1977 turing award lecture backus set forth considered need switch different philosophy programming language design programming languages appear trouble successive language incorporates little cleaning features predecessors plus ... new language claims new fashionable features ... plain fact languages make programming sufficiently cheaper reliable justify cost producing learning use designed fp first programming language specifically support function-level programming style function-level program variable-free cf point-free programming since program variables essential value-level definitions needed function-level programs function-level style programming program built directly programs given outset combining program-forming operations functionals thus contrast value-level approach applies given programs values form succession values culminating desired result value function-level approach applies program-forming operations given programs form succession programs culminating desired result program result function-level approach programming invites study space programs program-forming operations looking derive useful algebraic properties program-forming operations function-level approach offers possibility making set programs mathematical space emphasizing algebraic properties program-forming operations space programs another potential advantage function-level view ability use strict functions thereby bottom-up semantics simplest kind yet another existence function-level definitions lifted lifted lower value-level higher function-level image existing value-level one often terse function-level definitions represent powerful style programming available value-level backus studied publicized function-level style programming message mostly misunderstood supporting traditional functional programming style languages instead fp successor fl backus calls functional programming applicative programming function-level programming particular constrained type key distinction functional languages backus language following hierarchy types ... way generate new functions use one functional forms fixed build functional form least within fp within ffp formal fp restriction means functions fp module generated built-in functions algebra functional forms thus algebraically tractable instance general question equality two functions equivalent halting problem undecidable equality two functions fp equality algebra thus backus imagines easier even today many users lambda style languages often misinterpret backus function-level approach restrictive variant lambda style de facto value-level style fact backus would disagreed 'restrictive accusation argued precisely due restrictions well-formed mathematical space could arise manner analogous way structured programming limits programming restricted version control-flow possibilities available plain unrestricted unstructured programs value-free style fp closely related equational logic cartesian-closed category canonical function-level programming language fp others include fl j | [
9345,
9224,
8722,
1051,
6182,
2216,
9385,
7851,
5168,
1591,
1976,
10042,
10819,
8262,
9926,
3529,
5585,
11219,
2774,
1388,
2670,
8430,
2680
] | Validation |
5,082 | 4 | Microsoft_SmartScreen:microsoft smartscreen smartscreen officially called windows smartscreen windows defender smartscreen smartscreen filter different places cloud-based anti-phishing anti-malware component included several microsoft products including windows 8 later internet explorer microsoft edge outlook.com designed help protect users attacks utilize social engineering drive-by downloads infect system scanning urls accessed user blacklist websites containing known threats windows 10 creators update microsoft placed smartscreen settings windows defender security center smartscreen first introduced internet explorer 7 known phishing filter phishing filter check every website visited user known suspicious release internet explorer 8 phishing filter renamed smartscreen extended include protection socially engineered malware every website download checked local list popular legitimate websites site listed entire address sent microsoft checks labeled impostor harmful internet explorer 8 show screen prompting site reported harmful n't visited user either visit homepage visit previous site continue unsafe page user attempts download file location reported harmful download cancelled effectiveness smartscreen filtering reported superior socially engineered malware protection browsers according microsoft smartscreen technology used internet explorer 8 successful phishing malicious sites blocking socially engineered malware beginning internet explorer 8 smartscreen enforced using group policy building top smartscreen filter introduced internet explorer 8 internet explorer 9 protection malware downloads extended smartscreen application reputation detects untrustworthy executables warns person downloading executable program without safe reputation site safe reputation internet explorer mobile 10 first release internet explorer mobile support smartscreen filter smartscreen filtering desktop level performing reputation checks default file application downloaded internet introduced windows 8 similar way smartscreen works internet explorer 9 program established good reputation user alerted running program may harm computer smartscreen left default settings administrator needs launch run program microsoft faced concerns surrounding privacy legality effectiveness new system suggesting automatic analysis files involves sending cryptographic hash file user ip address server could used build database users downloads online use outdated ssl 2.0 protocol communication could allow attacker eavesdrop data response microsoft later issued statement noting ip addresses collected part normal operation service would periodically deleted smartscreen windows 8 would use ssl 3.0 security reasons information gathered via smartscreen would used advertising purposes sold third parties outlook.com uses smartscreen protect users unsolicited email messages spam fraudulent emails phishing malware spread via e-mail system mainly controls used e-mail hyperlinks attachments filter spam smartscreen filter uses machine learning microsoft research learns known spam threats user feedback emails marked spam user time preferences help smartscreen filter distinguish characteristics unwanted legitimate e-mail also determine reputation senders number emails checked using algorithms reputation sender scl rating spam confidence level score assigned e-mail message lower score desirable score -1 0 1 considered spam message delivered recipient inbox score 5 6 7 8 9 considered spam delivered recipient junk folder scores 5 6 considered suspected spam score 9 considered certainly spam scl score email found various x-headers received email smartscreen filter also analyses email messages fraudulent suspicious web links suspicious characteristics found email message either directly sent spam folder red information bar top message warns suspect properties smartscreen also protects spoofed domain names spoofing emails verify whether email sent domain claims sent uses technology sender id domainkeys identified mail dkim smartscreen filter also ensures one email authenticated senders distinguish easily putting green shield icon subject line emails f smartscreen also included microsoft outlook microsoft exchange server late 2010 results browser malware testing undertaken nss labs published study looked browser capability prevent users following socially engineered links malicious nature downloading malicious software test browser ability block malicious web pages code according nss labs internet explorer 9 blocked 99 malware downloads compared 90 internet explorer 8 smartscreen application reputation feature opposed 13 achieved firefox chrome safari use google safe browsing malware filter opera 11 found block 5 malware smartscreen filter also noted adding legitimate sites blocklists almost instantaneously opposed several hours took blocklists updated browsers early 2010 similar tests given internet explorer 8 85 passing grade 5 improvement attributed continued investments improved data intelligence comparison research showed chrome 6 firefox 3.6 safari 5 scored 6 19 11 respectively opera 10 scored 0 failing detect socially engineered malware samples manufacturers browsers criticized test focusing upon lack transparency urls tested lack consideration layered security additional browser google commenting report clearly states evaluate browser security related vulnerabilities plug-ins browsers opera commenting results appeared odd received results data providers social malware protection indicator overall browser security july 2010 microsoft claimed smartscreen internet explorer blocked billion attempts access sites containing security risks according microsoft smartscreen filter included outlook.com blocks 4.5 billion unwanted e-mails daily reaching users microsoft also claims 3 incoming email junk mail test cascade insights says half junk mail still arrives inbox users september 2011 blog post microsoft stated 1.5 billion attempted malware attacks 150 million attempted phishing attacks stopped october 2017 criticisms regarding url submission methods addressed creation report unsafe site url submission page microsoft supports url submissions form opposed previous experience user visit site use in-product reporting methods smartscreen filter bypassed phishing attacks use phishing email linking front-end url microsoft database clicking url email redirects user malicious site report website option internet explorer reports currently-open page front-end url phishing attack reported microsoft remains accessible smartscreen filter creates problem small software vendors distribute updated version installation binary files internet whenever updated version released smartscreen responds stating file commonly downloaded therefore install harmful files system fixed author digitally signing distributed software reputation based file hash signing certificate well common distribution method authors bypass smartscreen warnings pack installation program example setup.exe zip-archive distribute way though confuse non-expert users another criticism smartscreen makes non-commercial/small end software development unaffordable developers either purchase standard code signing certificates expensive extended validation certificates extended validation certificates allow developer immediately establish reputation smartscreen often unaffordable people developing software either free immediate profit standard code signing certicates however pose catch-22 developers since smartscreen warnings make people reluctant download software consequence get downloads requires first passing smartscreen passing smartscreen requires getting reputation getting reputation dependent downloads want contribute smartscreen report site smartscreen via https //feedback.smartscreen.microsoft.com/feedback.aspx url= type http -address url= | [
2309,
8584,
1417,
2443,
6028,
537,
3482,
2848,
7713,
5799,
5673,
7473,
4793,
700,
5057,
10828,
5078,
10845,
3935,
9695,
3555,
4326,
9712,
11248,
4722
] | None |
5,083 | 7 | INSANE_(software):insane software insane proprietary interactive streaming animation engine developed lucasarts primarily programmer/game designer vincent lee using custom video compression technology greatly compresses moving images high quality full-screen videos displayed even hi-res graphics modes pc early version first developed followed much enhanced version full throttle outlaws dig also used 1998 games mortimer riddles medallion compression technology incorporated star wars episode insider guide jar jar journey adventure book use full throttle caused problems since insane intended photorealistic contrasting general cartoony feeling rendered environment scaled match rest game world later enhancements made compression technology optimize cartoon style imagery used outlaws | [
8122,
7586,
8454,
2826,
3210,
11306,
6900,
2293,
4182,
11700,
5914,
9691,
1916
] | Test |
5,084 | 2 | OpenIKED:openiked openiked free permissively licensed internet key exchange ikev2 daemon developed part openbsd operating system | [
9223,
10631,
2825,
3465,
10889,
1932,
274,
8211,
9722,
7702,
10105,
11162,
10908,
3742,
9764,
4268,
6702,
7983,
9520,
10417,
7859,
2228,
3777,
2884,
2245,
5959,
1993,
8265,
8778,
3404,
11468,
11086,
10831,
7376,
5970,
11606,
2136,
9048,
649... | Test |
5,085 | 7 | Darknet:darknet dark net darknet umbrella term describing portions internet purposefully open public view hidden networks whose architecture superimposed internet darknet often associated encrypted part internet called tor network illicit trading takes place infamous online drug bazaar called silk road also considered part deep web.. anonymous communication whistle-blowers journalists news organisations facilitated darknet tor network use applications including securedrop term originally described computers arpanet hidden programmed receive messages respond acknowledge anything thus remaining invisible dark.an account detailed first online transaction related drugs transpired 1971 students massachusetts institute technology stanford university traded marijuana using arpanet accounts former artificial intelligence laboratory term later usage incorporated services dark web overlay network accessed specific software configurations authorization often using non-standard communication protocols ports types dark webs include friend-to-friend networks usually used file sharing peer-to-peer connection privacy networks tor reciprocal term encrypted darknet clearnet surface web referring content indexable search engines term darknet often used interchangeably dark web due quantity hidden services tor darknet term often inaccurately used interchangeably deep web due tor history platform could search-indexed mixing uses terms described inaccurate commentators recommending terms used distinct fashions darknet coined 1970s designate networks isolated arpanet government-founded military/academical network evolved internet security purposes darknet addresses could receive data arpanet appear network lists would answer pings inquiries term gained public acceptance following publication darknet future content distribution 2002 paper peter biddle paul england marcus peinado bryan willman four employees microsoft argued presence darknet primary hindrance development workable digital rights management drm technologies made copyright infringement inevitable paper described darknet generally type parallel network encrypted requires specific protocol allow user connect journalist j. d. lasica 2005 book darknet hollywood war digital generation described darknet reach encompassing file sharing networks subsequently 2014 journalist jamie bartlett book dark net used term describe range underground emergent subcultures including camgirls cryptoanarchists darknet drug markets self harm communities social media racists transhumanists telegram features encryption ban territory different countries also belongs darknet anonymity contains encrypted channels sale prohibited substances recruiting various organizations coordinating anti-government actions darknets general may used various reasons darknets require specific software installed network configurations made access tor accessed via customised browser vidalia aka tor browser bundle alternatively via proxy configured perform function | [
4229,
4490,
1169,
11029,
10522,
1692,
3366,
8998,
9273,
3770,
6719,
8640,
11073,
8386,
708,
6351,
3792,
4945,
6991,
6993,
7761,
3676,
3428,
3813,
10726,
7921,
4083,
1908,
4725,
5749,
8692,
9332
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.