node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
5,186 | 4 | Metadata_removal_tool:metadata removal tool metadata removal tool metadata scrubber type privacy software built protect privacy users removing potentially privacy-compromising metadata files shared others e.g. sending e-mail attachments posting web metadata removal tools also commonly used reduce overall sizes files particularly image files posted web example small image website may contain metadata including thumbnail image easily contain much metadata image data thus removal metadata halve file size metadata found many types files documents spreadsheets presentations images audio files include information details file authors file creation modification dates location gps document revision history thumbnail images comments since metadata sometimes clearly visible authoring applications depending application settings risk user unaware existence forget file shared private confidential information inadvertently exposed purpose metadata removal tools minimize risk data leakage metadata removal tools exist today divided four groups | [
10245,
7369,
8329,
11695,
119
] | Test |
5,187 | 0 | TAUM_system:taum system taum traduction automatique à l'université de montréal name research group set université de montréal 1965 research done 1968 1980 gave birth taum-73 taum-meteo machine translation prototypes using q-systems programming language created alain colmerauer among first attempts perform automatic translation linguistic analysis prototypes never used actual production taum-meteo name erroneously used many years designate meteo system subsequently developed john chandioux | [
4025,
7164,
3276,
1269
] | Test |
5,188 | 7 | Stub_(distributed_computing):stub distributed computing stub distributed computing piece code converts parameters passed client server remote procedure call rpc main idea rpc allow local computer client remotely call procedures different computer server client server use different address spaces parameters used function procedure call converted otherwise values parameters could used pointers parameters one computer memory would point different data computer client server may also use different data representations even simple parameters e.g. big-endian versus little-endian integers stubs perform conversion parameters remote procedure call looks like local function call remote computer stub libraries must installed client server side client stub responsible conversion marshalling parameters used function call deconversion results passed server execution function server skeleton stub server side responsible deconversion parameters passed client conversion results execution function stubs generated one two ways server program implements procedure interface said export interface client program calls procedures interface said import interface writing distributed application programmer first writes interface definition using idl programmers write client program imports interface server program exports interface interface definition processed using idl compiler generate components combined client server programs without making changes existing compilers particular interface procedure interface compiler generate appropriate marshalling unmarshalling operations stub procedure header file supports data types interface definition header file included source files client server programs client stub procedures compiled linked client program server stub procedures compiled linked server program idl compiler designed process interface definitions use different languages enabling clients servers written different languages communicate using remote procedure calls achieve goal semantics transparency designers made rpc look like lpc using concept stubs hide actual rpc implementation programs interface underlying rpc system | [
9441,
4490,
10465,
5598
] | Test |
5,189 | 4 | Sandstorm_Enterprises:sandstorm enterprises sandstorm enterprises american computer security software vendor founded 1998 simson garfinkel james van bokkelen gene spafford dan geer january 2010 purchased niksun inc. sandstorm located greater boston area sandstorm major products phonesweep first commercial multi-line telephone scanner war dialer introduced 1998 netintercept commercial network forensics tool introduced 2001 designed second-generation network analysis tool netintercept operated primarily level tcp udp data streams application-layer objects transport 2002 sandstorm purchased lanwatch commercial packet-oriented lan monitor originally developed ftp software lanwatch sold separate product much functionality used netintercept display individual packets 2019 phonesweep product still sold supported niksun core parts netintercept product also still exist incorporated niksun netdetector network forensics product line | [
6712
] | Test |
5,190 | 2 | Hikarunix:hikarunix hikarunix discontinued linux distribution live cd format x86 architecture based damn small linux last updated 2005 name portmanteau name manga anime series hikaru go linux operating system kernel hikarunix based unix-like operating system hikarunix intended provide complete ultra-portable environment study playing game go complete beginner mori interactive way go included addition several books pdf form well complete offline copy sensei library intermediate players take advantage comprehensive joseki library collection 9500 challenging problems work called gogrinder expert use many online go clients study annotated games go masters even games analyzed contained within os fit mini- regular-sized cd installed harddrive put onto usb memory stick go enthusiasts use hikarunix everywhere | [
8837,
7435,
10127,
2321,
5397,
4887,
10394,
673,
3745,
10530,
6436,
9253,
10149,
11305,
7854,
7983,
2738,
4790,
823,
439,
56,
59,
7483,
3903,
4673,
2375,
4039,
8907,
1110,
9693,
2914,
485,
3685,
9064,
4841,
6890,
7913,
7020,
10860,
7534,
... | None |
5,191 | 4 | IPhone_Dev_Team:iphone dev team iphone dev team group engineers ios formerly iphone os community developed several tools enable use applications authorized apple inc iphone ipod touch ipad enable use iphone gsm carriers contracted apple applications provided owners ability sidestep limitations placed devices manufacturer allowing activities deep customization easy international roaming group tools became emblematic activities termed jailbreaking sim unlocking respectively extent electronic frontier foundation made primary example used petition create dmca anti-circumvention exemption jailbreaking apple executive greg joswiak vice president iphone product marketing quoted countering comment petition products maintained iphone dev team include | [
161,
1346,
9732,
5927,
6539,
3286,
4957
] | Test |
5,192 | 4 | FIPS_199:fips 199 fips 199 federal information processing standard publication 199 standards security categorization federal information information systems united states federal government standard establishes security categories information systems used federal government one component risk assessment fips 199 fips 200 mandatory security standards required fisma fips 199 requires federal agencies assess information systems categories confidentiality integrity availability rating system low moderate high impact category severe rating category becomes information system overall security categorization | [
5780,
2558
] | None |
5,193 | 8 | Bing_Webmaster_Tools:bing webmaster tools bing webmaster tools previously bing webmaster center free service part microsoft bing search engine allows webmasters add websites bing index crawler service also offers tools webmasters troubleshoot crawling indexing website sitemap creation submission ping tools website statistics consolidation content submission new content community resources bing webmaster center contains following tools features support webmasters access data manage websites bing | [
4704,
4458,
1943,
1372,
3836,
8639
] | None |
5,194 | 2 | Jean-Marie_Hullot:jean-marie hullot jean-marie hullot february 16 1954 – june 17 2019 french computer scientist programmer authored important programs original macintosh nextstep mac os x platforms include sos interface mac later became interface builder nextstep 1985 later still evolved important part mac os x also led ical isync development teams mac os x 2002 1981 jean-marie hullot received ph.d. computer science university paris orsay adviser gérard huet researcher inria 1979 1985 joined next 1996 co-founded realnames url translation service closed 2002 worked cto application division apple inc. 2001 2005 president ceo fotopedia collaborative photo encyclopaedia died june 17 2019 | [
10406,
7806,
9999
] | Test |
5,195 | 4 | Intruder_detection:intruder detection information security intruder detection process detecting intruders behind attacks unique persons technique tries identify person behind attack analyzing computational behaviour concept sometimes confused intrusion detection also known ids techniques art detecting intruder actions intruder detection systems try detect attacking system analyzing computational behaviour biometric behaviour keystroke dynamics paramount intruder detection techniques parameter classified real 'behavioural biometric pattern keystroke dynamics analyze times keystrokes issued computer keyboard cellular phone keypad searching patterns first techniques used statistics probability concepts like 'standard deviations 'mean later approaches use data mining neural networks support vector machine etc earlier works reference concept intruder authentication intruder verification intruder classification si6 project one first projects deal full scope concept confusion spanish translation 'intrusion detection system also known ids people translate 'sistemas de detección de intrusiones others translate 'sistemas de detección de intrusos former correct | [
5373,
5245,
10207
] | Test |
5,196 | 8 | Nhttpd:nhttpd nhttpd open-source web server also known nostromo web server designed marcus glocker runs single process handles normal concurrent connections select calls efficiency demanding connections directory listings cgi execution forks supports http/1.1 cgi/1.1 basic access authentication ssl ipv6 custom responses aliases virtual hosts security measures include running setuid chrooting public access controlled using world readable flags cgi execution world executable flags file system permissions | [
225,
9762,
7983,
2045,
5492,
2485,
823,
4797,
5470
] | None |
5,197 | 0 | Automatic_summarization:automatic summarization automatic summarization process shortening text document software order create summary major points original document technologies make coherent summary take account variables length writing style syntax automatic data summarization part machine learning data mining main idea summarization find subset data contains information entire set techniques widely used industry today search engines example others include summarization documents image collections videos document summarization tries create representative summary abstract entire document finding informative sentences image summarization system finds representative important i.e salient images surveillance videos one might want extract important events uneventful context two general approaches automatic summarization extraction abstraction extractive methods work selecting subset existing words phrases sentences original text form summary contrast abstractive methods build internal semantic representation use natural language generation techniques create summary closer human might express summary might include verbal innovations research date focused primarily extractive methods appropriate image collection summarization video summarization summarization task automatic system extracts objects entire collection without modifying objects examples include keyphrase extraction goal select individual words phrases tag document document summarization goal select whole sentences without modifying create short paragraph summary similarly image collection summarization system extracts images collection without modifying images extraction techniques merely copy information deemed important system summary example key clauses sentences paragraphs abstraction involves paraphrasing sections source document general abstraction condense text strongly extraction programs harder develop require use natural language generation technology growing field work done abstractive summarization creating abstract synopsis like human majority summarization systems extractive selecting subset sentences place summary machine learning techniques closely related fields information retrieval text mining successfully adapted help automatic summarization apart fully automated summarizers fas systems aid users task summarization mahs machine aided human summarization example highlighting candidate passages included summary systems depend post-processing human hams human aided machine summarization broadly two types extractive summarization tasks depending summarization program focuses first generic summarization focuses obtaining generic summary abstract collection whether documents sets images videos news stories etc. second query relevant summarization sometimes called query-based summarization summarizes objects specific query summarization systems able create query relevant text summaries generic machine-generated summaries depending user needs example summarization problem document summarization attempts automatically produce abstract given document sometimes one might interested generating summary single source document others use multiple source documents example cluster articles topic problem called multi-document summarization related application summarizing news articles imagine system automatically pulls together news articles given topic web concisely represents latest news summary image collection summarization another application example automatic summarization consists selecting representative set images larger set images summary context useful show representative images results image collection exploration system video summarization related domain system automatically creates trailer long video also applications consumer personal videos one might want skip boring repetitive actions similarly surveillance videos one would want extract important suspicious activity ignoring boring redundant frames captured high level summarization algorithms try find subsets objects like set sentences set images cover information entire set also called core-set algorithms model notions like diversity coverage information representativeness summary query based summarization techniques additionally model relevance summary query techniques algorithms naturally model summarization problems textrank pagerank submodular set function determinantal point process maximal marginal relevance mmr etc task following given piece text journal article must produce list keywords key phrase capture primary topics discussed text case research articles many authors provide manually assigned keywords text lacks pre-existing keyphrases example news articles rarely keyphrases attached would useful able automatically number applications discussed consider example text news article keyphrase extractor might select army corps engineers president bush new orleans defective flood-control pumps keyphrases pulled directly text contrast abstractive keyphrase system would somehow internalize content generate keyphrases appear text closely resemble human might produce political negligence inadequate protection floods abstraction requires deep understanding text makes difficult computer system keyphrases many applications enable document browsing providing short summary improve information retrieval documents keyphrases assigned user could search keyphrase produce reliable hits full-text search employed generating index entries large text corpus depending different literature definition key terms words phrases keyword extraction highly related theme beginning work turney many researchers approached keyphrase extraction supervised machine learning problem given document construct example unigram bigram trigram found text though text units also possible discussed compute various features describing example e.g. phrase begin upper-case letter assume known keyphrases available set training documents using known keyphrases assign positive negative labels examples learn classifier discriminate positive negative examples function features classifiers make binary classification test example others assign probability keyphrase instance text might learn rule says phrases initial capital letters likely keyphrases training learner select keyphrases test documents following manner apply example-generation strategy test documents run example learner determine keyphrases looking binary classification decisions probabilities returned learned model probabilities given threshold used select keyphrases keyphrase extractors generally evaluated using precision recall precision measures many proposed keyphrases actually correct recall measures many true keyphrases system proposed two measures combined f-score harmonic mean two f 2 pr p r matches proposed keyphrases known keyphrases checked stemming applying text normalization designing supervised keyphrase extraction system involves deciding several choices apply unsupervised first choice exactly generate examples turney others used possible unigrams bigrams trigrams without intervening punctuation removing stopwords hulth showed get improvement selecting examples sequences tokens match certain patterns part-of-speech tags ideally mechanism generating examples produces known labeled keyphrases candidates though often case example use unigrams bigrams trigrams never able extract known keyphrase containing four words thus recall may suffer however generating many examples also lead low precision also need create features describe examples informative enough allow learning algorithm discriminate keyphrases non- keyphrases typically features involve various term frequencies many times phrase appears current text larger corpus length example relative position first occurrence various boolean syntactic features e.g. contains caps etc turney paper used 12 features hulth uses reduced set features found successful kea keyphrase extraction algorithm work derived turney ’ seminal paper end system need return list keyphrases test document need way limit number ensemble methods i.e. using votes several classifiers used produce numeric scores thresholded provide user-provided number keyphrases technique used turney c4.5 decision trees hulth used single binary classifier learning algorithm implicitly determines appropriate number examples features created need way learn predict keyphrases virtually supervised learning algorithm could used decision trees naive bayes rule induction case turney genex algorithm genetic algorithm used learn parameters domain-specific keyphrase extraction algorithm extractor follows series heuristics identify keyphrases genetic algorithm optimizes parameters heuristics respect performance training documents known key phrases another keyphrase extraction algorithm textrank supervised methods nice properties like able produce interpretable rules features characterize keyphrase also require large amount training data many documents known keyphrases needed furthermore training specific domain tends customize extraction process domain resulting classifier necessarily portable turney results demonstrate unsupervised keyphrase extraction removes need training data approaches problem different angle instead trying learn explicit features characterize keyphrases textrank algorithm exploits structure text determine keyphrases appear central text way pagerank selects important web pages recall based notion prestige recommendation social networks way textrank rely previous training data rather run arbitrary piece text produce output simply based text intrinsic properties thus algorithm easily portable new domains languages textrank general purpose graph-based ranking algorithm nlp essentially runs pagerank graph specially designed particular nlp task keyphrase extraction builds graph using set text units vertices edges based measure semantic lexical similarity text unit vertices unlike pagerank edges typically undirected weighted reflect degree similarity graph constructed used form stochastic matrix combined damping factor random surfer model ranking vertices obtained finding eigenvector corresponding eigenvalue 1 i.e. stationary distribution random walk graph vertices correspond want rank potentially could something similar supervised methods create vertex unigram bigram trigram etc however keep graph small authors decide rank individual unigrams first step include second step merges highly ranked adjacent unigrams form multi-word phrases nice side effect allowing us produce keyphrases arbitrary length example rank unigrams find advanced natural language processing get high ranks would look original text see words appear consecutively create final keyphrase using four together note unigrams placed graph filtered part speech authors found adjectives nouns best include thus linguistic knowledge comes play step edges created based word co-occurrence application textrank two vertices connected edge unigrams appear within window size n original text n typically around 2–10 thus natural language might linked text nlp natural processing would also linked would appear string n words edges build notion text cohesion idea words appear near likely related meaningful way recommend reader since method simply ranks individual vertices need way threshold produce limited number keyphrases technique chosen set count user-specified fraction total number vertices graph top vertices/unigrams selected based stationary probabilities post- processing step applied merge adjacent instances unigrams result potentially less final keyphrases produced number roughly proportional length original text initially clear applying pagerank co-occurrence graph would produce useful keyphrases one way think following word appears multiple times throughout text may many different co-occurring neighbors example text machine learning unigram learning might co-occur machine supervised un-supervised semi-supervised four different sentences thus learning vertex would central hub connects modifying words running pagerank/textrank graph likely rank learning highly similarly text contains phrase supervised classification would edge supervised classification classification appears several places thus many neighbors importance would contribute importance supervised ends high rank selected one top unigrams along learning probably classification final post-processing step would end keyphrases supervised learning supervised classification short co-occurrence graph contain densely connected regions terms appear often different contexts random walk graph stationary distribution assigns large probabilities terms centers clusters similar densely connected web pages getting ranked highly pagerank approach also used document summarization considered like keyphrase extraction document summarization aims identify essence text real difference dealing larger text units—whole sentences instead words phrases getting details summarization methods mention summarization systems typically evaluated common way using so-called rouge recall-oriented understudy gisting evaluation measure recall-based measure determines well system-generated summary covers content present one human-generated model summaries known references recall-based encourage systems include important topics text recall computed respect unigram bigram trigram 4-gram matching example rouge-1 computed division count unigrams reference appear system count unigrams reference summary multiple references rouge-1 scores averaged rouge based content overlap determine general concepts discussed automatic summary reference summary determine result coherent sentences flow together sensible manner high-order n-gram rouge measures try judge fluency degree note rouge similar bleu measure machine translation bleu precision- based translation systems favor accuracy promising line document summarization adaptive document/text summarization idea adaptive summarization involves preliminary recognition document/text genre subsequent application summarization algorithms optimized genre first summarizes perform adaptive summarization created supervised text summarization much like supervised keyphrase extraction basically collection documents human-generated summaries learn features sentences make good candidates inclusion summary features might include position document i.e. first sentences probably important number words sentence etc main difficulty supervised extractive summarization known summaries must manually created extracting sentences sentences original training document labeled summary summary typically people create summaries simply using journal abstracts existing summaries usually sufficient sentences summaries necessarily match sentences original text would difficult assign labels examples training note however natural summaries still used evaluation purposes since rouge-1 cares unigrams duc 2001 2002 evaluation workshops tno developed sentence extraction system multi-document summarization news domain system based hybrid system using naive bayes classifier statistical language models modeling salience although system exhibited good results researchers wanted explore effectiveness maximum entropy classifier meeting summarization task known robust feature dependencies maximum entropy also applied successfully summarization broadcast news domain unsupervised approach summarization also quite similar spirit unsupervised keyphrase extraction gets around issue costly training data unsupervised summarization approaches based finding centroid sentence mean word vector sentences document sentences ranked regard similarity centroid sentence principled way estimate sentence importance using random walks eigenvector centrality lexrank algorithm essentially identical textrank use approach document summarization two methods developed different groups time lexrank simply focused summarization could easily used keyphrase extraction nlp ranking task lexrank textrank graph constructed creating vertex sentence document edges sentences based form semantic similarity content overlap lexrank uses cosine similarity tf-idf vectors textrank uses similar measure based number words two sentences common normalized sentences lengths lexrank paper explored using unweighted edges applying threshold cosine values also experimented using edges weights equal similarity score textrank uses continuous similarity scores weights algorithms sentences ranked applying pagerank resulting graph summary formed combining top ranking sentences using threshold length cutoff limit size summary worth noting textrank applied summarization exactly described lexrank used part larger summarization system mead combines lexrank score stationary probability features like sentence position length using linear combination either user-specified automatically tuned weights case training documents might needed though textrank results show additional features absolutely necessary another important distinction textrank used single document summarization lexrank applied multi-document summarization task remains cases—only number sentences choose grown however summarizing multiple documents greater risk selecting duplicate highly redundant sentences place summary imagine cluster news articles particular event want produce one summary article likely many similar sentences would want include distinct ideas summary address issue lexrank applies heuristic post-processing step builds summary adding sentences rank order discards sentences similar ones already placed summary method used called cross-sentence information subsumption csis methods work based idea sentences recommend similar sentences reader thus one sentence similar many others likely sentence great importance importance sentence also stems importance sentences recommending thus get ranked highly placed summary sentence must similar many sentences turn also similar many sentences makes intuitive sense allows algorithms applied arbitrary new text methods domain-independent easily portable one could imagine features indicating important sentences news domain might vary considerably biomedical domain however unsupervised recommendation -based approach applies domain multi-document summarization automatic procedure aimed extraction information multiple texts written topic resulting summary report allows individual users professional information consumers quickly familiarize information contained large cluster documents way multi-document summarization systems complementing news aggregators performing next step road coping information overload multi-document summarization may also done response question multi-document summarization creates information reports concise comprehensive different opinions put together outlined every topic described multiple perspectives within single document goal brief summary simplify information search cut time pointing relevant source documents comprehensive multi-document summary contain required information hence limiting need accessing original files cases refinement required automatic summaries present information extracted multiple sources algorithmically without editorial touch subjective human intervention thus making completely unbiased multi-document extractive summarization faces problem potential redundancy ideally would like extract sentences central i.e. contain main ideas diverse i.e. differ one another lexrank deals diversity heuristic final stage using csis systems used similar methods maximal marginal relevance mmr trying eliminate redundancy information retrieval results general purpose graph-based ranking algorithm like page/lex/textrank handles centrality diversity unified mathematical framework based absorbing markov chain random walks absorbing random walk like standard random walk except states absorbing states act black holes cause walk end abruptly state algorithm called grasshopper addition explicitly promoting diversity ranking process grasshopper incorporates prior ranking based sentence position case summarization state art results multi-document summarization however obtained using mixtures submodular functions methods achieved state art results document summarization corpora duc 04 07 similar results also achieved use determinantal point processes special case submodular functions duc-04 new method multi-lingual multi-document summarization avoids redundancy works simplifying generating ideograms represent meaning sentence document evaluates similarity qualitatively comparing shape position said ideograms recently developed tool use word frequency need training preprocessing kind works generating ideograms represent meaning sentence summarizes using two user-supplied parameters equivalence two sentences considered equivalent relevance long desired summary simplish simplifying summarizing tool performs automatic multi-lingual multi-document summarization idea submodular set function recently emerged powerful modeling tool various summarization problems submodular functions naturally model notions coverage information representation diversity moreover several important combinatorial optimization problems occur special instances submodular optimization example set cover problem special case submodular optimization since set cover function submodular set cover function attempts find subset objects cover given set concepts example document summarization one would like summary cover important relevant concepts document instance set cover similarly facility location problem special case submodular functions facility location function also naturally models coverage diversity another example submodular optimization problem using determinantal point process model diversity similarly maximum-marginal-relevance procedure also seen instance submodular optimization important models encouraging coverage diversity information submodular moreover submodular functions efficiently combined together resulting function still submodular hence one could combine one submodular function models diversity another one models coverage use human supervision learn right model submodular function problem submodular functions fitting problems summarization also admit efficient algorithms optimization example simple greedy algorithm admits constant factor guarantee moreover greedy algorithm extremely simple implement scale large datasets important summarization problems submodular functions achieved state-of-the-art almost summarization problems example work lin bilmes 2012 shows submodular functions achieve best results date duc-04 duc-05 duc-06 duc-07 systems document summarization similarly work lin bilmes 2011 shows many existing systems automatic summarization instances submodular functions breakthrough result establishing submodular functions right models summarization problems submodular functions also used summarization tasks tschiatschek et al. 2014 show mixtures submodular functions achieve state-of-the-art results image collection summarization similarly bairi et al. 2015 show utility submodular functions summarizing multi-document topic hierarchies submodular functions also successfully used summarizing machine learning datasets specific applications automatic summarization include common way evaluate informativeness automatic summaries compare human-made model summaries evaluation techniques fall intrinsic extrinsic inter-textual intra-textual intrinsic evaluation tests summarization system extrinsic evaluation tests summarization based affects completion task intrinsic evaluations assessed mainly coherence informativeness summaries extrinsic evaluations hand tested impact summarization tasks like relevance assessment reading comprehension etc intra-textual methods assess output specific summarization system inter-textual ones focus contrastive analysis outputs several summarization systems human judgement often wide variance considered good summary means making evaluation process automatic particularly difficult manual evaluation used time labor-intensive requires humans read summaries also source documents issues concerning coherence coverage one metrics used nist annual document understanding conferences research groups submit systems summarization translation tasks rouge metric recall-oriented understudy gisting evaluation essentially calculates n-gram overlaps automatically generated summaries previously-written human summaries high level overlap indicate high level shared concepts two summaries note overlap metrics like unable provide feedback summary coherence anaphor resolution remains another problem yet fully solved similarly image summarization tschiatschek et al. developed visual-rouge score judges performance algorithms image summarization domain independent summarization techniques generally apply sets general features used identify information-rich text segments recent research focus drifted domain-specific summarization techniques utilize available knowledge specific domain text example automatic summarization research medical text generally attempts utilize various sources codified medical knowledge ontologies main drawback evaluation systems existing far need least one reference summary methods one able compare automatic summaries models hard expensive task much effort done order corpus texts corresponding summaries furthermore methods need human-made summaries available comparison also manual annotation performed e.g scu pyramid method case evaluation methods need input set summaries serve gold standards set automatic summaries moreover perform quantitative evaluation regard different similarity metrics | [
5122,
2440,
2059,
6798,
11538,
1044,
5781,
5399,
538,
416,
11425,
3748,
10794,
8748,
7599,
4531,
4662,
3127,
2488,
10557,
6208,
11206,
3533,
6223,
8538,
10847,
5857,
7780,
6374,
7918,
8046,
8688,
10231,
8440,
7164
] | Test |
5,198 | 1 | PhpMyAdmin:phpmyadmin phpmyadmin free open source administration tool mysql mariadb portable web application written primarily php become one popular mysql administration tools especially web hosting services tobias ratschiller consultant later founder software company maguma started work php-based web front-end mysql 1998 inspired mysql-webadmin gave project phpadsnew also original author 2000 lack time time phpmyadmin already become one popular php applications mysql administration tools large community users contributors order coordinate growing number patches group three developers olivier müller marc delisle loïc chapeaux registered phpmyadmin project sourceforge took development 2001 july 2015 main website downloads left sourceforge moved content delivery network time releases began pgp-signed afterwards issue tracking moved github mailing lists migrated version 4 uses ajax extensively enhance usability software used html frames features provided program include | [
11392,
8195,
3462,
1929,
1802,
10254,
10258,
7453,
1950,
9503,
7339,
10413,
7983,
9010,
6721,
5827,
8644,
5964,
7506,
9687,
9177,
9562,
8539,
10459,
479,
6245,
8295,
8683,
5612,
2413,
3182,
7022,
3188,
888,
10873,
2810
] | Test |
5,199 | 8 | Mibbit:mibbit mibbit web-based client web browsers supports internet relay chat irc yahoo messenger twitter developed jimmy moore designed around ajax model user interface written javascript irc application setup default firefox mibbit user interface operates entirely within web browser require installation software user computer modern web browsers support recent versions javascript supported including mozilla firefox internet explorer opera google chrome safari mobile devices apple iphone ipod touch nokia n800 platforms nintendo wii also supported unlike typical web-based irc clients mibbit makes use client–server design model user interface written html javascript using ajax programming techniques client backend written completely java operates independently web server standalone fashion mibbit server design differs web browser component clients chatzilla java applet based irc clients pjirc operate entirely within web browser also differs server-based web proxy irc clients processing takes place remote server client–server design allows centralized mibbit client server mibbit able offer extended functionality present standard irc protocol extensions include channel chat buffer shown mibbit clients join channel another mibbit user already present notification mibbit users typing message distinctive icons allow identification device used mibbit iphone ipod touch wii etc mibbit supports webirc cgiirc protocol allows client send user ip address hostname irc server servers support webirc allow mibbit users appear regular irc clients instead appearing connect mibbit.com domain webirc used unavailable mibbit puts user hostname client realname field encodes user ip address hexadecimal sends ident reply mibbit client ability connect multiple irc servers including servers use ssl/tls join multiple channels configured auto-join often used channels mibbit uses utf-8 character set default also configured use character sets supports nickname tab auto-completion input history tab accessible up/down arrow keys aliases user menu commands saving user preferences mibbit parse smilies links channels nicks mirc color codes automatically create thumbnails image links urls addition mibbit offers integrated pastebin upload service minify urls mibbit also offers typing notification mibbit users recent chat buffer irc channels mibbit users already channel extended whois information user profiles mibbit supports google api allows client support number google services mibbit translate text conversations fly using google translate mibbit also display geographic locations using google maps supports viewing youtube videos addition standard client mibbit also supports widget client embedded web page widget client supports features regular client support multiple server connections mibbit praised cnet lifehacker ease use drupal administrators use add irc widgets sites noting benefits modular design mashable suggests mibbit appropriate resource new irc firefox 3.5 beyond builds already support mibbit default irc protocol handler support encrypted ircs // ssl/tls connections also included mibbit effectively irc proxy potential abused used evade bans blocks resulted client banned accessing irc networks channels mibbit supports dnsbl checking via dronebl service means help block access abusive users botnets mibbit listed open proxy dronebl dns blacklist december 2008 due database glitch mistakenly listed march 2009 prevented mibbit users connecting irc networks make use dronebl service mibbit added dronebl whitelist help prevent future service disruptions june 19 2009 banned permanently freenode new officially supported open-source ajax client introduced | [
5760,
1537,
5251,
9732,
3462,
8584,
1802,
4490,
6797,
4883,
5397,
8224,
5677,
7861,
1346,
5316,
2387,
3030,
5591,
5078,
7384,
225,
2409,
5612,
2804,
4725
] | None |
5,200 | 4 | EIDAS:eidas eidas electronic identification authentication trust services eu regulation set standards electronic identification trust services electronic transactions european single market established eu regulation 910/2014 23 july 2014 electronic identification repeals directive 1999/93/ec 13 december 1999 entered force 17 september 2014 applies 1 july 2016 except certain articles listed article 52 organizations delivering public digital services eu member state must recognize electronic identification eu member states september 29 2018. eidas oversees electronic identification trust services electronic transactions european union internal market regulates electronic signatures electronic transactions involved bodies embedding processes provide safe way users conduct business online like electronic funds transfer transactions public services signatory recipient convenience security instead relying traditional methods mail facsimile appearing person submit paper-based documents may perform transactions across borders like 1-click technology eidas created standards electronic signatures qualified digital certificates electronic seals timestamps proof authentication mechanisms enable electronic transactions legal standing transactions performed paper regulation came effect july 2014 means facilitate secure seamless electronic transactions within european union member states required recognise electronic signatures meet standards eidas eidas result european commission focus europe digital agenda commission oversight eidas implemented spur digital growth within eu intent eidas drive innovation adhering guidelines set technology eidas organisations pushed towards using higher levels information security innovation additionally eidas focuses following regulation provides regulatory environment following important aspects related electronic transactions eidas regulation evolved directive 1999/93/ec set goal eu member states expected achieve regards electronic signing regulation became directly binding law throughout eu july 1 2016 directive made eu member states responsible creating laws would allow meet goal creating electronic signing system within eu directive also allowed member state interpret law impose restrictions thus preventing real interoperability leading toward fragmented scenario contrast directive eidas ensures mutual recognition eid authentication among member states thus achieving goal digital single market eidas provides tiered approach legal value requires electronic signature denied legal effect admissibility court solely advanced qualified electronic signature qualified electronic signatures must given legal effect handwritten signatures electronic seals legal entities version signatures probative value explicitly addressed seals enjoy presumption integrity correctness origin attached data database information linked kind identity number certify person right access personal information involves several steps eidas minimum identity concept name birth date order access sensitive information kind certification needed identity numbers issued two countries refer person | [
3264,
2948,
9576,
5674,
1836,
9901,
2286,
4015,
9744,
8018,
1496,
5433,
8859,
5373,
10046,
3231
] | None |
5,201 | 2 | Nokia_phone_series:nokia phone series nokia strategic nomenclature traced back 2005 nseries line launched offering devices flagship specifications premium hardware various price points devices considered bread butter company often positioned showcase latest technologies thanks newfound consumer enterprise interest smartphones time company introduced four additional collections diversify product portfolio meet demands market segments new phone series named eseries targeting small business enterprise customers xseries providing consumer-grade multimedia-focused devices cseries nokia used target low-end mid-range market segments tseries devices exclusive chinese market nokia nseries multimedia smartphone tablet product family served company flagship portfolio aimed users looking pack many features possible one device nokia eseries stands executive consists business-oriented smartphones emphasis enhanced connectivity support corporate e-mail push services phones enterprise market list may also include upcoming devices others previously intended part series scrapped renamed due nokia number-only naming change phones included series nokia xseries stands xpress younger users phones included line feature phones smartphones include features focusing social entertainment music special dedicated keys inbuilt storage facilities succeeded nokia xpressmusic brand phones list may also include upcoming devices others previously intended part series scrapped renamed due nokia number-only naming change phones included series nokia cseries stands core nokia calls core range products offering different phones low-end high-end various markets list may also include upcoming devices others previously intended part series scrapped renamed due nokia number-only naming change phones included series nokia zseries stands zuper supposed nokia meego tablet series originally intended released 2010 early 2011 tablets cancelled unknown reasons product name revealed ovi store november 2010 list may also include upcoming devices others previously intended part series scrapped renamed due nokia number-only naming change tablets included series nokia tseries stands time china-specific line phones made cater services offered china technologies web features disabled replaced country proprietary inventions instance phones offered series would include td-scdma ev-do networks dominant marketplace line launched 13 june 2011 chinese version nokia conversations blog list may also include upcoming devices phones included series nokia aseries stands asha means hope feature-phone line introduced nokia nokia world 2011 phones series developing markets younger users messaging connectivity list may also include upcoming devices phones included series nokia lseries stands lumia means light series smartphones originally made nokia using windows phone operating system officially unveiled nokia world 2011 created exclusive partnership february year allow nokia use modify microsoft mobile operating system devices come host nokia-exclusive services microsoft purchased nokia devices services division april 2014 since lumia series manufactured exclusively microsoft subsidiary microsoft mobile initially retaining nokia branding later dropped favor microsoft first generation phones series include nokia lumia 510 nokia lumia 610 nokia lumia 710 nokia lumia 800 nokia lumia 900 run windows phone 7 subsequent generations use windows phone 8 windows phone 8.1 full list devices found microsoft lumia list lumia devices | [
1537,
8577,
6276,
3205,
11655,
9359,
1424,
529,
2449,
8083,
10770,
5143,
2072,
7063,
5274,
5019,
5659,
669,
8472,
11545,
2208,
4003,
4132,
6310,
167,
40,
3626,
5290,
10410,
5938,
10802,
7220,
821,
5175,
5178,
7866,
2492,
1216,
1728,
7617,... | Test |
5,202 | 7 | Cloud_collaboration:cloud collaboration cloud collaboration way sharing co-authoring computer files use cloud computing whereby documents uploaded central cloud storage accessed others cloud collaboration technologies allow users upload comment collaborate documents even amend document evolving document businesses last years increasingly switching use cloud collaboration cloud computing marketing term technologies provide software data access storage services require end-user knowledge physical location configuration system delivers services parallel concept drawn electricity grid end-users consume power without needing understand component devices infrastructure required utilize technology collaboration refers ability workers work together simultaneously particular task document collaboration completed face face however collaboration become complex need work people world real time variety different types documents using different devices 2003 report mapped five reasons workers reluctant collaborate result many providers created cloud collaboration tools include integration email alerts collaboration software ability see viewing document time tools team could need put one piece software workers longer rely email cloud file sharing collaboration software collaboration limited primitive less effective methods email ftp among others work particularly well early moves cloud computing made amazon web services 2006 began offering infrastructure services businesses form web services cloud computing began come prominence 2007 google decided move parts email service public cloud long ibm microsoft followed suit lotuslive business productivity online standard suite bpos respectively increase cloud computing services cloud collaboration able evolve since 2007 many firms entered industry offering many features many analysts explain rise cloud collaboration pointing increasing use workers non-authorised websites online tools jobs includes use instant messaging social networks survey taken early 2011 22 workers admitted used one external non-authorised websites cloud collaboration packages provide ability collaborate documents together real time making use non-authorised instant messaging redundant managers properly regulate internet based collaboration system tailor made office also noted cloud collaboration become necessary departments workforces become mobile need access important documents wherever whether internet browser newer technologies smartphones tablet devices tech industry saw several large paradigm changes revolutions brought new economies scale cost-per-transaction cost automating office desktop processes finally cost network bandwidth fell quickly enabled business users apply ict solutions broadly create business value analysts forrester gartner etc believe cloud computing help unleash next wave tech-enabled business innovation mainframe era client/server initially viewed toy technology viable mainframe replacement yet time client/server technology found way enterprise similarly virtualization technology first proposed application compatibility concerns potential vendor lock-in cited barriers adoption yet underlying economics 20 30 percent savings compelled cios overcome concerns adoption quickly accelerated early cloud collaboration tools quite basic limited features newer packages much document-centric approach collaboration sophisticated tools allow users tag specific areas document comments delivered real time viewing document cases collaboration software even integrated microsoft office allow users set video conferences furthermore trend firms employ single software tool solve collaboration needs rather rely multiple different techniques single cloud collaboration providers replacing complicated tangle instant messengers email ftp cloud collaboration today promoted tool collaboration internally different departments within firm also externally means sharing documents end-clients receiving feedback makes cloud computing versatile tool firms many different applications business environment best cloud collaboration tools 2011 report gartner outlines five stage model maturity firms comes uptake cloud collaboration tools firm first stage said reactive email collaboration platform culture resists information sharing firm fifth stage called pervasive universal access rich collaboration toolset strong collaborative culture article argues firms second stage cloud collaboration becomes important analysts expect see majority firms moving model | [
2432,
1801,
4236,
10893,
911,
1935,
4623,
8592,
5499,
2965,
2328,
4377,
8986,
2720,
9632,
6307,
8998,
5159,
9766,
6444,
8495,
3121,
3633,
8117,
11190,
7352,
10168,
1083,
3388,
2496,
4289,
1602,
7364,
1224,
8520,
4429,
7248,
1362,
467,
968... | None |
5,203 | 8 | Parse.ly:parse.ly parse.ly technology company provides web analytics content optimization software online publishers parse.ly built three products parse.ly reader parse.ly publisher platform latest parse.ly dash analytics tool large publishers parse.ly content optimization platform online publishers parse.ly product dash built top parse.ly platform dash parses articles publisher site analyzes identify data around metrics specific publishers topics authors sections referrers technology uses natural language processing extracted 350,000 unique topics urls crawled addition providing site analytics dash show users topics resonating people across web webwide trends interface parse.ly founded sachin kamdar andrew montalenti dreamit ventures early stage startup accelerator program philadelphia launched first product parse.ly reader september 2009 may 2009 parse.ly received 20k seed funding dreamit ventures december 2010 parse.ly received 1.8m series funding blumberg capital ff venture capital scott becker cofounder invite media hutchison jonathan axelrod jeffrey greenblatt august 2017 parse.ly received series b funding round 6.8 million round led grotech investors blumberg capital | [
6576,
7780,
6701
] | Test |
5,204 | 9 | P′′:p′′ p′′ p double prime primitive computer programming language created corrado böhm 1964 describe family turing machines formula_1 hereinafter written p′′ formally defined set words four-instruction alphabet formula_2 follows böhm gives following program compute predecessor x -1 integer x 0 translates directly equivalent brainfuck program program expects integer represented bijective base-k notation formula_39 encoding digits formula_40 respectively formula_11 digit-string e.g. bijective base-2 number eight would encoded formula_42 8 bijective base-2 112 beginning end computation tape-head formula_11 preceding digit-string | [
9345,
2619,
8262,
7395
] | None |
5,205 | 5 | RSSOwl:rssowl rssowl news aggregator rss atom news feeds written java built eclipse rich client platform uses swt widget toolkit allow fit look feel different operating systems remaining cross-platform released eclipse public license rssowl free software addition full text searches saved searches notifications filters rssowl v2.1 synchronized discontinued google reader rssowl began small project sourceforge end july 2003 first public version 0.3a rssowl 1.0 released december 19 2001 released support rss atom news feeds initial release also supported exporting feeds pdf rtf html release available windows mac linux solaris rssowl 1.1 added support toolbars quicksearch news feeds version 1.2 improved toolbar customization added support atom 1.0 news feeds versions 1.2.1 1.2.2 added universal binary support mac well drag drop tabs built feed validator rssowl sourceforge project month january 2005 rssowl 2.0 announced march 7 2007 eclipsecon 2007 version 2.0 rebuilt eclipse rich client platform used db4o database storage lucene text searching several milestone versions released final 2.0 version added labeling news feeds pop-up notification new feeds storage news articles news bins final 2.0 version released milestone 9 added support secure password credential storage news filters support embedding firefox 3.0 xulrunner render news feeds proxy support windows rssowl 2.1 released july 15 2011 google reader synchronization support new layouts rssowl longer maintained original developer however maintained fork available known rssowlnix rssowl translated many languages bengali bulgarian czech chinese simplified chinese traditional danish dutch english finnish french galician german greek hungarian italian japanese korean norwegian polish portuguese russian serbian cyrillic serbian latin slovenian spanish swedish thai turkish ukrainian | [
1664,
3971,
8584,
4490,
10126,
11418,
2076,
1834,
4013,
5677,
559,
7983,
9908,
7488,
10057,
4310,
5078,
6231,
6237,
10722,
2149,
5605,
8169,
9451,
5612,
8557,
11000,
5114
] | Test |
5,206 | 6 | CacheFS:cachefs cachefs name used several similar software technologies designed speed distributed file system file access networked computers technologies operate storing cached copies files secondary memory typically local hard disk file accessed done locally much higher speeds networks typically allow cachefs software used several unix-like operating systems original unix version developed sun microsystems 1993 another version written linux released 2003 network filesystems dependent network link remote server obtaining file filesystem significantly slower getting file locally reason desirable cache data filesystems local disk thus potentially speeding future accesses data avoiding need go network fetch software check remote file changed since cached much faster reading whole file sprite operating system used large disk block caches located main-memory achieve high performance file system term cachefs found little use describe caches main memory first cachefs implementation 6502 assembler write cache developed mathew r mathews grossmont college used fall 1986 spring 1990 three diskless 64 kb main memory apple iie computers cache files nestar file server onto big board 1 mb dram secondary memory device partitioned cachefs tmpfs computers ran pineapple dos apple dos 3.3 derivative developed course follow wr bornhorst nsf funded instructional computing system pineapple dos features including caching unnamed name cachefs introduced seven years later sun microsystems first unix cachefs implementation developed sun microsystems released solaris 2.3 operating system release 1993 part expanded feature set nfs network file system suite known open network computing plus onc+ subsequently used unix operating systems irix starting 5.3 release 1994 linux operating systems commonly use new version cachefs developed david howells howells appears rewritten cachefs scratch using sun original code linux cachefs currently designed operate andrew file system network file system filesystems similar naming fs-cache cachefs terminology confusing outsiders cachefs backend fs-cache handles actual data storage retrieval fs-cache passes requests netfs cachefs cache facility/layer cache backends like cachefs nfs afs cachefs filesystem fs-cache facility block device used cache simply mounting needs special activation deactivated unmounting daemon using existing filesystem ext3 user_xattr cache cache bound cachefilesd -s project status seems stalled people attempting revive code bring date facility conceptualised following diagram facility known fs-cache designed transparent possible user system applications able use nfs files normal without knowledge cache outdated articles | [
9665,
9762,
2314,
823,
11501,
11568,
3826,
5397,
2199,
8379,
5471
] | None |
5,207 | 2 | Christoph_Junghans:christoph junghans christoph junghans german computational physicist academic working multiscale modeling computational co-design currently deputy group leader applied computer science group los alamos national laboratory born merseburg educated leipzig university johannes gutenberg university mainz phd 2010 graduate studies also worked forschungszentrum jülich ibm systems technology group junghans joined los alamos national laboratory 2011 postdoc theoretical division became staff member applied computer science group 2014 junghans one authors votca package contributor many open-sources projects including gromacs gentoo linux | [
3323
] | None |
5,208 | 1 | Titan_traffic_database:titan traffic database titan traffic database database allegedly use swedish signals intelligence agency national defence radio establishment fra according news report rapport svt june 2008 based account anonymous source source alleged agency storing massive amounts information talking content leading private citizen lodging complaint police ultimately prosecutor launch full-scale investigation deemed illegal time | [
2901
] | Test |
5,209 | 1 | ALTIBASE_HDB:altibase hdb altibase hybrid database relational open source database management system manufactured altibase corporation software comes hybrid architecture allows access memory-resident disk-resident tables using single interface supports synchronous asynchronous replication offers real-time acid compliance support also offered variety sql standards programming languages important capabilities include data import export data encryption security multiple data access command sets materialized view temporary tables others altibase so-called hybrid dbms meaning simultaneously supports access memory-resident disk-resident tables via single interface compatible solaris hp-ux aix linux windows supports complete sql standard features multiversion concurrency control mvcc implements fuzzy ping-pong checkpointing periodically backing memory-resident data ships replication database link functionality altibase acquired in-memory database engine electronics telecommunications research institute february 2000 commercialized database october year 2001 altibase changed name in-memory database product spiner altibase 2001 2004 altibase integrated in-memory database disk-resident database create hybrid dbms released version 4.0 renamed altibase hdb altibase released version 5.5.1 6.1.1 2012 version 6.3.1 november 2013 6.5.1 may 2015 altibase claims world first hybrid dbms altibase hdb includes following application development interfaces | [
8644,
8582,
4781,
6797,
7983,
10413,
3219,
3573,
823,
1304
] | None |
5,210 | 7 | SAP_SE:sap se sap se systems applications products data processing german multinational software corporation makes enterprise software manage business operations customer relations sap headquartered walldorf baden-württemberg germany regional offices 180 countries company 425,000 customers 180 countries component euro stoxx 50 stock market index xerox exited computer hardware manufacturing industry 1971 asked ibm migrate business systems ibm technology part ibm compensation migration ibm given rights scientific data systems sds /sape software reportedly contract credit 80,000 five ibm engineers ai department dietmar hopp klaus tschira hans-werner hector hasso plattner claus wellenreuther mannheim baden-württemberg working enterprise-wide system based software told would longer necessary rather abandoning project decided leave ibm tech start another company june 1972 founded sap system analysis program development sapd company private partnership german civil code first client german branch imperial chemical industries östringen developed mainframe programs payroll accounting instead storing data punch cards mechanically ibm stored locally electronic system using common logical database activities organization therefore called software real-time system since need process punch cards overnight reason flagship product carried r name late 1990s first version also standalone software could offered interested parties 1973 first commercial product launched sap completes first financial accounting system rf system serves cornerstone ongoing development software modules system eventually bear name sap r/1 offered common system multiple tasks permitted use centralized data storage improving maintenance data technical point view therefore database necessary 1976 sap gmbh systeme anwendungen und produkte der datenverarbeitung systems applications products data processing founded sales support subsidiary five years later private partnership dissolved rights passed sap gmbh headquarters moved following year walldorf germany three years later 1979 sap launched sap r/2 expanding capabilities system areas material management production planning 1981 sap brought re-designed product market however sap r/2 improve period 1985 1990 sap released new sap r/3 1992 sap developed released several versions r/3 1995 mid-1990s sap followed trend mainframe computing client/server architectures development sap internet strategy mysap.com redesigned concept business processes integration via internet result r/3 replaced introduction sap erp central component ecc 5.0 2004 architectural changes also made support enterprise service architecture transition customers services-oriented architecture latest version sap erp 6.0 released 2006 sap erp 6.0 since updated sap enhancement packs recent sap enhancement package 8 sap erp 6.0 2016 august 1988 sap gmbh became sap ag public trading started 4 november 1988 shares listed frankfurt stuttgart stock exchanges 1995 sap included german stock index dax 22 september 2003 sap included stoxx europe 50 company official name became sap ag public limited company 2005 annual general meeting 2014 sap changed ag european company societas europaea se since 2012 sap acquired several companies sell cloud-based products several multibillion-dollar acquisitions seen analysts attempt challenge competitor oracle 2014 sap bought concur technologies provider cloud-based travel expense management software 8.3 billion sap expensive purchase date analysts reactions purchase mixed thomas becker commerzbank questioning whether concur right choice sap credit suisse called acquisition aggressive move 2014 ibm sap began partnership sell cloud-based services likewise 2015 sap also partnered hpe provide secure hybrid cloud-based services running sap platform hpe ibm provide infrastructure services sap sap runs sap hana cloud solution top sap announced additional partnerships microsoft order give customers tools data visualization well improved mobile applications sap exceeded revenue projections due expansion cloud business success sap hana growth also partially attributed acquisitions concur fieldglass company announced plans 2016 invest heavily technology relating internet things iot part strategy capitalize growth market purpose €2 billion planned investment relevant sectors end 2020 sap also launch new product line called sap iot combine large amounts data things connected internet machine learning sap real-time database s/4 hana 2015 company launched sap s/4hana newest generation sap business suite written natively sap hana platform offers cloud on-premises hybrid deployment options customers benefits including smaller data footprint higher throughput faster analytics faster access data also allows existing sap business suite customers upgrade product sap business suite 2016 sap introduced sap hana express edition meant run personal computers cloud computing platforms students small-scale developers january 29 2019 sap announced plans cut approximately 4,000 positions company strategic plan shift modern cloud-based technologies blockchain quantum computing machine learning internet things artificial intelligence fiscal year 2017 sap reported earnings eur€4 billion annual revenue eur€23.5 billion increase 6.3 previous fiscal cycle sap shares traded usd105 per share market capitalization valued usd128 billion december 2018 makes sap valuable company germany sap world third largest software programming company corporation operates europe asia africa middle east north america south america sap focuses 25 industries six industry sectors process industries discrete industries consumer industries service industries financial services public services offers integrated product sets large enterprises mid-sized companies small businesses service-oriented architecture incorporated sap erp enterprise resource planning system products defined within sap enterprise services architecture enterprise soa sap enterprise service oriented architecture enterprise soa sap se service-oriented architecture implementation enterprise soa enabled sap netweaver platform builds benefits web services sap positioned enterprise soa deliver benefits offered service-oriented architecture including enabling flexibility business efficiency sap markets enterprise soa cost-effective way adding new applications existing infrastructure sap solutions currently use enterprise soa mysap crm mysap erp mysap srm sap partners include global services partners cross-industry multinational consulting capabilities global software partners providing integrated products complement sap business suite solutions global technology partners providing user companies wide range products support sap technology including vendors hardware database storage systems networks mobile computing technology extensions partners companies provide functionality complements sap product capabilities products certified sold supported sap partner companies include adobe ca technologies gk software hewlett-packard ids scheer mendix opentext knoa software backoffice associates sap also partnered apple work mobile experience sap enterprise customers part partnership new sap hana cloud platform sdk would delivered exclusively ios result developers build applications based sap hana cloud platform iphone ipad devices partnership announced may 2016 sap products small businesses midsize companies delivered global partner network sap partneredge programme sap partner programme offers set business enablement resources program benefits help partners including value-added resellers vars independent software vendors isvs profitable successful implementing selling marketing developing delivering sap products broad range customers sap community network scn community sap customers partners employees influencers – typically roles developers consultants integrators business analysts – gain share knowledge abap java .net soa technologies plus analytics dashboards business process best practices cloud mobile big data range topics via blogs discussion forums downloads code samples training materials technical library sap uses two-tier structure boards executive board supervisory board 2016 members executive board bill mcdermott ceo chairman joined 2008 robert enslin 2014 bernd leukert 2014 luka mucic cfo 2014 michael kleinemeier 2015 stefan ries 2016 steve singh 2016 gerhard oswald 1996 juergen mueller join executive board 2019 functional units sap split across different organizational units r needs field activities customer support sap labs mainly responsible product development whereas field organizations spread across country responsible field activities sales marketing consulting headquarters responsible overall management well core engineering activities related product development worldwide customer support provided field organizations unified organization called active global support ags sap labs r locations develop improve sap core products sap labs strategically located high-tech clusters around globe four prominent labs sap se located germany india china us labs walldorf founded 1972 became sap primary location beginning focus sap expansion entering highly developed markets 1993 palo alto became part sap labs aiming acquire talented employees sap opened another lab bangalore 2003 among latest sap labs labs czech republic slovakia poland three labs established 2016 labs india largest labs outside germany order manage sap labs sap labs network sln created sln global unit manages regional labs shares best business practices coordinates distributes development projects among individual sap labs locations accelerates product delivery gives sap full access talent drives sap corporate strategy regarding innovation business growth sap user groups independent nonprofit organizations sap customers sap partners serve communications channel members towards sap sap towards markets americas sap users group asug company largest user group 100,000 individuals 3,800 companies asug members professionals work 17 industries many technical business process experts sap ecosystem varied levels experience come small businesses global corporations well universities 2007 sap user group executive network sugen established sap provoked controversy frustration among users 2008 raising cost maintenance contracts issue subject intense discussion among user groups sap cloud platform sap platform-as-a-service paas used deliver in-memory capabilities microservices building extending mobile-enabled cloud applications infrastructure offered global network sap managed data centers sap cloud platform open platform-as-a-service includes in-memory sap hana database management system connects premises cloud-based systems running sap third-party software relies open standards like java javascript node.js cloud foundry integration options sap cloud platform promoted build extend business applications rapid innovation cycles sap apple inc. partnered develop mobile applications ios using cloud-based software development kits sdks sap cloud platform sap founding development partners cloud platform include accenture celonis enterprisealumni walmart sap cloud platform based open source technology developed supported partnership suse company also partnership cloud foundry beta offering sap cloud platform enables customers test give feedback functionalities coming cloud foundry sap launched sap store march 2015 principal e-commerce property allow customers buy products directly web rather traditional sales channels customers purchase free trials starter editions pay credit card paypal launched 2016 sap app center online application marketplace third-party applications integrate extend sap products applications available free well via yearly monthly subscription models applications available range integrations content management software mobile approval management payment platforms july 2018 features 1,500 applications sap two annual conferences sap competitors primarily enterprise resource planning software industry field oracle corporation sap major competitor sap also competes customer relationship management marketing sales software manufacturing warehousing industrial software supply chain management logistics software sectors oracle corporation filed lawsuit sap malpractice unfair competition california courts 2007 sap lost case 2010 ordered pay 1.3 billion cited largest copyright infringement judgment history verdict overturned 2011 lawsuit finally settled 2014 356.7 million resulting pressure saw sap sugen sap user group executive network agree major benchmarking exercise prove value new support pricing policy customers december 2009 sap delayed enterprise support price rises agreement reached benchmarks kpis key performance indicators january 2010 sap reversed direction enterprise support reintroduced standard support package customers move reinstate standard support – 18 percent annual license fees enable customers choose option best meets requirements company said august 2013 sap acquired german software company hybris ecommerce capabilities sap donated several millions dollars variety global health causes including product red campaign global fund addition sap distributed free software south africa part effort towards developing future markets company also encourages employees volunteer social sabbaticals sending teams people different countries aid non-profits sap employees volunteered china india brazil south africa sap arena opened mannheim 2005 home adler mannheim ice hockey team rhein-neckar löwen handball team since 2013 company name sponsor sap center san jose california team also sponsors formula one racing team mclaren nfl teams new york giants new york jets city football group esports squad team liquid sap ambassadors include german tennis player angelique kerber german eventing rider ingrid klimke south african golfers ernie els gary player branden grace sap also engages outreach activities within company 2013 company launched initiative hire employees autism asperger syndrome citing undervalued ability contribute workforce sap aims compose 1 workforce individuals autism year 2020 february 2019 sap accused ‘ improper conduct ’ linked state contracts kenya tanzania anonymous whistle-blower claims firm attorneys sap used twenty third century systems ttcs bribe officials tanzania ports authority tpa win us 6.6-million enterprise resource planning software tender involved provision software licenses services july 2017 allegations made sap involved business transactions controversial politically influential gupta family south africa sap accused paying cad house gupta-controlled company r100 million order secure transnet deal sap denied allegations claiming money paid extension sales force despite cad house prior sap experience guptas dealings sap revealed widely publicized e-mail leak consequence allegations sap launched investigation led four south african managers placed administrative leave along seizure mobile phones computers claas kuehnemann named acting managing director africa investigation continued 26 october 2017 sap announced voluntarily reported u.s. securities exchange commission possible violation us law including foreign corrupt practices act related south african bribery allegations sap investigation conducted law firm baker mckenzie revealed sap paid 7.7 million commissions third-parties linked gupta family securing contracts worth 48 million transnet eskom may 2015 sap agreed pay 3.9 million settle u.s. securities exchange commission civil charges former executive scheme bribe panama government officials order win lucrative technology contracts | [
11136,
6018,
6539,
9732,
9988,
5384,
6153,
4234,
4107,
4236,
4363,
270,
1423,
5258,
17,
530,
1041,
6284,
9360,
10386,
10389,
10511,
10396,
9629,
9248,
2338,
2596,
10020,
11687,
7721,
10236,
4781,
10413,
8751,
5173,
3894,
10553,
1856,
2496,
... | None |
5,211 | 2 | Nokia_Eseries:nokia eseries nokia eseries consists business-oriented smartphones running symbian os emphasis enhanced connectivity support corporate e-mail push services well enterprise-styled products many featuring qwerty keyboards devices advanced office features s60 platform phones equipped wireless lan also provide voip client sip protocol throughout series lifetime main competitors blackberry products research motion eseries marketed 2011 october 12 2005 mobile phone manufacturer nokia announced company refers eseries consisting three mobile phones nokia e60 nokia e61 nokia e70 may 18 2006 nokia announced addition e50 series refers business device rather smartphone february 12 2007 nokia announced addition three new devices series e61i e65 e90 april 11 2008 nokia australia advised e61i discontinued may 2008 replaced featured smaller e71 later releases included e72 e52 e5 last eseries device nokia e6 2011 | [
1537,
8577,
3205,
11655,
4365,
9359,
1424,
529,
2449,
8083,
10770,
5143,
2072,
7063,
5274,
5019,
5659,
669,
8472,
10271,
2208,
11545,
4003,
4132,
6310,
167,
40,
3626,
5290,
10410,
10802,
7220,
821,
5175,
7866,
1083,
1728,
7617,
4291,
7877... | Test |
5,212 | 1 | Corpus_manager:corpus manager corpus manager corpus browser corpus query system tool multilingual corpus analysis allows effective searching corpora corpus manager usually represents complex tool allows one perform searches language forms sequences may provide information context allow user search positional attributes lemma tag etc called concordances features include ability search collocations frequency statistics well metadata information processed text narrower meaning corpus manager refers server side corpus query engine whereas client side simply called user interface corpus manager software installed personal computer might provided web service | [
6144,
8440,
5214
] | Train |
5,213 | 9 | Higher-order_abstract_syntax:higher-order abstract syntax computer science higher-order abstract syntax abbreviated hoas technique representation abstract syntax trees languages variable binders abstract syntax tree abstract mathematical object certain structure nature instance first-order abstract syntax foas trees commonly used compilers tree structure implies subexpression relation meaning parentheses required disambiguate programs concrete syntax hoas exposes additional structure relationship variables binding sites foas representations variable typically represented identifier relation binding site use indicated using identifier hoas name variable use variable refers directly binding site number reasons technique useful first makes binding structure program explicit need explain operator precedence foas representation need rules binding scope hand interpret hoas representation second programs alpha-equivalent differing names bound variables identical representations hoas make equivalence checking efficient one mathematical object could used implement hoas graph variables associated binding sites via edges another popular way implement hoas example compilers de bruijn indices domain logical frameworks term higher-order abstract syntax usually used refer specific representation uses binders meta-language encode binding structure object language instance logical framework lf λ-construct arrow → type first-order encoding object language construct codice_1 would using twelf syntax codice_2 family object language expressions family codice_3 representation variables implemented perhaps natural numbers shown constant codice_4 witnesses fact variables expressions constant codice_1 expression takes three arguments expression bound variable bound another expression variable bound within canonical hoas representation object language would representation object level variables appear explicitly constant codice_1 takes expression bound meta-level function codice_2 → codice_2 body let function higher-order part expression free variable represented expression holes filled meta-level function applied concrete example would construct object level expression assuming natural constructors numbers addition using hoas signature codice_9 twelf syntax function formula_1 specific representation advantages beyond ones one reusing meta-level notion binding encoding enjoys properties type-preserving substitution without need define/prove way using hoas drastically reduce amount boilerplate code binding encoding higher-order abstract syntax generally applicable object language variables understood variables mathematical sense stand-ins arbitrary members domain often always case instance advantages gained hoas encoding dynamic scope appears dialects lisp dynamically scoped variables act like mathematical variables | [
1952,
6753,
3554,
10510,
6070,
10011,
5885,
4670
] | Train |
5,214 | 1 | Sketch_Engine:sketch engine sketch engine corpus manager text analysis software developed lexical computing limited since 2003 purpose enable people studying language behaviour lexicographers researchers corpus linguistics translators language learners search large text collections according complex linguistically motivated queries sketch engine gained name one key features word sketches one-page automatic corpus-derived summaries word grammatical collocational behaviour currently supports provides corpora 90+ languages sketch engine product lexical computing limited company founded 2003 lexicographer research scientist adam kilgarriff started collaboration pavel rychlý computer scientist working natural language processing centre masaryk university developer manatee bonito two major parts software suite introduced concept word sketches since sketch engine commercial software however core features manatee bonito developed 2003 extended since freely available gpl license within nosketch engine suite sketch engine consists three main components underlying database management system called manatee web interface search front-end called bonito web interface corpus building management called corpus architect manatee database management system specifically devised effective indexing large text corpora based idea inverted indexing keeping index positions given word text used index text corpora comprising tens billions words searching corpora indexed manatee performed formulating queries corpus query language cql manatee written c++ offers api number programming languages including python java perl ruby recently rewritten go faster processing corpus queries bonito web interface manatee providing access corpus search client–server model manatee server bonito plays client part written python corpus architect web interface providing corpus building management features also written python sketch engine used major british publishing houses producing dictionaries macmillan english dictionary dictionnaires le robert oxford university press shogakukan four uk ’ five biggest dictionary publishers use sketch engine | [
5380,
3462,
8582,
3721,
5903,
1044,
1435,
9245,
5667,
5677,
2222,
7983,
10160,
823,
9552,
11348,
5212,
7134,
9577,
8554,
4971,
113,
4468
] | Test |
5,215 | 3 | PlayStation_2_Expansion_Bay:playstation 2 expansion bay playstation 2 expansion bay 3.5 drive bay introduced model 30000 50000 playstation 2 replacing pcmcia slot used models 10000 15000 18000 longer present model 70000 designed network adaptor internal hard disk drive hdd peripherals enhance capabilities ps2 allow online play features shown e3 2001 network adaptor released together launch playstation 2 network play service two models adapter available one dial-up modem ethernet jack broadband internet connection sold north america one ethernet interface sold europe regions start-up disc network access disc included network adaptor installs file memory card connection settings accessible one network adaptor compatible game tony hawk pro skater 3 released november 2001 supported network adaptor hardware software finalized much later network adaptor also provides parallel ata interface molex disk drive power connector allow installation 3.5 ide hard disk drive expansion bay two disk connectors separate circuit boards main network adapter one third party connector replacements including sata connector sata ide converter available slimline playstation 2 models ethernet port built-in official hard disk drive interface however first slimline model scph-70000 complete network adapter onboard including analog modem earliest north american models may modified add external ide connector board scph-75000 series onwards ethernet functionality integrated i/o processor completely internally redesigned completely removing disk interface maximum supported rate 100mbit/s full duplex also backwards compatible 10mbit/s hardware configurations playstation 2 hard disk drive ps2 hdd released july 19 2001 japan together network adaptor march 23 2004 north america requires network adaptor connect playstation 2 receive power hdd 40 gb capacity used games reduce load time putting data hard drive temporarily back memory card data due magicgate copyright protection programs bootable directly hdd e.g playstation broadband navigator playonline viewer pop n music puzzle-dama online keyed system system installs hdd transferred another playstation 2 system files hdd accessed specific programs booted without reinstalled contrary popular belief complete reformat hdd necessary upon transfer hdd consoles else would useful hdd preformatted preinstalled software case north american hdd unit hdd utility disc included allow maintenance hdd including defragmentation disk repair formatting utilities along file manager browser north america final fantasy xi also included 35 north american games support hdd unofficial software called hd loader later also hd advance open playstation loader allow users copy entire games hdd run without discs also allow using standard consumer hard drives ps2 however compatible software expecting standard ps2 hard drive software combined hard drive allows one play games without using original disc desirable protects fragile perhaps rare game discs harm cases may improve performance however practice without controversy hdloader bypasses usual copy protection mechanisms built console allowing piracy linux kit playstation 2 released 2002 included playstation 2 linux software keyboard mouse vga adapter requires rgb monitor sync-on-green network adaptor ethernet 40 gb hard disk drive allows playstation 2 used personal computer mid 2010 possible install use playstation bb navigator ps-bbn hdd-osd hdd utility-disc every playstation 2 console every region achieved use special patched files hdd-osd ps-bbn modified version ulaunch well known piece playstation 2 homebrew software called hacked-ule also possible install homebrew software hdd make launchable hdd-osd ps-bbn game-channel like official hdd game however installing homebrew software hdd still requires much work hex-editor ps-bbn also fully translated given language translation process involves use beta-linux release playstation 2 specially compiled kernel gives access apa-reiserfs partitions 2013 games use hdd install data decrease load time and/or save/load instead using memory card used playstation 2 console region hdd using hex-editor atadpatcher v0.02 type booting software esr well known piece homebrew software ps2 patched copy hdd-osd and/or playstation bb navigator ps-bbn used users see data currently installed way official sony 40 gb hdd scph-20401 | [
1091,
9512,
10316,
6799,
5974,
823,
6873,
10203,
6845,
1599
] | None |
5,216 | 4 | Ashkan_Soltani:ashkan soltani ashkan soltani chief technologist federal trade commission previously independent privacy security researcher based washington dc 2010 2011 worked us federal trade commission staff technologist division privacy identity protection assisted investigations google facebook also worked primary technical consultant wall street journal know series investigating online privacy 2011 testified two different hearings held us senate committees focused privacy related matters julia angwin 2014 book dragnet nation describes soltani 'the leading technical expert ad tracking technology part team washington post shared 2014 pulitzer prize public service guardian us earned 2014 gerald loeb award large newspapers coverage disclosures surveillance done us national security agency soltani first high-profile research project 2009 study supported national science foundation team research ubiquitous secure computing documenting use zombie flash cookies several online advertising networks soltani colleagues berkeley revealed websites recreating tracking cookies consumers deleted storing unique tracking identifiers flash cookies automatically deleted consumers cleared browser cookies publication soltani research class action law firms filed suit several advertising networks websites quantcast clearspring videoegg collectively agreed pay total 3.4 million settle lawsuits 2011 soltani berkeley law professor chris hoofnagle published follow-up study documenting use web browser cache etags store persistent identifiers case flash cookies identifiers stored etags persisted even consumers deleted browser cookies etag tracking issue caught attention several members congress wrote federal trade commission september 2011 urged agency investigate use advanced tracking technologies potentially unfair deceptive business practice several companies performing etag based tracking identified research team subsequently sued class action lawyers january 2013 kissmetrics online advertising network settled etag related lawsuit 500,000 | [
7893,
7887
] | None |
5,217 | 4 | Vera_Security:vera security vera data-centric security platform enables organizations effectively protect kind data policies rules governing access usage data regardless data resides travels vera enables global tracking auditing management data comprehensive security service saas platform vera also provides developers access downloadable software development kit sdk vera launched product april 2015 within first year operations announced partnerships dropbox okta centrify well strategic integrations box vmware microsoft office vera focuses sales marketing efforts large enterprises industries financial services manufacturing media entertainment technology sectors carlos delatorre serves chief executive officer since 2018 joining vera carlos led global sales organization mongodb world ’ fastest-growing database ecosystem first enterprise database company successfully ipo 26 years also served vice president sales clearslide inc. drove enterprise sales strategy business growth prior clearslide carlos served vice president sales dynamicops acquired vmware also held senior sales leadership roles bmc software bladelogic imlogic oblix company headquartered silicon valley secured venture financing notable investors including battery ventures sutter hill ventures capital one growth ventures vera nominated top 10 finalist innovation sandbox competition rsa conference 2016 crn magazine named vera “ 10 coolest security startups 2015 ” since vera additional awards vera privately funded company 31 million venture financing company announced 14 million series round november 2014 included hiring robin daniels cmo february 2016 vera announced 17 million series b round led sutter hill ventures participation existing investors battery ventures amplify partners private investors may 2016 capital one growth ventures joined company series b round financing founding ceo veritas software mark leslie joined vera board directors roger lee battery ventures stefan dyckerhoff sutter hill ventures also serve company board content storage agnostic platform vera capable securing type digital content anywhere ’ stored vera require end-users download proprietary agents plug-ins access secure data offers native integrations common file sharing enterprise platforms like box dropbox okta microsoft office 365 vera incorporates three primary components platform architecture secure cloud platform set end-user clients web-based administration dashboard vera dashboard gives end-users administrators full visibility control activity around content matter stored transmitted vera dashboard admin manage access controls set update policies oversee users activity run audit reports usage vera software development kit march 2016 vera announced sdk allows developers add encryption tracking policy enforcement access control custom legacy business applications vera sdk enables users programmatically execute following tasks device secure files unsecure files give access file specific users groups domains revoke access file specific users groups domains revoke access file users | [
3880,
6153,
3629,
4623,
7899
] | Test |
5,218 | 0 | Native-language_identification:native-language identification native-language identification nli task determining author native language l1 based writings second language l2 nli works identifying language-usage patterns common specific l1 groups applying knowledge predict native language previously unseen texts motivated part applications second-language acquisition language teaching forensic linguistics amongst others nli works assumption author l1 dispose towards particular language production patterns l2 influenced native language relates cross-linguistic influence cli key topic field second-language acquisition sla analyzes transfer effects l1 later learned languages using large-scale english data nli methods achieve 80 accuracy predicting native language texts written authors 11 different l1 backgrounds compared baseline 9 choosing randomly identification l1-specific features used study language transfer effects second-language acquisition useful developing pedagogical material teaching methods l1-specific instructions generating learner feedback tailored native language nli methods also applied forensic linguistics method performing authorship profiling order infer attributes author including linguistic background particularly useful situations text e.g anonymous letter key piece evidence investigation clues native language writer help investigators identifying source already attracted interest funding intelligence agencies natural language processing methods used extract identify language usage patterns common speakers l1-group done using language learner data usually learner corpus next machine learning applied train classifiers like support vector machines predicting l1 unseen texts range ensemble based systems also applied task shown improve performance single classifier systems various linguistic feature types applied task include syntactic features constituent parses grammatical dependencies part-of-speech tags surface level lexical features character word lemma n-grams also found quite useful task however seems character n-grams single best feature task building educational applications bea workshop naacl 2013 hosted inaugural nli shared task competition resulted 29 entries teams across globe 24 also published paper describing systems approaches | [
7780,
1044,
8759
] | Test |
5,219 | 9 | JavaScript_OSA:javascript osa javascript osa originally javascript osa abbreviated jsosa freeware inter-process communication scripting language macintosh computer javascript osa uses core language mozilla implementation javascript programming language see spidermonkey language used alternative applescript language use unrelated web browser-based scripting seen similar function microsoft jscript .net language windows machines although interoperability two languages system-level scripting language identical mozilla core language extensions added via core object macos object macos object methods obtaining objects bound applications done via appleevent messaging system part macintosh open scripting architecture language first released 2001 bundled late night software flagship product script debugger may 2005 new alpha version language made available testing improved second version language bundled version 4 script debugger javascript osa eventually discontinued due lack interest dropped script debugger 5 2012 os x yosemite introduced javascript automation jxa system-wide support scripting javascript built upon javascriptcore open scripting architecture features objective-c bridge enables entire cocoa applications programmed javascript | [
1409,
259,
3462,
6791,
10507,
8854,
4378,
8605,
7455,
3761,
9780,
11060,
438,
5311,
7871,
9152,
8262,
11087,
339,
84,
4822,
4056,
9560,
603,
482,
7396,
10470,
487,
5483,
9195,
8303,
10991,
10097,
6143
] | Validation |
5,220 | 2 | FlexOS:flexos flexos discontinued modular real-time multiuser multitasking operating system rtos designed computer-integrated manufacturing laboratory retail financial markets developed digital research flexible automation business unit monterey california since november 1986 marketed since january 1987 reengineered continuation digital research concurrent dos 286 multiuser multitasking operating system flexos designed frank holsworth like portable cp/m concurrent dos 286 concurrent dos 68k concurrent dos v60 flexos written c higher portability across hardware platforms featured low interrupt latency fast context switching supported popular ssl/tls libraries wolfssl original protected mode flexos 286 version 1.3 designed host machines equipped 286 cpus adaptations nec v60 nec v70 motorola 68000 processors planned flexos 286 executables using system native int dch int 220 application program interface filename extension .286 cp/m api front-end fe available well using extension .cmd executables filename extension .68k reserved flexos 68k file extension derived concurrent dos 68k 1986 may 1987 flexos version 1.31 released 80286 machines developer version required ibm pc/at-compatible machine 640 kb conventional 512 kb extended memory either monochrome cga ega graphics adapter flexos supported concept dynamically loadable unloadable subdrivers came driver prototypes floppies hard disks printers serial interfaces ram disks mice console drivers boot flex286.sys kernel would load resource managers device drivers specified config.sys binary file mixed similarly named config.sys configuration file dos shell command.286 would execute config.bat startup batch job instead common autoexec.bat flexos optional dos emulator provided limited pc dos 2.1 compatibility dos .com .exe programs certain restrictions applied since programs executed processor protected mode due bugs earlier steppings intel 80286 flexos 286 dos front-end required least 80286 e2 stepping function properly see loadall problems already caused delays delivery concurrent dos 286 earlier system optionally supported multitasking gem vdi graphical applications flexos 1.31 could linked none either two modules flexos 1.31 also supported flexnet june 1987 also versions 1.0 flexos 386 hosts flexos 186 remote cell controllers flexos 386 provided windowing feature offered pc dos 3.2 gem compatibility flexos 286 flexos 386 versions 2.0 registered 3 july 1989 among major flexos customers 1990/1991 fanuc ibm icl nixdorf siemens tec thorn emi software micrologic novell bought digital research july 1991 x/gem flexos release 1.0 a.k.a x/gem flexos 286 386 flexnet registered 21 december 1992 flexos used primary test platform new novell embedded systems technology nest novell decided abandon development various digital research operating systems multiuser dos successor concurrent dos novell dos successor dr dos sold flexos santa clara california-based integrated systems inc. isi july 1994 deal comprised direct payment half sum well shares representing 2 company company already psos+ another modular real-time multitasking operating system embedded systems continued maintain flexos well flexos version 2.33 current may 1998 flexos 2.34 released soon added support faster cpus 64 mb memory eide atapi cdrom drives integrated systems bought competitor wind river systems february 2000 owned intel since 2009 following list commands supported flexos known flexos versions include motorola 68000 freescale/nxp coldfire mcf5251 platform intel 80286 platform intel 80186/nec v20/v30 platform intel 80386 platform nec v60 platform named ibm 4680 os version 1 ibm originally chose dr concurrent dos 286 basis ibm 4680 computer ibm plant system products point-of-sale terminals 1986 last release ibm 4680 os version 4 replaced ibm 4690 version 1 versions july 1993 ibm announced adoption flexos version 2.32 basis ibm 4690 os version 1 pre-released 24 september 1993 generally made available 25 march 1994 flexos 2.32 supported 286 386 modes efficient memory management better console pipe systems brought overall quality performance improvements compared version came ibm 4680 os version 4 removed limits number applications running concurrently due efficient use kospool order support java ibm 4690 os version 2 brought support long filenames means virtual filesystem vfs architecture introduced fat32 volumes according year store ihl consulting group/ris news ibm 4690 os still market share 12 pos register/client market june 2005 ibm starting phase favour ibm retail environment suse ires ibm continue maintain 4690 os april 2015 recent version released ibm may 2012 ibm 4690 os version 6 release 3 meanwhile toshiba released toshiba 4690 os version 6 release 4 january 2014 siemens used still maintains flexos factory automation equipment well example s5 step-5 operating system s5-dos/mt based flexos 386 x/gem flexnet btrieve whereas smaller s5-dos system also present systems variant digital research personal cp/m-86 siemens industrial systems like coros ls-b/flexos coros os-b/flexos gracis/flexos os-525 flexos x/gem-based computers pc 16-20 pc 32 series available flexos well japanese post office shared terminals iii ctm iv based flexos | [
6148,
8729,
10273,
5677,
573,
6207,
8262,
2138,
5220,
7269,
1126,
9829,
8301,
2672,
9329,
4727,
2168,
11383,
6778,
2172,
2179,
6276,
10883,
3216,
9366,
7319,
2201,
2729,
7849,
178,
6325,
7356,
1219,
1221,
6342,
9927,
1750,
8410,
9946,
585... | Validation |
5,221 | 4 | Administrative_share:administrative share administrative shares hidden network shares created windows nt family operating systems allow system administrators remote access every disk volume network-connected system shares may permanently deleted may disabled administrative shares accessed users without administrative privileges administrative shares collection automatically shared resources including following administrative shares following characteristics administrative shares created windows xp home edition administrative shares deleted network share recreated automatically next reboot however possible disable administrative shares disabling administrative shares without caveats previous versions local files feature windows vista windows 7 requires administrative shares operate windows xp implements simple file sharing also known forceguest feature enabled computers part windows domain enabled authenticates incoming access requests network shares guest user account limited access rights windows effectively disables access administrative shares default windows vista later use user account control uac enforce security one uac features denies administrative rights user accesses network shares local computer network unless accessing user registered windows domain using built administrator account windows domain possible allow administrative share access accounts administrative permissions adding localaccounttokenfilterpolicy value registry | [
9442,
9762,
5636,
7244,
537,
7983,
8976,
601,
7515
] | Validation |
5,222 | 2 | SystemTap:systemtap computing systemtap codice_1 scripting language tool dynamically instrumenting running production linux kernel-based operating systems system administrators use systemtap extract filter summarize data order enable diagnosis complex performance functional problems systemtap consists free open-source software includes contributions red hat ibm intel hitachi oracle community members systemtap debuted 2005 red hat enterprise linux 4 update 2 technology preview four years development systemtap 1.0 released 2009 tracepoints cpython vm jvm added systemtap 1.2 systemtap files written systemtap language saved codice_2 files run codice_1 command-line system carries number analysis passes script allowing run scripts may executed one three backends selected codice_4 option default loadable kernel module fullest capability inspect manipulate part system therefore requires privilege another backend based dynamic program analysis library dyninst instrument user user-space programs requires least privilege newest backend based ebpf byte-code limited linux kernel interpreter capabilities requires intermediate level privilege case module unloaded script finished running scripts generally focus events starting finishing script compiled-in probe points linux tracepoints execution functions statements kernel user-space guru mode scripts may also embedded c may run codice_5 command-line option however use guru mode discouraged systemtap release includes probe points designed remove need guru-mode scripts guru mode required order permit scripts modify state instrumented software apply types emergency security fixes systemtap release 1.7 software implements new stapsys group privilege level following script shows applications setting tcp socket options system options set whether option set successfully many examples shipped systemtap also real-world examples systemtap use war stories page systemtap attach dtrace markers compiled application using macros codice_6 header file | [
4616,
3082,
5139,
10780,
10785,
6180,
8242,
9266,
9780,
4161,
8772,
6213,
8262,
8268,
589,
593,
6244,
10856,
4207,
5244,
4734,
11391,
7812,
7821,
4238,
10382,
2195,
2711,
6808,
9882,
1694,
2723,
8364,
10924,
10933,
5815,
5822,
5824,
1736,
... | Test |
5,223 | 7 | ProActive:proactive proactive parallel suite open-source software enterprise workload orchestration part ow2 community workflow model allows define set executables scripts written scripting language along dependencies proactive parallel suite schedule orchestrate executions optimising use computational resources hood proactive parallel suite relies active object -based java framework optimise task distribution ensure fault-tolerance model created denis caromel professor university nice sophia antipolis several extensions model made later members oasis team inria book theory distributed objects presents asp calculus formalizes proactive features provides formal semantics calculus together properties proactive program execution active objects basic units activity distribution used building concurrent applications using proactive active object runs thread thread executes methods invoked active object active objects passive objects subsystem belongs active object proactive programmer explicitly manipulate thread objects unlike standard java active objects created hosts involved computation active object created activity fact runs thread location local remote perfectly transparent active object manipulated passive instance class active object composed two objects body standard java object body visible outside active object body responsible receiving calls requests active object storing queue pending calls executes calls order specified synchronization policy synchronization policy specified calls managed first first fifo manner thread active object chooses method queue pending requests executes parallelism provided inside active object important decision proactive design enabling use pre-post conditions class invariants side subsystem sends call active object active object represented proxy proxy generates future objects representing future values transforms calls request objects terms metaobject reification performs deep copies passive objects passed parameters proactive library designed developing applications model introduced eiffel// parallel extension eiffel programming language model application structured subsystems one active object therefore one thread subsystem one subsystem active object thread subsystem thus composed one active object number passive objects—possibly passive objects thread one subsystem executes methods objects subsystem shared passive objects subsystems features impact application topology objects make subsystem—the active object passive objects—only active object known objects outside subsystem objects active passive may references onto active objects object o1 reference onto passive object o2 o1 o2 part subsystem also consequences semantics message-passing subsystems object subsystem calls method active object parameters call may references passive objects subsystem would lead shared passive objects passive objects passed parameters calls active objects always passed deep-copy active objects hand always passed reference symmetrically also applies objects returned methods called active objects thanks concepts asynchronous calls futures data sharing application written proactive n't need structural change—actually hardly change all—whether runs sequential multi-threaded distributed environment whenever possible method call active object reified asynchronous request possible call synchronous blocks reply received request asynchronous immediately returns future object future object acts placeholder result not-yet-performed method invocation consequence calling thread go executing code long n't need invoke methods returned object need arises calling thread automatically blocked result method invocation yet available although future object structure similar active object future object active stub proxy code excerpt highlights notion future objects suppose user calls method foo method bar active object foo method returns void bar method returns object class v foo called active object returns immediately current thread execute methods subsystem similarly bar called returns immediately result v ca n't computed yet future object placeholder result method invocation returned point view caller subsystem difference future object object would returned call issued onto passive object methods returned calling thread continues executing code call effectively performed role future mechanism block caller thread gee method called v result yet set inter-object synchronization policy known wait-by-necessity | [
7054,
785,
7699,
11674,
7963,
6815,
5798,
9126,
6184,
2345,
4909,
5677,
7983,
7218,
8501,
5948,
4286,
2113,
8514,
5956,
4423,
1480,
1866,
8523,
4308,
344,
2264,
731,
2140,
11487,
4194,
5090,
7142,
5612,
3449,
7802,
508,
3197,
8447
] | Test |
5,224 | 7 | Wave_(financial_services_and_software):wave financial services software wave company provides suite financial services online software small businesses wave headquartered leslieville neighbourhood toronto canada company manages 244 billion income expense transactions customers including 16 billion annual invoicing company first product free online accounting software designed businesses 1-9 employees followed invoicing personal finance receipt-scanning software ocr 2012 wave began branching financial services initially payments wave credit card processing payroll wave followed lending wave february 2017 2010 wave launched first free double-entry accounting platform cloud included unlimited bank data downloads company initial product accounting wave double entry accounting tool services include direct bank data imports invoicing expense tracking customizable chart accounts journal transactions accounting wave integrates expense tracking software shoeboxed e-commerce website etsy next product launched payroll wave launched 2012 acquisition smallpayroll.ca payroll wave available u.s.a. canada invoicing wave offshoot company earlier accounting tools additional products launched shortly company rebrand december 2012 include wave also produces free mobile applications integrate online functionality 2017 wave signed agreement provide platform rbc online business banking site rbc-wave service co-branded wave currently supports adding custom taxes via settings however must manually apply tax every transaction come way automate currently supports tax exclusive pricing us sales tax taxes added top prices quoted two effects makes unable handle taxes countries like australia prices must quoted inclusive taxes gst way set invoice total wave calculate tax portion fine b2b businesses makes software unsuitable b2c businesses wave provides software free 3 million customers 200 countries worldwide revenue company comes paid financial services company offers wave previously included advertising pages source revenue advertising removed january 2017 wave software free opposed freemium tools used without tiers limits indefinitely wave currently disclose revenue financial statements publicly however media reports 2016 indicated annual revenues 20 million time 2017 wave raised 24m usd funding led nab ventures ceo kirk simpson cpo james lochrie launched wave accounting inc. july 2009 wave accounting launched public november 16 2010 june 2011 series funding led omers ventures closed september 2011 feddev ontario invested one million dollars funding october 2011 5-million investment led u.s. venture capital firm charles river ventures announced may 2012 wave accounting closed series b financing round led social+capital partnership follow-on participation charles river ventures omers ventures wave acquired company called small payroll november 2011 later launched payroll product called wave payroll february 2012 wave officially launched wave payroll public canada followed american release november year august 2012 company announced acquisition vuru.co online stock-tracking service terms deal disclosed december 2012 company rebranded wave emphasize broadened spectrum services june 11 2019 company announced acquired tax preparation company h r block 537 million | [
7489,
1539,
5224,
11113,
7532,
10509,
1008,
1680,
8307
] | Validation |
5,225 | 2 | List_of_features_removed_in_Windows_Vista:list features removed windows vista windows vista contains many new features number capabilities certain programs part previous windows versions windows xp removed changed – later re-introduced windows 7 following list features present windows xp removed windows vista | [
1030,
6151,
11270,
11283,
537,
9762,
3109,
11301,
7207,
1577,
6697,
10282,
1581,
3629,
1077,
1081,
4162,
582,
1098,
4170,
4174,
4178,
8798,
10338,
4712,
617,
8296,
8299,
3181,
7796,
6265,
8315,
636,
639,
10879,
641,
5761,
651,
6797,
10896... | None |
5,226 | 4 | WARP_(information_security):warp information security warning advice reporting point warp community internal company-based service share advice information computer-based threats vulnerabilities warps typically provide average warps cost much less set computer emergency response centre cert/cc us-cert | [
612,
5636,
6648,
4081,
2648,
2558
] | None |
5,227 | 6 | Single-source_publishing:single-source publishing single-source publishing also known single-sourcing publishing content management method allows source content used across different forms media one time labor-intensive expensive work editing need carried one document source document stored one place reused reduces potential error corrections made one time source document benefits single-source publishing primarily relate editor rather user user benefits consistency single-sourcing brings terminology information assumes content manager applied organized conceptualization underlying content poor conceptualization make single-source publishing less useful single-source publishing sometimes used synonymously multi-channel publishing though whether two terms synonymous matter discussion general definition single-source publishing single official delineation single-source publishing multi-channel publishing official governing bodies provide delineation single-source publishing often understood creation one source document authoring tool converting document different file formats human languages multiple times minimal effort multi-channel publishing either seen synonymous single-source publishing similar one source document process results mere reproduction source origins single-source publishing lie indirectly release windows 3.0 1990 eclipsing ms-dos graphical user interfaces help files went unreadable text along bottom screen hypertext systems winhelp on-screen help interfaces allowed software companies cease printing large expensive help manuals products reducing costs producer consumer system raised opportunities well many developers fundamentally changed way thought publishing writers software documentation simply move writers traditional bound books writers electronic publishing rather became authors central documents could reused multiple times across multiple formats first single-source publishing project started 1993 cornelia hofmann schneider electric seligenstadt using software based interleaf automatically create paper documentation multiple languages based single original source file xml developed mid- late-1990s also significant development single-source publishing method xml markup language allows developers separate documentation two layers shell-like layer based presentation core-like layer based actual written content method allows developers write content one time switching multiple different formats delivery methods mid-1990s several firms began creating using single-source content technical documentation boeing helicopter sikorsky aviation pratt whitney canada user manuals ford owners manuals based tagged sgml xml content generated using arbortext epic editor add-on functions developed contractor concept behind usage complex hierarchical content lend discrete componentization could used across variety requirements tagging differences within single document using capabilities built sgml xml ford example able tag single owner manual files 12 model years could generated via resolution script running single completed file pratt whitney likewise able tag 20 subsets jet engine manuals single-source files calling desired version publication time world book encyclopedia also used concept tag articles american british versions english starting early 2000s single-source publishing used increasing frequency field technical translation still regarded efficient method publishing material different languages printed manual translated example online help software program manual accompanies could automatically generated using method metadata could created entire manual individual pages files could translated metadata one step removing need recreate information even database structures although single-source publishing decades old importance increased urgently 2010s consumption information products rises number target audiences expands work developers content creators within industry software documentation perception choice embrace single-source publishing render one operations obsolete editors using single-source publishing criticized below-standard work quality leading critics describe single-source publishing conveyor belt assembly content creation heavily used technical translation risks error regard indexing two words might synonyms english may synonyms another language document produced via single-sourcing index translated automatically two words rendered synonyms synonyms source language target language | [
9166,
479
] | Test |
5,228 | 9 | Tom_(pattern_matching_language):tom pattern matching language tom programming language particularly well-suited programming various transformations tree structures xml based documents tom language extension adds new matching primitives c java well support rewrite rules systems rules controlled using strategy language tom good | [
8262,
2374,
9320,
9926,
5677,
2045,
479
] | Validation |
5,229 | 4 | Verax_(film):verax film verax five-minute 2013 short film edward snowden leaking event hong kong produced amateur filmmakers hong kong posted youtube june 2013 name film originates snowden codename means truth teller latin produced group j.shot videos according producers first film ever produced snowden film four parts first depicts central intelligence agency employees discussing snowden case second involves newspaper journalist corresponding snowden third involves hong kong police officers chinese ministry state security employees discussing trying find edward snowden fourth involves characters waiting snowden appear snowden reveals media end film includes extracts snowden interview guardian final captions state snowden departed hong kong 23 june film features mira hong kong hotel snowden stayed rubik cube item according agence france-presse snowden reportedly used identify guardian journalist featured film marcus tsui one project filmmakers described film snapshot time andreas wiseman screen daily wrote plot uses large degree creative licence film created expatriates australia canada ireland united states producers film jeff floro edwin lee shawn tse marcus tsui lee irish citizen sole professional filmmaker involved served editor cinematographer lee served journalist multimedia television sectors worked south china morning post atv home 11 july 2013 two days snowden revealed identity edwin lee contacted friends possibility making film lee tsui created film script one day shooting actors time rehearse lines according producers film intended homage hong kong lee said intrigued snowden came hong kong us love hong kong death call hong kong home filmmakers group youtube page stated nearly every media outlet wanted get hands decided produce short fiction video depict experience hk would affected certain parties namely cia contingent based hk would tasked find snowden hong kong police would stuck u.s. china journalists want get scoop lee said film created catch onto interest snowden attention hong kong according tse 28-year-old native toronto ontario graduate york university film studies programme worked teacher hong kong tried give hong kong limelight think deserves tse said group initially considered outright comedy spoof thriller style jason bourne ultimately opted depiction events may unfolded lee said bourne film series works director michael mann inspired regards snowden presence filmmakers stated snowden central character prominent maelstrom events surrounding knew little snowden give prominent role story lee said film focuses vignettes snowden snowden serves catalyst events affect characters snowden live dialogue film lee said half film focus hong kong half snowden four filmmakers stated political motives shawn tse said knew right get-go film going neutral possible way try infringe upon basically thought snowden trying really idea lee described film snapshot time said snowden popped hong kong got much attention really got people talking wanted give alternative view situation beyond media chase knew cassandra chan served associate producer said us government abused internet response use power internet hopefully good reasons dean napolitano wall street journal wrote film makes subtle observations hong kong sometimes tense relationship mainland china one country two systems policy – underscored scene security official china central government barks orders hong kong police officers aforementioned scene official mainland speaks mandarin hong kong officials speak cantonese according napolitano film implies chinese authorities real power hong kong lee stated scene vehicle represent hong kong relationship china paraphrased alexis lai cnn murkiness beijing role snowden affair regards scene lee said say china n't pulling strings would naïve ... even though gives us autonomy always beijing calls shots officially officials mainland government said influence decisions hong kong authorities 1 july 2013 edwin lee said snowden left hong kong plans write sequel 29 july 2013 filmmakers plans show film film festivals considered making sequel film shot three four days time shooting snowden hiding within hong kong end film production snowden fled russia edwin lee said quickened editing process film could released sooner shorten project agence france-presse stated film stayed true actual locations hong kong snowden reportedly seen scenes shot mira hotel several office interiors used scenes lingerie company let filmmakers use offices edwin lee one filmmakers said filming style lot adrenaline ... guerilla filmmaking style also stated foot-on-the-gas filmmaking lee described filming style docu-drama recreation napolitano said ways resembles modern hong kong crime drama technical dialogue sterile conference rooms time-lapse photography sweeping aerial shots city famous skyline jonathan dehart diplomat stated usage time-lapse-style footage grey clouds hong kong panoramas shaky cam style features spy genre films film used original photography exception two stock photography shots purchased pond5 28 june 2013 filmmakers yet determined total cost film estimate budget 5,000 hong kong dollars 641 us dollars afp said budget shoestring patrick frater variety stated 1 june 2013 total cost 4,200 hkd 550 us adam withnall belfast telegraph said budget 645 u.s. dollars £420 british pounds one-night stay mira expensive single item budget made one third budget filmmakers stated make film gain return investment jeff floro works finance day job said lost money film dean napolitano wall street journal wrote film quite saturday night live -style spoof neither slick thriller given cast non-actors micro budget rebecca keegan los angeles times stated verax feels quite polished insta-film due presence electronic music soundtrack likens soundtrack social network sweeping views hong kong skyscrapers shots within mira hotel keegan added actors leaden delivery sometimes gives neophyte status away voice russia stated shaky camera work usage local actors reminiscent bourne spy thriller series patrick frater variety said film strong production values driving music somewhat amateurish acting performances alexis lai cnn said film surprisingly suspenseful sophisticated gorgeous time-lapse panoramas city shaky cam shots reminiscent hollywood cast film consisted friends four filmmakers dean napolitano wall street journal said cast varying degrees thespian abilities andrew cromeek 25-year-old american chester new york english teacher took role snowden previously acted one commercial one student film filmmakers reviewed friends believed remotely appeared similar snowden shawn tse said looked caucasian white friends see could play snowden cromeek worked company tse worked teacher tse believed cromeek going perfect snowden cromeek believed zero resemblance snowden according tse let cromeek grow beard several days taking hong kong barbershop cromeek gave hairstylist photograph snowden received haircut 50 hong kong dollars us 6.41 according tse hong kong hairstylist warned cromeek careful mistaken snowden cromeek lightened haircolor using gold spray paint put eyeglasses trimmed beard day shooting moles placed neck makeup film team also used special wardrobe make cromeek appear like snowden cromeek reported parents family members friends gave telephone calls film made public cast list film released youtube tuesday 25 june 2013 several publications contacted filming group interviews wall street journal first agence france-presse afp los angeles times afterwards interviews increased interest film 28 june got 5,000 views 30 june gained 8,500 views 2 july got 89,000 views 16 july received 220,000 hits 30 july received almost 250,000 views luke buckmaster online australian political news magazine crikey stated verax nowiki /nowiki greatest asset showcase narrative efficiency getting key points across using language arrangement images solicit logical necessarily emotional responses without needing put fine point jin jiabao china central television said film events vividly portrayed stephanie ip associated press wrote film initially gained popularity 29 july 2013 praise film given way criticism many viewers berating four directors amateur work bad casting adam withnall wrote belfast telegraph many criticised four directors amateur work bad casting independent wider international audience n't forgiving less-than-professional quirks cast television program new day said hope andrew cromeek rest cast better real jobs regards criticism andrew cromeek argued filmmakers expect gain large amount attention youtube filmmakers professional cromeek said think way shot quite cool amateur actors one take kind like shoot go ok done fine completely ok people like 'it worst acting world totally fine ip wrote verax source pride friends made even acknowledge limitations | [
8735,
7893,
3495
] | Validation |
5,230 | 2 | OpenSMTPD:opensmtpd opensmtpd also known openbsd smtp server unix daemon implementing simple mail transfer protocol deliver messages local machine relay smtp servers publicly released 17 march 2013 version number 5.3 development since late 2008 opensmtpd primarily developed gilles chehade eric faurot charles longeau part openbsd project design goals include security reliability ease configuration support common use cases source code available isc license portable version like openssh developed child project adds portability code openbsd version releases separately portable version initiated charles longeau adds support multiple operating systems including netbsd freebsd dragonfly bsd several linux distributions development opensmtpd motivated combination issues current smtp daemons difficult configuration complicated difficult audit code unsuitable licensing opensmtpd designed solve problems make mail exchanges accessible wider user-base period development opensmtpd first appeared openbsd 4.6 first release shipped openbsd 5.3 2 october 2015 results security audit released version 5.4.4p1 audited nine issues found result opensmtpd 5.7.2 released address issues opensmtpd attempt openbsd team produce smtp daemon implementation secure reliable high performance simple security audit trivial set administer code designed keep memory cpu disk requirements low possible admitted large mail systems intended run low-end machines trade-offs made higher memory usage would bring indisputable benefits design goals opensmtpd security ease use performance security opensmtpd achieved robust validity check network input path use bounded buffer operations via strlcpy privilege separation mitigate effects possible security bugs exploiting daemon privilege escalation order simplify use smtp opensmtpd implements smaller set functionalities available smtp daemons objective provide enough features satisfy typical usage risk unsuitability esoteric niche requirements | [
9223,
10248,
2825,
3465,
10631,
1932,
274,
8725,
7702,
8344,
10105,
412,
6702,
7983,
9520,
9909,
823,
2748,
2245,
5063,
1993,
8778,
76,
3404,
11086,
5970,
471,
4439,
5084,
7139,
1637,
4071,
5612,
11500,
1907,
5492,
1785,
8954,
2045,
2558
... | None |
5,231 | 6 | Joliet_(file_system):joliet file system joliet filesystem commonly used store information cd-rom computer discs defined extension iso 9660 standard joliet specified endorsed microsoft supported versions windows operating system since windows 95 windows nt 4.0 primary focus relaxation filename restrictions inherent full iso 9660 compliance joliet accomplishes supplying additional set filenames encoded ucs-2be utf-16be practice since windows 2000 filenames stored special supplementary volume descriptor safely ignored iso 9660-compliant software thus preserving backward compatibility specification allows filenames 64 unicode characters length however documentation mkisofs states filenames 103 characters length appear cause problems microsoft documented use 110 characters many current pc operating systems able read joliet-formatted media thus allowing exchange files operating systems even non-roman characters involved arabic japanese cyrillic formerly possible plain iso 9660-formatted media operating systems read joliet media include microsoft recommends use joliet extension developers targeting windows allows unicode characters used text fields includes file names volume name secondary volume descriptor type 2 contains information primary one sector 16 offset 40 bytes ucs-2be sector 17 offset 40 bytes result volume name limited 16 characters disktype program prints joliet unicode volume name present | [
1801,
8075,
6797,
5413,
7720,
5293,
6062,
7342,
7983,
8110,
3250,
11184,
823,
5816,
188,
5062,
2395,
5596,
11363,
5119
] | Test |
5,232 | 6 | IBRIX_Fusion:ibrix fusion ibrix fusion parallel file system combined logical volume manager availability features management interface software produced sold supported ibrix incorporated billerica massachusetts hp announced july 17 2009 reached definitive agreement acquire ibrix subsequent acquisition software components ibrix combined proliant servers form x9000 series storage systems x9000 storage systems designed provide network-attached storage standard protocols smb nfs http ndmp well proprietary protocol architecturally file system limited 16 petabytes single namespace based upon design described used hpe storeonce former d2d products | [
1638,
5384,
4438,
823,
2395
] | None |
5,233 | 3 | Ultra_80:ultra 80 sun microsystems ultra 80 computer workstation shipped november 1999 2002 enclosure fairly large high wide deep heavy tower design launch shipped solaris 2.5.1 available variety different configurations one model 1450 two model 2450 four model 4450 64-bit ultrasparc ii cpus 4 gb ram released ultra 80 sun highest performance workstation ultra 80 similar lower-cost sun ultra 60 somewhat larger supports cpus memory although designed workstation rather server may rack mounted using optional kit enterprise 420r server product based ultra 80 motherboard specialized rack-mountable chassis custom power supplies parts appropriate server applications last order date ultra 80 july 2002 last model stopped shipping october 2002 later ultra 45 introduced 2006 supports maximum two cpus rather four ultra 80 ultra 80 shipped solaris 2.5.1 capable running later versions solaris solaris 10 oracle solaris 11 dropped support ultrasparc ii iii iv processors well linux various unix operating systems ultra 80 run microsoft windows directly although internal pci card sunpci ii pro similar sun could fitted allow use windows full specifications found sun web site although sold either one two four cpus use three cpus supported configuration cpus run 450 mhz 16-kb data 16-kb instruction cache chip secondary 4-mb external cache x1195a part number one cpus cpu integrated floating point processor ultra 80 uses 144-pin 5v 60-ns dimm memory modules either 64 256 mb installed sets four identical dimms 16 dimm sockets possible fit 4 gb 16 256 mb modules memory bus 576 bits wide 512 bits used data 64 bits error correction specifications list maximum throughput 1.78-gb/s performance improved 2-way interleaving used giving 512 mb 2 gb maximum performance achieved 4-way interleaving case 16 memory slots would used providing machine 1 gb 4 gb ram half ultra 80 memory must fitted motherboard half memory riser board care needed handling memory riser board connector designed repeated use must tightened using torque wrench supplied ultra 80 detailed service manual ultra 80 takes one two 1 high sca scsi disk drives internally sold 18.2-gb 36.4-gb disks practice use sca disk internal disks must mounted carrier spud-bracket sun part number 540-3024 scsi ids internal disks 0 3 set sca backplane changed optional 1.44 mb 3.5 ms-dos/ibm compatible floppy drive fitted ultra 80 could purchased new optional 12/24 gb native/compressed dds-3 tape drive work dds-4 drive probably larger tape drives optional 644 mb suncd 32x-speed photo cd compatible cd-rom drive optional 10x dvd-rom could specified well 3rd-party rewritable cd-rom drives could also used.. ultra 80 four full-size slots compliant pci specification version 2.1 systems might inoperable pci 2.2 card installed two upa graphics slots running 112 mhz supporting one two elite3d m3 and/or elite3d m6 graphics options popular creator3d framebuffer supported usually always work ultra 80s sold pgx32 framebuffer even though low performance made appropriate use server rather workstation applications although sold ultra 80s later xvr series framebuffers also work expert3d series sun ultra 80 fitted dual channel ultra-3 scsi controller speed 40 mb/s one controller c0 used internal disk cd-rom dvd-rom tape second channel c1 used external 68-pin ultra wide scsi connector rear ultra 80 sun ultra 80 1 gb/s ethernet used optional sun x1141a ethernet card usb officially supported various usb boards pcs known work linux solaris maximum power consumption documented 380w components list specifies sony 670w 12a power supply sun part number 300-1357 ultra 80 well-built workstation use cheap mass-produced commodity pc parts like sun ultra workstations ultra 5 ultra 10 well cooled suffering none overheating problems sun previous quad-processor machine sparcstation 20 support ultra 80 ended october 2007 addition official support knowledgeable people often sun employees regular visitors comp.unix.solaris comp.sys.sun.hardware comp.sys.sun.admin usenet newsgroups sun ultra 80 workstation facts guide gives following data well known specint 95 specfp 95 benchmarks although search web site standard performance evaluation corporation spec show figures spec ceased use benchmark ultra 80 released last results submitted web site 3rd quarter 1998 little year ultra 80 released november 1999 number results less-commonly-used specfp_rate95 specfp_rate_base95 benchmarks found spec web site given | [
3328,
9731,
1801,
4235,
1809,
2710,
1316,
10789,
1707,
3247,
6322,
1600,
7104,
6338,
9665,
10436,
8007,
1480,
2895,
3919,
597,
10200,
4960,
9955,
11363,
11626,
7148,
7022,
1776,
8179,
9333,
1399,
11129,
9343
] | Test |
5,234 | 3 | FLAGS_register:flags register flags register status register intel x86 microprocessors contains current state processor register 16 bits wide successors eflags rflags registers 32 bits 64 bits wide respectively wider registers retain compatibility smaller predecessors fixed bits bit positions 1 3 5 carry parity adjust zero sign flags inherited even earlier architecture 8080 8085 adjust flag used called auxiliary carry bit 8080 half-carry bit zilog z80 architecture note mask column table bitmask hexadecimal value query flag within flags register value flags registers contain condition codes flag bits let results one machine-language instruction affect another instruction arithmetic logical instructions set flags conditional jump instructions take variable action based value certain flags example codice_1 jump zero codice_2 jump carry codice_3 jump overflow depend specific flags conditional jumps test combinations several flags flags registers moved stack part job saving restoring processor context routine interrupt service routine whose changes registers seen calling code relevant instructions 64-bit mode pushf/popf pushfq/popfq available pushfd/popfd ability push pop flags registers lets program manipulate information flags ways machine-language instructions exist example codice_4 codice_5 instructions clear set direction flag df respectively instruction complement df achieved following assembly code manipulating flags register program determine model installed processor example alignment flag changed 486 program tries modify flag senses modification persist processor earlier 486 starting intel pentium cpuid instruction reports processor model however method remains useful distinguish earlier models | [
9739,
6924,
9996,
8078,
8851,
3630,
9911,
7997,
6596,
9028,
9158,
9668,
585,
6730,
602,
11107,
499,
372,
3699,
9331,
1915,
1791
] | None |
5,235 | 3 | PowerPC_600:powerpc 600 powerpc 600 family first family powerpc processors built designed somerset facility austin texas jointly funded staffed engineers ibm motorola part aim alliance somerset opened 1992 goal make first powerpc processor keep designing general purpose powerpc processors personal computers first incarnation became powerpc 601 1993 second generation soon followed powerpc 603 powerpc 604 64-bit powerpc 620 powerpc 601 first generation microprocessors support basic 32-bit powerpc instruction set design effort started earnest mid-1991 first prototype chips available october 1992 first 601 processors introduced ibm rs/6000 workstation october 1993 alongside powerful multichip cousin ibm power2 line processors first apple power macintoshes march 14 1994 601 first advanced single-chip implementation power/powerpc architecture designed crash schedule establish powerpc marketplace cement aim alliance order achieve extremely aggressive schedule including substantially new function substantial performance enhancements new instructions importantly power/powerpc first symmetric multiprocessing smp implementation design leveraged number key technologies project management strategies 601 team leveraged much basic structure portions ibm risc single chip rsc processor also included support vast majority new powerpc instructions power instruction set nearly every portion rsc design modified many design blocks substantially modified completely redesigned given completely different unified i/o bus structure smp/memory coherency support new powerpc changes leveraging basic rsc structure beneficial reducing uncertainty chip area/floorplanning timing analysis/tuning worth noting 601 implemented substantial new key functions smp also acted bridge power future powerpc processors assist ibm software developers transitions powerpc start design tape-out first 601 prototype 12 months order push hard establish powerpc market early order help effort rapidly incorporate 88110 bus architecture 601 benefit alliance customers motorola management provided 88110 bus architecture specifications also handful 88110 bus-literate designers help 60x bus logic implementation verification given apple system design team familiar i/o bus structure motorola 88110 i/o bus implementation well defined documented 601 team adopted bus technology improve time market bus renamed 60x bus implemented 601 motorola small number apple designers joined 120 ibm designers creating 601 using 88110 bus basis 60x bus helped schedules number ways helped apple power macintosh team reducing amount redesign support asics reduced amount time required processor designers architects propose document negotiate close new bus interface successfully avoiding bus wars expected 601 management team 88110 bus previous rsc buses n't adopted worthy note accepting 88110 bus benefit apple efforts alliance expense first ibm rs/6000 system design team efforts support asics already implemented around rsc totally different bus structure 60x bus later became fairly long lived basic interface many variants 601 603 604 g3 g4 motorola/freescale powerquicc processors chip designed suit wide variety applications support external l2 cache symmetric multiprocessing four functional units including floating point unit integer unit branch unit sequencer unit processor also included memory management unit integer pipeline four stages long branch pipeline two stages long memory pipeline five stages long floating-point pipeline six stages long first launched ibm systems fall 1993 marketed ibm ppc601 motorola mpc601 operated speeds ranging 50 80 mhz fabricated using 0.6 µm cmos process four levels aluminum interconnect die 121 mm² large contained 2.8 million transistors 601 32 kb unified l1 cache capacity considered large time on-chip cache thanks partly large cache considered high performance processor segment outperforming competing intel pentium powerpc 601 used first power macintosh computers apple variety rs/6000 workstations smp servers ibm groupe bull ibm sole manufacturer 601 601+ microprocessors burlington vermont east fishkill new york production facilities 601 used ibm cmos-4s process 601+ used ibm cmos-5x process extremely small number 601 601+ processors relabeled motorola logos part numbers distributed motorola facts somewhat obscured given various pictures motorola mpc601 particularly one specific case masterful motorola marketing 601 named one time magazine 1994 products year motorola marking updated version powerpc 601v powerpc 601+ operating 90 120 mhz introduced 1994 fabricated newer 0.5 µm cmos process four levels interconnect resulting die measuring 74 mm² 601+ design remapped cmos-4s cmos-5x ibm-only team avoid time-to-market delays design tool changes commonizing fab groundrules 601 601+ designed ibm eda tools ibm systems fabricated ibm-only facilities powerpc 603 first processor implementing complete 32-bit powerpc architecture specified designed low cost low end processor portable embedded use one main features power saving functions doze nap sleep mode could dramatically reduce power requirements drawing 2 mw sleep mode 603 four-stage pipeline five execution units integer unit floating point unit branch prediction unit load/store unit system registry unit separate 8 kb l1 caches instructions data 32/64 bit 60x memory bus reaching 75 mhz 603 core hardware support smp powerpc 603 1.6 million transistors fabricated ibm motorola 0.5 µm cmos process four levels interconnect die 85 mm² large drawing 3 w 80 mhz 603 architecture direct ancestor powerpc 750 architecture marketed apple powerpc g3 603 intended used portable apple macintosh computers could run 68k emulation software performance apple considered adequate due smaller processor caches result apple chose use 603 low-cost desktop performa line caused delay apple powerbook 5300 powerbook duo 2300 apple chose wait processor revision apple use 603 performa 5200 line led processor getting poor reputation aside issue 68k emulation performance performa machines shipped variety design flaws severe related aspects computers design including networking performance stability bus problems width speed contention complexity rom bugs hard disk performance none problems 5200 line aside 68k emulation performance inherently due 603 rather processor retrofitted used 68k motherboards obsolete parts site low end mac rates performa 5200 worst mac all-time 603 found widespread use different embedded appliances performance issues 603 addressed powerpc 603e l1 cache enlarged enhanced 16 kb four-way set-associative data instruction caches clock speed processors doubled reaching 200 mhz shrinking fabrication process 0.35 µm allowed speeds 300 mhz part sometimes called powerpc 603ev 603e 603ev 2.6 million transistors 98 mm² 78 mm² large respectively 603ev draws maximum 6 w 300 mhz powerpc 603e first mainstream desktop processor reach 300 mhz used power macintosh 6500 603e also used accelerator cards phase5 amiga line computers cpus ranging speeds 160 240 mhz powerpc 603e still sold today ibm freescale others like atmel honeywell makes radiation hardened variant rhppc powerpc 603e also heart bebox inc bebox notable since multiprocessing system something 603 n't designed ibm also used powerpc 603e processors thinkpad 800 series laptop computers certain digital oscilloscope series lecroy used powerpc 603e main processor 603e processors also power 66 satellites iridium satellite phone fleet satellites contain seven motorola/freescale powerpc 603e processors running roughly 200 mhz custom 603e processor also used mark 54 lightweight torpedo powerpc 603e core renamed g2 freescale basis many embedded powerquicc ii processors keeps developed freescale powerquicc ii soc processors bear designation mpc82xx come variety configurations reaching 450 mhz freescale enhanced 603e core calling e300 powerquicc ii pro embedded processors larger 32/32 kb l1 caches performance enhancing measures added freescale powerquicc ii pro soc processors bear designation mpc83xx come variety configurations reaching speeds 667 mhz e300 also core mpc5200b soc processor used small efika computer powerpc 604 introduced december 1994 alongside 603 designed high-performance chip workstations entry-level servers support symmetric multiprocessing hardware 604 used extensively apple high-end systems also used macintosh clones ibm low-end rs/6000 servers workstations amiga accelerator boards embedded cpu telecom applications 604 superscalar processor capable issuing four instructions simultaneously 604 six-stage pipeline six execution units work parallel finishing six instructions every cycle two simple one complex integer units one floating point unit one branch processing unit managing out-of-order execution one load/store unit separate 16 kb data instruction l1 caches external interface 32- 64-bit 60x bus operates clock rates 50 mhz powerpc 604 contains 3.6 million transistors fabricated ibm motorola 0.5 µm cmos process four levels interconnect die measured 12.4 mm 15.8 mm 196 mm² drew 14-17 w 133 mhz operated speeds 100 180 mhz powerpc 604e introduced july 1996 added condition register unit separate 32 kb data instruction l1 caches among changes memory subsystem branch prediction unit resulting 25 performance increase compared predecessor 5.1 million transistors manufactured ibm motorola 0.35 µm cmos process five levels interconnect die 148 mm² 96 mm² large manufactured motorola ibm respectively drawing 16-18 w 233 mhz operated speeds 166 233 mhz supported memory bus 66 mhz powerpc 604ev 604r mach 5 introduced august 1997 essentially 604e fabricated ibm motorola newer process reaching higher speeds lower energy consumption die 47 mm² small manufactured 0.25 µm cmos process five levels interconnect drew 6 w 250 mhz operated speeds 250 400 mhz supported memory bus 100 mhz apple dropped 604ev 1998 favor powerpc 750 ibm kept using entry-level models rs/6000 computers several years powerpc 620 first implementation entire 64-bit powerpc architecture second generation powerpc alongside 603 604 geared towards high-end workstation server market powerful paper initially supposed launched alongside brethren delayed 1997 arrive performance comparably poor considerably cheaper 604e surpassed 620 therefore never produced large quantities found little use sole user powerpc 620 groupe bull escala unix machines n't deliver large numbers ibm intended use workstations servers decided wait even powerful rs64 power3 64-bit processors instead 620 produced motorola 0.5 µm process 6.9 million transistors die area 311 mm² operated clock rates 120 150 mhz drew 30 w 133 mhz later model built using 0.35 µm process enabling reach 200 mhz 620 similar 604 five-stage pipeline support symmetric multiprocessing number execution units load/store unit branch unit fpu three integer units larger 32 kb instruction data caches support l2 cache may capacity 128 mb powerful branch load/store units buffers 620 powerful branch history table also larger could dispatch instructions processor handle out-of-order execution efficiently 604 floating point unit also enhanced compared 604 faster fetch cycle support several key instruction hardware like sqrt made combined faster wider data buses efficient fpu 604 system bus wider faster 128-bit memory bus called 6xx bus designed system bus multiprocessor systems processors caches memory i/o connected assisted system control chip supports 32- 64-bit powerpc processors memory addresses larger 32 bits numa environments also used power3 rs64 601 well 604-based rs/6000 systems bridge chip bus later evolved gx bus power4 later gx+ gx++ power5 power6 respectively gx bus also used ibm z10 z196 system z mainframes powerpc 602 stripped version powerpc 603 specially made game consoles motorola ibm introduced february 1995 smaller l1 caches 4 kb instruction 4 kb data single-precision floating-point unit scaled back branch prediction unit offered speeds ranging 50 80 mhz drew 1.2 w 66 mhz consisted 1 million transistors 50 mm² large manufactured 0.5 µm cmos process four levels interconnect 3do developed m2 game console used two powerpc 602 never marketed october 21 1996 fabless semiconductor company quantum effect devices qed announced powerpc 603-compatible processor named powerpc 603q microprocessor forum despite name anything common 603 ground implementation 32-bit powerpc architecture targeted high-end embedded market developed two years small simple energy efficient powerful equaling expensive 603e drawing less power in-order five-stage pipeline single integer unit double precision floating point unit fpu separate 16 kb instruction 8 kb data caches integer unit brand new design fpu derived r4600 save time 69 mm² small using 0.5 µm fabrication process drew 1.2 w 120 mhz 603q designed motorola withdrew contract 603q went full production result 603q canceled qed could continue market processor since lacked powerpc license powerpc 613 seems name motorola given third generation powerpc supposedly renamed powerpc 750 response exponential technology x704 processor designed outgun 604 wide margin hardly sources confirming though might pure speculation reference completely different processor similar powerpc 613 powerpc 614 might name given motorola third generation powerpc later renamed reason 613 suggested part renamed powerpc 7400 motorola even bumped fourth generation powerpc even though architectural differences g3 g4 small hardly sources confirming though might pure speculation reference completely different processor powerpc 615 powerpc processor announced ibm 1994 never reached mass production main feature incorporate x86 core die thus making processor able natively process powerpc x86 instructions operating system running powerpc 615 could either chose execute 32-bit 64-bit powerpc instructions 32-bit x86 instructions mix three mixing instructions would involve context switch cpu small overhead operating systems supported 615 minix special development version os/2 330 mm² large manufactured ibm 0.35 µm process pin compatible intel pentium processors comparable speed processor introduced prototype program killed part fact microsoft never supported processor engineers working powerpc 615 would later find way transmeta worked crusoe processor powerpc 625 early name apache series 64-bit powerpc processors designed ibm based amazon powerpc-as instruction set later renamed rs64 designation powerpc 625 never used final processors powerpc 630 early name high end 64-bit powerpc processor designed ibm unify power powerpc instruction sets later renamed power3 probably distinguish consumer oriented powerpc processors used apple powerpc 641 codename habanero defunct powerpc project ibm 1994–96 timeframe suggested third generation powerpc based 604 processor | [
6663,
8711,
5642,
1548,
2071,
2073,
1563,
8231,
11314,
6715,
9302,
1635,
7269,
3185,
4211,
630,
7286,
7806,
7299,
1158,
4743,
7302,
7305,
8851,
2708,
6815,
7842,
6311,
9391,
5297,
11447,
1725,
8893,
10945,
6878,
8931,
3304,
10985,
3319,
3... | Test |
5,236 | 2 | Tom_Duff:tom duff thomas douglas selkirk duff born december 8 1952 computer programmer duff born toronto ontario canada named putative ancestor fifth earl selkirk grew toronto leaside 1974 graduated university waterloo b.math two years later got m.sc university toronto duff worked new york institute technology computer graphics lab mark williams company chicago moving lucasfilm computer research development division thomas porter another lucasfilm employee developed new approach compositing images 1984 paper compositing digital images seminal work algebra image compositing according keith packard porter-duff compositing key technique computer graphics see example xrender glitz duff later worked 12 years bell labs computing science research center worked computer graphics wireless networking plan 9 course work authored well known rc shell version 10 unix operating system duff worked pixar animation studios since 1996 | [
11442,
11003,
2045,
9141
] | Test |
5,237 | 3 | R4200:r4200 r4200 microprocessor designed mips technologies inc. mti implemented mips iii instruction set architecture isa also known vrx development microprocessor licensed nec company fabricated marketed vr4200 first vr4200 80 mhz part introduced 1993 faster 100 mhz part became available 1994 r4200 developed specifically low-power windows nt computers personal computers laptops mti claimed microprocessor integer performance greater high-end intel i486 80 p5-variant pentium microprocessor r4200 ultimately see use personal computers repositioned embedded microprocessor competed r4600 r4300i variant used widely popular nintendo 64 video game console r4200 scalar design five-stage classic risc pipeline notable feature use integer datapath performing arithmetic operations mantissa portion floating point number separate datapath used exponent scheme reduced cost reducing number transistors size chip power consumption also impacted floating point performance negatively r4200 intended applications require high floating point performance r4200 16 kb instruction cache 8 kb data cache caches direct-mapped instruction cache 32-byte line size whereas data cache 16-byte line size data cache uses write-back write protocol r4200 32-entry translation lookaside buffer tlb data 4-entry tlb instructions 33-bit physical address supported system bus 64 bits wide operates half internal clock frequency r4200 contained 1.3 million transistors area 81 mm nec fabricated r4200 600 nm cmos process three levels interconnect packaged 179-pin ceramic pin grid array compatible r4x00pc r4600 208-pin plastic quad flat pack pqfp used 3.3 v power supply dissipating 1.8 w typically maximum 2 w 80 mhz r4300i derivative r4200 designed mti embedded applications announced 17 april 1995 differs r4200 featuring improved integer multiplier lower latency cut-down 32-bit system bus reduced cost chip area 45 mm fabricated 350 nm process packaged 120-pin pqfp uses 3.3 v power supply dissipates 1.8 w 100 mhz 2.2 w 133 mhz r4300i licensed nec toshiba marketed companies vr4300 tx4300 respectively companies offered 100 133 mhz versions derivative vr4300 developed nec nintendo 64 game console clocked 93.75 mhz labeled nus-cpu although development boards nintendo 64 used stock nec vr4300 cpus final cpu found pin-compatible singular use mips implementation produced significant royalties mti sales nec made mips highest volume mixed 32/64-bit risc isa 1997 nec produced two derivatives r4300 general embedded market vr4305 vr4310 announced 20 january 1998 vr4310 available 100 133 167 mhz manufactured 250 nm process packaged 120-pin pqfp | [
4098,
7170,
8327,
8711,
783,
8976,
659,
7445,
9851,
4124,
10784,
8481,
8355,
5028,
6949,
4136,
6057,
938,
426,
7852,
8237,
7234,
6981,
1480,
2635,
10316,
4569,
6878,
6247,
7911,
6250,
6252,
6253,
5358,
10734,
6256,
5617,
4211,
2805,
3702,... | None |
5,238 | 7 | Cascading_(software):cascading software cascading software abstraction layer apache hadoop apache flink cascading used create execute complex data processing workflows hadoop cluster using jvm-based language java jruby clojure etc hiding underlying complexity mapreduce jobs open source available apache license commercial support available driven inc. cascading originally authored chris wensel later founded concurrent inc re-branded driven cascading actively developed community number add-on modules available use cascading apache hadoop must also installed hadoop job .jar must contain cascading .jars cascading consists data processing api integration api process planner process scheduler cascading leverages scalability hadoop abstracts standard data processing operations away underlying map reduce tasks developers use cascading create .jar file describes required processes follows ‘ source-pipe-sink ’ paradigm data captured sources follows reusable ‘ pipes ’ perform data analysis processes results stored output files ‘ sinks ’ pipes created independent data process tied data sources sinks called ‘ flow ’ flows grouped ‘ cascade ’ process scheduler ensure given flow execute dependencies satisfied pipes flows reused reordered support different business needs developers write code jvm-based language need learn mapreduce resulting program regression tested integrated external applications like java application cascading often used ad targeting log file analysis bioinformatics machine learning predictive analytics web content mining extract transform load etl applications cascading cited one top five powerful hadoop projects sd times 2011 major open source project relevant bioinformatics included hadoop definitive guide tom white project also cited presentations conference proceedings hadoop user group meetings useful tool working hadoop apache spark | [
6403,
5031,
8810,
747,
5677,
11343,
7248,
9179,
5567
] | Test |
5,239 | 2 | MAD_(MUD):mad mud mad multi access dungeon global mud similar mud1 ran fremp11 bitnet node operated école nationale supérieure des mines de paris mud developed bruno chabrier vincent lextrait two students school began operating 1984 slightly less two years bitnet administrators concerned impact widespread adoption game asked école des mines stop mad installed several nodes world completely banned consequence success resulted complete saturation bitnet several occasions | [
7144,
7019
] | Test |
5,240 | 2 | Solaris_Trusted_Extensions:solaris trusted extensions solaris trusted extensions set security extensions incorporated solaris 10 operating system sun microsystems featuring mandatory access control model succeeds trusted solaris family security-evaluated operating systems based earlier versions solaris solaris 10 5/09 common criteria certified evaluation assurance level eal4+ capp rbacpp lspp protection profiles certain trusted solaris features fine-grained privileges part standard solaris 10 release beginning solaris 10 11/06 solaris includes component called solaris trusted extensions gives additional features necessary position successor trusted solaris inclusion features mainstream solaris release marks significant change trusted solaris longer necessary use different solaris release modified kernel labeled security environments solaris trusted extensions opensolaris project trusted extensions additions enhancements include solaris trusted extensions enforce mandatory access control policy aspects operating system including device access file networking print window management services achieved adding sensitivity labels objects thereby establishing explicit relationships objects appropriate explicit authorization allows applications users read and/or write access objects component also provides labeled security features desktop environment apart extending support common desktop environment trusted solaris 8 release delivers first labeled environment based gnome solaris trusted extensions facilitate access data multiple classification levels single desktop environment solaris trusted extensions also delivers labeled device access labeled network communication cipso standard cipso used pass security information within labeled zones solaris trusted extensions complies federal information processing standard fips | [
8077,
2967,
5280,
6049,
6445,
7983,
11184,
1458,
10170,
9665,
8904,
10962,
5335,
11363,
366,
11506,
4858,
381,
9343
] | Test |
5,241 | 5 | SCTP_packet_structure:sctp packet structure stream control transmission protocol sctp simpler basic packet structure tcp consists two basic sections sctp packets require common header section shown blue background sctp packet consists addition common header chunks chunk common format contents vary green bytes diagram signify one chunk chunk length equate multiple 4 bytes protocol implicitly pads chunk trailing zeros additionally chunk type may define set parameters includes inside chunk value field consequently length chunk length two types parameter exist optional/variable-length parameters parameter type parameter length parameter value fields behave like chunk counterparts minimum size parameter 4 bytes occurs parameter value field empty parameter consists type length fields rfc 2960 defines following list chunk types detailed information type provided following subsections following table chunk parameters defined please note following color scheme init ack chunk replicates init chunk except chunk type always 2 defined yet defined yet two re-configuration parameters mentioned may appear chunk combinations valid see rfc 6525 details parameter used sender inform receiver wishes reset sequence numbers message-ids i-data used outgoing streams parameter used sender request receiver resets sequence numbers message-ids i-data used outgoing streams parameter used sender inform receiver wishes reset tsns ssns/mids streams parameter used response re-configuration request except possibly incoming ssn reset request elicits outgoing ssn reset request parameter granted parameter used sender request additional outgoing streams added association i.e incoming streams receiver parameter used sender request additional incoming streams added association i.e outgoing streams receiver pad chunk introduced facilitate path mtu discovery enabling sender arbitrarily increase size sctp packet i-data chunk introduced avoid large message one stream blocking messages streams transmitted sctp primarily uses tsn achieve reliability cases tsn also needed distinguish different data chunks message fragmented data tsn additionally doubles fragment sequence number means fragments message must sent using consecutive tsns effectively blocking data i-data chunk disentangles different uses tsn data chunks data i-data chunks compatible may used association forward-tsn chunk introduced support selective unreliability allows sender tell receiver retransmit number chunks requests receiver consider chunks received i-forward-tsn chunk introduced used instead forward-tsn i-data used instead data | [
3742,
10924,
3006,
5469,
5470,
7071
] | Validation |
5,242 | 1 | DatabaseSpy:databasespy databasespy multi-database query design database comparison tool altova creator xmlspy databasespy connects many major relational databases facilitating sql querying database structure design database content editing database comparison conversion databasespy database client application windows 7 8 10 windows xp windows server 2003 2008 allows database administrators database developers database-oriented professionals interact multiple relational databases may created different developers databasespy features include quick connection wizard multiple relational databases sql editor auto-completion graphical database design tool database content schema comparison data import export multiple formats databasespy also includes special support xml databases available 32-bit 64-bit versions databasespy connect multiple databases simultaneously including databases different types databasespy automatically adjusts variations sql dialects data type definitions supported relational databases databasespy connects following major database types initial release september 2006 users recognized benefits using single tool consistent user interface multiple databases perform routine tasks querying modifying tables use common graphical interface connect multiple databases possibly across different platforms cited valuable feature databasespy licensed software product uses key protection prevent unlicensed usage databasespy free try no-cost 30-day trial license | [
7523,
9286,
5546,
6797,
7022,
7983,
9389,
10413,
11030,
9177,
8539,
479
] | None |
5,243 | 2 | Fast_user_switching:fast user switching fast user switching feature i.e term rather loosely specified functionality multi-user operating system allows users switch user accounts single computer without quitting applications logging linux kernel vt subsystem please consult articles pseudoterminal linux console virtual console dates back 1993 understand concept multiple seats meaning 63 vts one vt active given time despite kernel limitation multiseat supported gnu/linux feature fast user switching less severe necessities multi-seat multiple users n't work simultaneously therefore simply works straight forward solution elegant multi-seat kmscon/systemd-consoled combination systemd-logind available desktop environments gnome kde software compilation adapt graphical login session manager e.g gdm sddm lightdm etc underneath solution configured implement fast user switching way installations older environments functionality must enabled appropriate configuration files hot key sequence codice_1 pressed separate login window appear second user log even first user alternatively default install new x sessions started using different display parameters run different virtual terminals e.g codice_2 codice_3 hot key sequences allow user switching take place fast user switching may potentially introduce various security-related complications handled differently among operating systems advantages disadvantages one possibility simple secure first user gets ownership resources second option grant ownership resources new user last one log takes ownership third allow users access shared resources easier intuitive allows example one user record another user conversation windows shared resources sound available sessions red hat linux default behavior give ownership console resources first connected session share resources among groups console users configured manage console ownership differently fast user switching windows based remote desktop services technology windows xp gina component winlogon fast user switching interacts programmatically called automate fast user switch powertoy known super fast user switcher offered 2002 microsoft allowed fast user switching using keyboard hotkey win+q similar alt-tab without even going welcome screen later made unavailable original set powertoys replaced updated versions still works windows xp sp3 32-bit running administrator windows vista gina replaced credential providers however support programmatic initiation fast user switching windows xp fast user switching unavailable computer windows server domain network offline files enabled windows vista later longer restrictions | [
11075,
6213,
7207,
1577,
6697,
9353,
7983,
8080,
11135,
9173,
3351,
11257,
9438,
2399
] | None |
5,244 | 3 | Mm_tree:mm tree among linux kernel developers -mm tree refers version kernel source code maintained andrew morton -mm kernel tree used fill role linux kernel development builds formerly identified odd version numbers following 2.6 see section linux kernel version numbering new experimental code used find way 2.6.x-mm kernel build historically -mm tree focused new developments memory management part kernel mm occasionally -mm tree overloaded new patches testing became overly difficult sep 17 2007 andrew morton sent mail saying n't working presence new linux-next git repository offloaded much work made mm maintenance difficult allowing andrew morton continue use quilt manage series mmotm mm moment patches andrew morton includes subset mmotm patches linux-next head called linux-next/akpm also git tree includes patches appear releases mm tree get mm patches given time developers still need quilt ad hoc shell scripts apply full set patches | [
3082,
5139,
10780,
10785,
6180,
8242,
9266,
6213,
8268,
5222,
10856,
4734,
7812,
4238,
10382,
2195,
2711,
9882,
1694,
2723,
10933,
5815,
5822,
1736,
2762,
8909,
8410,
10971,
8928,
1761,
2278,
233,
10482,
2294,
8439,
2809,
4360,
792,
10016,
... | None |
5,245 | 4 | Intrusion_detection_system:intrusion detection system intrusion detection system ids device software application monitors network systems malicious activity policy violations malicious activity violation typically reported either administrator collected centrally using security information event management siem system siem system combines outputs multiple sources uses alarm filtering techniques distinguish malicious activity false alarms ids types range scope single computers large networks common classifications network intrusion detection systems nids host-based intrusion detection systems hids system monitors important operating system files example hids system analyzes incoming network traffic example nids also possible classify ids detection approach well-known variants signature-based detection recognizing bad patterns malware anomaly-based detection detecting deviations model good traffic often relies machine learning another reputation-based detection recognizing potential threat according reputation scores ids products ability respond detected intrusions systems response capabilities typically referred intrusion prevention system intrusion detection systems also serve specific purposes augmenting custom tools using honeypot attract characterize malicious traffic although relate network security ids differs firewall firewall looks outwardly intrusions order stop happening firewalls limit access networks prevent intrusion signal attack inside network ids describes suspected intrusion taken place signals alarm ids also watches attacks originate within system traditionally achieved examining network communications identifying heuristics patterns often known signatures common computer attacks taking action alert operators system terminates connections called intrusion prevention system performs access control like application layer firewall ids classified detection takes place network host detection method employed signature anomaly-based network intrusion detection systems nids placed strategic point points within network monitor traffic devices network performs analysis passing traffic entire subnet matches traffic passed subnets library known attacks attack identified abnormal behavior sensed alert sent administrator example nids would installing subnet firewalls located order see someone trying break firewall ideally one would scan inbound outbound traffic however might create bottleneck would impair overall speed network opnet netsim commonly used tools simulating network intrusion detection systems nid systems also capable comparing signatures similar packets link drop harmful detected packets signature matching records nids classify design nids according system interactivity property two types on-line off-line nids often referred inline tap mode respectively on-line nids deals network real time analyses ethernet packets applies rules decide attack off-line nids deals stored data passes processes decide attack nids also combined technologies increase detection prediction rates artificial neural network based ids capable analyzing huge volumes data smart way due self-organizing structure allows ins ids efficiently recognize intrusion patterns neural networks assist ids predicting attacks learning mistakes inn ids help develop early warning system based two layers first layer accepts single values second layer takes first layers output input cycle repeats allows system automatically recognize new unforeseen patterns network system average 99.9 detection classification rate based research results 24 network attacks divided four categories dos probe remote-to-local user-to-root host intrusion detection systems hids run individual hosts devices network hids monitors inbound outbound packets device alert user administrator suspicious activity detected takes snapshot existing system files matches previous snapshot critical system files modified deleted alert sent administrator investigate example hids usage seen mission critical machines expected change configurations signature-based ids refers detection attacks looking specific patterns byte sequences network traffic known malicious instruction sequences used malware terminology originates anti-virus software refers detected patterns signatures although signature-based ids easily detect known attacks difficult detect new attacks pattern available signature-based ids signatures released vendor products on-time updating ids signature key aspect anomaly-based intrusion detection systems primarily introduced detect unknown attacks part due rapid development malware basic approach use machine learning create model trustworthy activity compare new behavior model since models trained according applications hardware configurations machine learning based method better generalized property comparison traditional signature-based ids although approach enables detection previously unknown attacks may suffer false positives previously unknown legitimate activity may also classified malicious existing idss suffer time-consuming detection process degrades performance idss efficient feature selection algorithm makes classification process used detection reliable new types could called anomaly-based intrusion detection systems viewed gartner user entity behavior analytics ueba evolution user behavior analytics category network traffic analysis nta particular nta deals malicious insiders well targeted external attacks compromised user machine account gartner noted organizations opted nta traditional ids systems may attempt stop intrusion attempt neither required expected monitoring system intrusion detection prevention systems idps primarily focused identifying possible incidents logging information reporting attempts addition organizations use idps purposes identifying problems security policies documenting existing threats deterring individuals violating security policies idps become necessary addition security infrastructure nearly every organization idps typically record information related observed events notify security administrators important observed events produce reports many idps also respond detected threat attempting prevent succeeding use several response techniques involve idps stopping attack changing security environment e.g reconfiguring firewall changing attack content intrusion prevention systems ips also known intrusion detection prevention systems idps network security appliances monitor network system activities malicious activity main functions intrusion prevention systems identify malicious activity log information activity report attempt block stop it.. intrusion prevention systems considered extensions intrusion detection systems monitor network traffic and/or system activities malicious activity main differences unlike intrusion detection systems intrusion prevention systems placed in-line able actively prevent block intrusions detected ips take actions sending alarm dropping detected malicious packets resetting connection blocking traffic offending ip address ips also correct errors defragment packet streams mitigate tcp sequencing issues clean unwanted transport network layer options.. intrusion prevention systems classified four different types majority intrusion prevention systems utilize one three detection methods signature-based statistical anomaly-based stateful protocol analysis number techniques attackers using following considered 'simple measures taken evade ids earliest preliminary ids concept delineated 1980 james anderson national security agency consisted set tools intended help administrators review audit trails user access logs file access logs system event logs examples audit trails fred cohen noted 1987 impossible detect intrusion every case resources needed detect intrusions grow amount usage dorothy e. denning assisted peter g. neumann published model ids 1986 formed basis many systems today model used statistics anomaly detection resulted early ids sri international named intrusion detection expert system ides ran sun workstations could consider user network level data ides dual approach rule-based expert system detect known types intrusions plus statistical anomaly detection component based profiles users host systems target systems author ides intelligent system detecting intruders teresa f. lunt proposed adding artificial neural network third component said three components could report resolver sri followed ides 1993 next-generation intrusion detection expert system nides multics intrusion detection alerting system midas expert system using p-best lisp developed 1988 based work denning neumann haystack also developed year using statistics reduce audit trails 1986 national security agency started ids research transfer program rebecca bace bace later published seminal text subject intrusion detection 2000 wisdom sense w statistics-based anomaly detector developed 1989 los alamos national laboratory w created rules based statistical analysis used rules anomaly detection 1990 time-based inductive machine tim anomaly detection using inductive learning sequential user patterns common lisp vax 3500 computer network security monitor nsm performed masking access matrices anomaly detection sun-3/50 workstation information security officer assistant isoa 1990 prototype considered variety strategies including statistics profile checker expert system computerwatch bell labs used statistics rules audit data reduction intrusion detection 1991 researchers university california davis created prototype distributed intrusion detection system dids also expert system network anomaly detection intrusion reporter nadir also 1991 prototype ids developed los alamos national laboratory integrated computing network icn heavily influenced work denning lunt nadir used statistics-based anomaly detector expert system lawrence berkeley national laboratory announced bro 1998 used rule language packet analysis libpcap data network flight recorder nfr 1999 also used libpcap ape developed packet sniffer also using libpcap november 1998 renamed snort one month later snort since become world largest used ids/ips system 300,000 active users monitor local systems remote capture points using tzsp protocol audit data analysis mining adam ids 2001 used tcpdump build profiles rules classifications 2003 yongguang zhang wenke lee argue importance ids networks mobile nodes 2015 viegas colleagues proposed anomaly-based intrusion detection engine aiming system-on-chip soc applications internet things iot instance proposal applies machine learning anomaly detection providing energy-efficiency decision tree naive-bayes k-nearest neighbors classifiers implementation atom cpu hardware-friendly implementation fpga literature first work implement classifier equivalently software hardware measures energy consumption additionally first time measured energy consumption extracting features used make network packet classification implemented software hardware | [
3072,
2049,
5636,
10245,
10756,
9227,
2062,
9233,
5139,
7192,
3609,
5657,
9242,
9761,
2084,
550,
9256,
9771,
3629,
8753,
3125,
5176,
10297,
3643,
7739,
62,
9791,
1088,
11330,
4163,
4165,
2118,
5195,
4689,
612,
1640,
107,
3698,
6772,
6773,... | Test |
5,246 | 4 | Mobile_secure_gateway:mobile secure gateway mobile secure gateway msg industry term software hardware appliance provides secure communication mobile application respective backend resources typically within corporate network addresses challenges field mobile security msg typically composed two components client library gateway client library linked mobile application establishes secure connectivity gateway using cryptographic protocol typically ssl/tls represents secured channel used communication mobile application hosts gateway separates internal infrastructure internet allowing authorized client requests reach specific set hosts inside restricted network client library linked corresponding mobile application provides secure access via gateway set hosts client library exposes public api mobile application mimicking platform default http client library application uses api communicate desired hosts secure way gateway server daemon typically installed onto physical virtual appliance placed dmz gateway public interface exposed internet untrusted network accepts tcp/ip connections mobile applications operates ipv4 and/or ipv6 networks incoming client connections typically use ssl/tls provide security network communication mutual trust communicating peers communication protocol typically based http gateway forwards requests connected apps collection configured hosts typically http https servers services within internal network response host sent back respective mobile app | [
899,
5636,
10756,
9607,
9356,
9488,
3473,
8978,
10392,
5373,
5531,
4892,
5404,
2975,
2084,
2213,
8998,
939,
3629,
9646,
3887,
7855,
1970,
5433,
7739,
4797,
3262,
9791,
3525,
7368,
9160,
5325,
4435,
2262,
6360,
9688,
7515,
4956,
5469,
5470... | Test |
5,247 | 3 | Separation_kernel:separation kernel separation kernel type security kernel used simulate distributed environment concept introduced john rushby 1981 paper rushby proposed separation kernel solution difficulties problems arisen development verification large complex security kernels intended provide multilevel secure operation general-purpose multi-user systems according rushby task separation kernel create environment indistinguishable provided physically distributed system must appear regime separate isolated machine information flow one machine another along known external communication lines one properties must prove separation kernel therefore channels information flow regimes explicitly provided variant separation kernel partitioning kernel gained acceptance commercial aviation community way consolidating onto single processor multiple functions perhaps mixed criticality commercial real-time operating system products genre used aircraft manufacturers safety-critical avionics applications 2007 information assurance directorate u.s. national security agency nsa published separation kernel protection profile skpp security requirements specification separation kernels suitable used hostile threat environments skpp describes common criteria parlance class modern products provide foundational properties rushby conceptual separation kernel defines security functional assurance requirements construction evaluation separation kernels yet providing latitude choices available developers skpp defines separation kernel hardware and/or firmware and/or software mechanisms whose primary function establish isolate separate multiple partitions control information flow subjects exported resources allocated partitions separation kernel core functional requirements include separation kernel allocates exported resources control partitions partitions isolated except explicitly allowed information flows actions subject one partition isolated viz. detected communicated subjects another partition unless flow allowed partitions flows defined configuration data note 'partition 'subject orthogonal abstractions 'partition indicated mathematical genesis provides set-theoretic grouping system entities whereas 'subject allows us reason individual active entities system thus partition collection containing zero elements subject active element may contain zero subjects separation kernel provides hosted software programs high-assurance partitioning information flow control properties tamperproof non-bypassable capabilities provide configurable trusted foundation variety system architectures september 2008 integrity-178b green hills software became first separation kernel certified skpp wind river systems separation kernel technology active certification process 2009 2011 information assurance directorate sunset skpp nsa longer certify specific operating systems including separation kernels skpp noting conformance protection profile offer sufficient confidence national security information appropriately protected context larger system conformant product integrated sel4 microkernel formal proof configured separation kernel proof information flow enforcement together implies high level assurance usecase muen separation kernel also formally verified open source separation kernel x86 machines | [
2179,
10499,
10883,
394,
3978,
1804,
6797,
273,
7057,
6675,
7187,
11539,
9366,
11667,
6296,
25,
10776,
8092,
4637,
7325,
9887,
10016,
9762,
421,
5158,
6438,
10235,
2345,
7983,
3248,
7217,
4914,
11184,
6837,
823,
9784,
4409,
10809,
6075,
7... | Test |
5,248 | 0 | James_F._Allen:james f. allen james frederick allen born 1950 computational linguist recognized contributions temporal logic particular allen interval algebra interested knowledge representation commonsense reasoning natural language understanding believing deep language understanding currently achieved significant hand-engineering semantically-rich formalisms coupled statistical preferences john h. dessaurer professor computer science university rochester allen received ph.d. university toronto 1979 supervision c. raymond perrault joined faculty rochester rochester department chair 1987 1990 directed cognitive science program 1992 1996 co-directed center sciences language 1996 1998 served editor-in-chief computational linguistics 1983-1993 since 2006 also associate director florida institute human machine cognition trips project long-term research build generic technology dialogue spoken 'chat systems includes natural language processing collaborative problem solving dynamic context-sensitive language modeling contrast data driven approaches machine learning requires collect annotate corpora i.e training data firstly plow agent system learns executable task models single collaborative learning session integrates wide ai technologies include deep natural language understanding knowledge representation reasoning dialogue systems planning/agent-based systems machine learning paper outstanding paper award aaai 2007 allen author textbook natural language understanding benjamin-cummings 1987 2nd ed. 1995 also co-author henry kautz richard pelavin josh tenenberg reasoning plans morgan kaufmann 1991 1991 elected fellow association advancement artificial intelligence 1990 founding fellow 1992 became dessaurer professor rochester | [
1890,
7780,
1641,
2578,
1783
] | None |
5,249 | 4 | Amavis:amavis amavis open-source content filter electronic mail implementing mail message transfer decoding processing checking interfacing external content filters provide protection spam viruses malware considered interface mailer mta mail transfer agent one content filters amavis used notable features common mail filtering installation amavis consists postfix mta spamassassin spam classifier clamav anti-virus protection running unix-like operating system many virus scanners 30 spam scanners crm114 dspam bogofilter supported well mtas three topologies interfacing mta supported amavisd process sandwiched two instances mta yielding classical after-queue mail filtering setup amavisd used smtp proxy filter before-queue filtering setup amavisd process consulted provide mail classification forward mail message case consulting client remains charge mail forwarding last approach used milter setup limitations historical client program amavisd-submit since version 2.7.0 before-queue setup preferred allows mail message transfer rejected smtp session sending client after-queue setup filtering takes place mail message already received enqueued mta case mail filter longer reject message deliver possibly tagged discard generate non-delivery notification cause unwanted backscatter case bouncing message fake sender address disadvantage before-queue setup requires resources cpu memory proportional current peak mail transfer rate unlike after-queue setup delay acceptable resource usage corresponds average mail transfer rate introduction option smtpd_proxy_options=speed_adjust postfix 2.7.0 resource requirements before-queue content filter much reduced countries legislation permit mail filtering discard mail message accepted mta rules after-queue filtering setup discarding quarantining messages leaves possibility delivering possibly tagged messages rejecting before-queue setup smtp proxy milter amavis receive mail messages mta one sockets protocol families pf_inet ipv4 pf_inet6 ipv6 pf_local unix domain socket using protocols esmtp lmtp simple private protocol am.pdp used helper program like amavisd-milter interface milters output side protocols esmtp lmtp used pass message back-end mta instance lda message passed spawned process unix pipe esmtp lmtp used session optionally encrypted using tls starttls rfc 3207 extension protocol smtp command pipelining rfc 2920 supported client server code spam scanning enabled daemon process amavisd conceptually similar spamd process spamassassin project cases forked child processes call spamassassin perl modules directly hence performance similar main difference protocols used amavis typically speaks standard esmtp protocol mta spamc/spamd case mta typically spawns spamc program passing message unix pipe spamc process transfers message spamd daemon using private protocol spamd calls spamassassin perl modules design priorities amavisd-new called amavis reliability security adherence standards performance functionality intention mail message could lost due unexpected events like i/o failures resources depletion unexpected program terminations amavisd program meticulously checks completion status every system call i/o operation unexpected events logged possible handled several layers event handling amavis never takes responsibility mail message delivery away mta final success status reported mta message passed back-end mta instance reception confirmed case fatal failures processing transferring message message processed stays queue front-end mta instance re-tried later approach also covers potential unexpected host failures crashes amavisd process one components use program resources like memory size file descriptors disk usage creation subprocesses controlled large mail messages kept memory available memory size impose limit size mail messages processed memory resources wasted unnecessarily great deal attention given security aspects required handling potentially malicious nonstandard garbled data mail messages coming untrusted sources process handling mail messages runs reduced privileges dedicated user id optionally run chroot-ed risks buffer overflows memory allocation bugs largely avoided implementing protocol handling mail processing perl handles dynamic memory management transparently care taken content processed messages inadvertently propagate system perl provides additional security safety net marking tainted data originating wild amavis careful put perl feature good use avoiding automatic untainting data use taint untainting explicitly strategic points late data flow amavis use several external programs enhance functionality de-archivers de-compressors virus scanners spam scanners programs often implemented languages like c c++ potential risk mail message passed one programs cause failure even open security hole risk limited running programs unprivileged user id possibly chroot-ed nevertheless external programs like unmaintained de-archivers avoided use external programs configurable disabled selectively group like decoders virus scanners despite implemented interpreted programming language perl amavis slow good performance functionality implemented amavis speaking external components achieved dealing data large chunks e.g line-by-line avoiding unnecessary data copying optimizing frequently traversed code paths using suitable data structures algorithms well low-level optimizations bottlenecks detected development profiling code benchmarking detailed timing report log help recognize bottlenecks particular installation certain external modules programs like spamassassin command-line virus scanners slow using would constitute vast majority elapsed time processing resources making resources used amavis proportionally quite small components like external mail decoders virus scanners spam scanners selectively disabled needed remains functionality implemented amavis like transferring mail message mta using smtp lmtp protocol checking mail header section validity checking banned mail content types verifying generating dkim signatures consequence mail processing tasks like dkim signing verification mail checking disabled exceptionally fast rival implementations compiled languages even full checks using fast virus scanner spam scanning disabled surprisingly fast implementation protocols message structures closely follows set applicable standards rfc 5322 rfc 5321 rfc 2033 rfc 3207 rfc 2045 rfc 2046 rfc 2047 rfc 3461 rfc 3462 rfc 3463 rfc 3464 rfc 4155 rfc 5965 rfc 6376 rfc 5451 rfc 6008 rfc 4291 several cases functionality re-implemented amavis code even though public cpan perl module exists lacks attention detail following standard lacks sufficient checking handling errors amavis licensed gplv2 license applies current code well historical branches exception supporting programs like monitoring statistics reporting covered new bsd license project started 1997 unix shell script detect block e-mail messages containing virus intended block viruses mta mail transfer agent lda local delivery stage running unix-like platform complementing virus protection mechanisms running end-user personal computers next tool re-implemented perl program later evolved daemonized process dozen developers took turns first five years project developing several variants keeping common goal project name development infrastructure since december 2008 2018-10-09 active branch officially amavisd-new developed maintained mark martinec since march 2002 agreed developers time private correspondence christian bricart lars hecking hilko bengen rainer link mark martinec project name amavis largely interchangeable name amavisd-new branch lots functionality added years like adding protection spam unwanted content besides original virus protection focus kept reliability security adherence standards performance domain amavis.org use project registered 1998 christian bricart one early developers still maintaining domain name registration domain entirely dedicated active branch project mailing list moved sourceforge amavis.org march 2011 hosted ralf hildebrandt patrick ben koetter project web page main distribution site located jožef stefan institute ljubljana slovenia handover 2018 development taking place years 2002 2018 october 9 2018 mark martinec announced general support discussion mailing list retirement project also patrick ben koetter continue new project leader patrick notified migration source code public gitlab repository plan next steps regarding project development history project name project branches varied somewhat initially spelling project name amavis mail virus scanner introduced christian bricart rewrite perl name program amavis-perl daemonized versions initially distributed name amavisd-snapshot amavisd modular rewrite hilko bengen called amavis-ng march 2002 amavisd-new branch introduced mark martinec initially patch amavisd-snapshot-20020300 later evolved self-contained project surviving actively maintained branch nowadays project name preferably spelled amavis name program amavisd name amavis mostly interchangeable amavisd-new hilko bengen | [
5253,
8582,
9222,
3988,
5397,
1305,
7325,
10276,
6313,
1837,
4398,
7983,
10413,
2045,
7347,
8499,
9909,
950,
9014,
4793,
1594,
7739,
3133,
1474,
4294,
7764,
11610,
7515,
5469,
5470,
7518,
11492,
2281,
1771,
8941,
4464,
9588,
3837
] | Test |
5,250 | 8 | Sambar_Server:sambar server jibin server combined http https xmpp ftp smtp pop3 dns dhcp java servlet jsp proxy server developed tod sambar proxy server provided also dial-on-demand service internet service provider limited shareware version widely distributed full functionality available commercial version initially developed microsoft windows platform later version linux also available releases still downloadable free various software distribution sites windows version need server operation system ran even windows 95 windox xp home sambar server came server-side scripting language called cscript derived programming language c. first release appeared 1996/97 latest release 7.0 published march 2007 runs xp win 10 tod sambar claims commercial shareware freeware licensees numbered 200,000 server powered 13,000 commercial internet sites peak end 2007 tod sambar announced end development least october 2015 sambar server still use testified sambar webmaster community forum domain www.sambar.com sambar sever distributed serviced still registered tod sambar name connected internet two mx records registered dns domain name system | [
5281,
10242,
7364,
2887,
4797,
5738,
6797,
2996,
4725,
9780,
823,
9909,
2045
] | None |
5,251 | 5 | Internet_Relay_Chat:internet relay chat internet relay chat irc application layer protocol facilitates communication form text chat process works client/server networking model irc clients computer programs users install system web based applications running either locally browser 3rd party server clients communicate chat servers transfer messages clients irc mainly designed group communication discussion forums called channels also allows one-on-one communication via private messages well chat data transfer including file sharing client software available every major operating system supports internet access april 2011 top 100 irc networks served half million users time hundreds thousands channels operating total roughly 1,500 servers roughly 3,200 servers worldwide irc usage declining steadily since 2003 losing 60 users 1 million 400,000 2012 half channels half million 2003 irc created jarkko oikarinen august 1988 replace program called mut multiuser talk bbs called oulubox university oulu finland working department information processing science jarkko intended extend bbs software administered allow news usenet style real time discussions similar bbs features first part implemented chat part borrowed parts written friends jyrki kuoppala jukka pihl first irc network running single server named tolsun.oulu.fi oikarinen found inspiration chat system known bitnet relay operated bitnet jyrki kuoppala pushed jarkko ask oulu university free irc code also could run outside oulu finally got released jyrki kuoppala immediately installed another server first irc network jarkko got friends helsinki university tampere university start running irc servers number users increased universities soon followed time jarkko realized rest bbs features probably would n't fit program jarkko got touch people university denver oregon state university irc network running wanted connect finnish network obtained program one jarkko friends vijay subramaniam—the first non-finnish person use irc irc grew larger got used entire finnish national network—funet—and connected nordunet scandinavian branch internet november 1988 irc spread across internet middle 1989 40 servers worldwide august 1990 first major disagreement took place irc world a-net anarchy net included server named eris.berkeley.edu open required passwords limit number connects greg wumpus lindahl explains wildcard server line people hooking servers nick-colliding everyone eris free network efnet made eris machine first q-lined q quarantine irc wumpus words eris refused remove line formed efnet n't much fight got hubs join almost everyone else got carried along a-net formed eris servers efnet formed non-eris servers history showed servers users went efnet anet disbanded name efnet became meaningless one irc network around time irc used report 1991 soviet coup d'état attempt throughout media blackout previously used similar fashion gulf war chat logs events kept ibiblio archive another fork effort first really made big lasting difference initiated 'wildthang u.s. october 1992 forked efnet ircd version 2.8.10 meant test network develop bots quickly grew network friends friends europe canada separate new network worked december french servers connected canadian ones end month french canadian network connected us one forming network later came called undernet undernetters wanted take ircd attempt make less bandwidth consumptive try sort channel chaos netsplits takeovers efnet started suffer latter purpose undernet implemented timestamps new routing offered cservice—a program allowed users register channels attempted protect troublemakers first server list presented february 15 1993 includes servers usa canada france croatia japan august 15 new user count record set 57 users may 1993 rfc 1459 published details simple protocol client/server operation channels one-to-one one-to-many conversations notable significant number extensions like ctcp colors formats included protocol specifications character encoding led various implementations servers clients diverge fact software implementation varied significantly one network network implementing policies standards code bases summer 1994 undernet forked new network called dalnet named founder dalvenjah formed better user service user channel protections one significant changes dalnet use longer nicknames original ircd limit 9 letters dalnet ircd modifications made alexei lefler kosut dalnet thus based undernet ircd server although dalnet pioneers efnet abandoners according james ng initial dalnet people ops startrek sick constant splits/lags/takeovers/etc dalnet quickly offered global wallops ircop messages seen users +w /mode nickname +w longer nicknames q lined nicknames nicknames used i.e chanserv ircop nickserv etc global k lines ban one person entire domain server entire network ircop communications globops +h mode showing ircop helpop etc much dalnet new functions written early 1995 brian morpher smith allow users nicknames control channels send memos july 1996 months flame wars discussions mailing list yet another split due disagreement development ircd evolve notably european servers europe side later named ircnet argued nick channel delays efnet side argued timestamps also disagreements policies european side started establish set rules directing ircops could could point view opposed us side ircnet servers europe efnet servers us event also known great split many irc societies efnet since august 1998 grown passed number users northern autumn year 2000 efnet 50,000 users ircnet 70,000 golden era 1990s early 2000s 240,000 users quakenet 2004 irc seen significant decline losing around 60 users 2003 2012 users moving modern social media platforms like facebook twitter also open platforms like xmpp developed 1999 certain networks like freenode followed overall trend quadrupled size period 2016 freenode largest irc network around 90,000 users 2016 new standardization effort way working group called ircv3 focuses advanced client features like instant notifications better history support improved security.. 2019 major irc networks fully adopted proposed standard irc open protocol uses tcp optionally tls irc server connect irc servers expand irc network users access irc networks connecting client server many client implementations mirc hexchat irssi server implementations e.g original ircd irc servers require users register account nick nickname required connected irc originally plain text protocol although later extended request assigned port 194/tcp iana however de facto standard always run irc 6667/tcp nearby port numbers example tcp ports 6660–6669 7000 avoid run ircd software root privileges protocol specified characters 8-bit specify character encoding text supposed use cause problems users using different clients and/or different platforms want converse client-to-server irc protocols use today descended protocol implemented irc2.4.0 version irc2 server documented rfc 1459 since rfc 1459 published new features irc2.10 implementation led publication several revised protocol documents rfc 2810 rfc 2811 rfc 2812 rfc 2813 however protocol changes widely adopted among implementations although many specifications irc protocol published official specification protocol remains dynamic virtually clients servers rely strictly rfcs reference microsoft made extension irc 1998 via proprietary ircx later stopped distributing software supporting ircx instead developing proprietary msnp standard structure network irc servers tree messages routed along necessary branches tree network state sent every server generally high degree implicit trust servers architecture number problems misbehaving malicious server cause major damage network changes structure whether intentional result conditions underlying network require net-split net-join results lot network traffic spurious quit/join messages users temporary loss communication users splitting servers adding server large network means large background bandwidth load network large memory load server established however message multiple recipients delivered fashion similar multicast meaning message travels network link exactly strength comparison non-multicasting protocols simple mail transfer protocol smtp extensible messaging presence protocol xmpp irc daemon also used local area network lan irc thus used facilitate communication people within local area network internal communication irc line-based structure clients send single-line messages server receive replies messages receive copies messages sent clients clients users enter commands prefixing '/ depending command may either handled entirely client generally commands client recognize passed directly server possibly modification due nature protocol automated systems always correctly pair sent command reply full reliability subject guessing basic means communicating group users established irc session channel channels network displayed using irc command list lists currently available channels modes +s +p set particular network users join channel using join command clients available /join channelname messages sent joined channels relayed users channels available across entire irc network prefixed local server use less common channel types include '+ channels—'modeless channels without operators — channels form timestamped channel normally non-timestamped networks users channels may modes represented single case-sensitive letters set using mode command user modes channel modes separate use letter mean different things e.g user mode invisible mode channel mode invite modes usually set unset using mode command takes target user channel set modes set unset parameters modes need channel modes take parameters channel modes apply user channel add remove mask e.g ban mask list associated channel rather applying channel whole modes apply users channel associated symbol used represent mode names replies sent clients first joining channel use names command many clients also used represent client displayed list users channel display indicator user modes order correctly parse incoming mode messages track channel state client must know mode type modes apply user channel symbol goes letter early implementations irc hard-coded client de facto standard extension protocol called isupport sends information client connect time using numeric 005 small design fault irc regarding modes apply users channels names message used establish initial channel state send one mode per user channel multiple modes set single user example user holds operator status +o voice status +v channel new client unable see mode less priority i.e voice workarounds possible client server side none widely implemented many daemons networks added extra modes modified behavior modes list channel operator client irc channel manages channel irc channel operators easily seen symbol icon next name varies client implementation commonly symbol prefix green circle latin letter +o networks operator also users maintain elevated rights local server entire network called irc operators sometimes shortened ircops opers confused channel operators implementation ircd varies privileges irc operator given ircd rfc 1459 claims irc operators necessary evil keep clean state network need able disconnect reconnect servers additionally prevent malicious users even harmful automated programs entering irc irc operators usually allowed disconnect clients completely ban ip addresses complete subnets networks carry services nickserv et al usually allow irc operators also handle basic ownership matters privileged rights may include overriding channel bans able join channels would allowed join opered able op channels would able without opered auto-opped channels always forth hostmask unique identifier irc client connected irc server irc servers services clients including bots use identify specific irc session format hostmask codice_1 hostmask looks similar confused e-mail address nick part nickname chosen user may changed connected user part username reported ident client ident available client username specified client connected used prefixed tilde host part hostname client connecting ip address client resolved valid hostname server used instead hostname privacy implications exposing ip address hostname client irc daemons also provide privacy features inspircd unrealircd +x mode hashes client ip address masks part client hostname making unreadable users ircops users may also option requesting virtual host vhost displayed hostmask allow anonymity irc networks freenode use cloaks indicate user affiliated group project issues original design irc amount shared state data limitation scalability absence unique user identifications leading nickname collision problem lack protection netsplits means cyclic routing trade-off scalability sake real-time user presence information protocol weaknesses providing platform abuse transparent optimizable message passing encryption issues addressed modern irc irc connections usually unencrypted typically span long time periods attractive target dos/ddos attackers hackers careful security policy necessary ensure irc network susceptible attack takeover war irc networks may also k-line g-line users servers harming effect irc servers support ssl/tls connections security purposes helps stop use packet sniffer programs obtain passwords irc users little use beyond scope due public nature irc channels ssl connections require client server support may require user install ssl binaries irc client specific patches modules computers networks also use ssl server server connections provide special channel flag codice_2 allow ssl-connected users channel disallowing operator identification clear text better utilize advantages ssl provides irc served early laboratory many kinds internet attacks using fake icmp unreachable messages break tcp-based irc connections nuking annoy users facilitate takeovers one contentious technical issues surrounding irc implementations survives day merit nick/channel delay vs. timestamp protocols methods exist solve problem denial-of-service attacks take different approaches problem original irc protocol implemented two servers split rejoined two sides network would simply merge channels user could join split server channel existed side network empty gain operator status would become channel operator combined channel netsplit ended user took nickname existed side network server would kill users rejoining i.e. 'nick-collision often abused mass-kill users channel thus creating opless channels operators present deal abuse apart causing problems within irc encouraged people conduct denial service attacks irc servers order cause netsplits would abuse nick/channel delay abbreviated nd/cd solution problem simple user signs nickname becomes available channel ceases exist users parted often happens netsplit server allow user use nickname join channel certain period time delay passed idea behind even netsplit occurs useless abuser take nickname gain operator status channel thus collision nickname 'merging channel occur extent inconveniences legitimate users might forced briefly use different name rejoining appending underscore popular alternative timestamp ts protocol takes different approach every nickname channel network assigned timestampthe date time created netsplit occurs two users side free use nickname channel two sides joined one survive case nicknames newer user according ts killed channel collides members users channel merged channel operators losing side split lose channel operator status ts much complicated protocol nd/cd design implementation despite gone several revisions implementations still problems desyncs two servers network disagree current state network allowing much leniency allowed 'losing side original ts protocols example protection users setting bans modes losing channel would merged split rejoined even though users set modes lost channel operator status modern ts-based irc servers also incorporated form nd and/or cd addition timestamping attempt curb abuse networks today use timestamping approach timestamp versus nd/cd disagreements caused several servers split away efnet form newer ircnet split efnet moved ts protocol ircnet used nd/cd recent versions ircnet ircd well ircds using ts6 protocol including charybdis nd extended/replaced mechanism called save mechanism assigns every client uid upon connecting irc server id starts number forbidden nicks although ircds namely ircnet inspircd allow clients switch uid nickname two clients nickname join different sides netsplit nick collision first server see collision force clients change nick uid thus saving clients disconnected ircnet nickname also locked time nd prevent clients changing back original nickname thus colliding thousands running irc networks world run various implementations irc servers administered various groups irc operators protocol exposed irc users similar irc networks accessed client software although might slight incompatibilities limited functionality due differing server software implementations largest irc networks traditionally grouped big four designation networks top statistics big four networks change periodically due community nature irc large number networks users choose historically big four irc reached 6 million simultaneous users 2001 10 million users 2003 dropping 371k 2018 october 2018 largest irc networks today top 100 irc networks around 370k users connected peak hours three recognized uniform resource identifier uri schemes internet relay chat codice_3 codice_4 codice_5 supported allow hyperlinks various forms including items enclosed within brackets optional used necessary connect specified host network known irc client join specified channel used within client another application web browser irc default uri irc6 specifies connection made using ipv6 ircs specifies secure connection per specification usual hash symbol prepended channel names begin alphanumeric character—allowing omitted implementations example mirc unconditionally resulting usually unintended extra example channel included url implementations allow multiple channels specified separated commas client software exists various operating systems software packages well web-based inside games many different clients available various operating systems including windows unix linux mac os x mobile operating systems ios android windows mirc one popular clients programs extensible plug-ins also serve platforms irc clients instance client called erc written entirely emacs lisp included v.22.3 emacs therefore platform run emacs run erc number web browsers built-in irc clients opera version 12.18 earlier chatzilla add-on mozilla firefox included built-in component seamonkey web-based clients mibbit open source kiwiirc run browsers games war§ow unreal tournament unreal tournament 2004 uplink spring engine -based games 0 a.d. zdaemon included irc ustream chat interface irc custom authentication well twitch.tv formerly justin.tv typical use bots irc provide irc services specific functionality within channel host chat-based game provide notifications external events however irc bots used launch malicious attacks denial service spamming exploitation program runs daemon server functions persistent proxy known bnc bouncer purpose maintain connection irc server acting relay server client simply act proxy client lose network connectivity bnc may stay connected archive traffic later delivery allowing user resume irc session without disrupting connection server furthermore way obtaining bouncer-like effect irc client typically text-based example irssi may run always-on server user connects via ssh also allows devices ssh functionality actual irc client installed connect irc allows sharing irc sessions keep irc client quitting ssh connection closes client run inside terminal multiplexer gnu screen tmux thus staying connected irc network constantly able log conversation channels user interested maintain channel presence network modelled setup 2004 irc client following client-server model called smuxi launched numerous search engines available aid user finding looking irc generally search engine consists two parts back-end spider/crawler front-end search engine back-end spider/webcrawler work horse search engine responsible crawling irc servers index information sent across information indexed usually consists solely channel text text publicly displayed public channels storage method usually sort relational database like mysql oracle front-end search engine user interface database supplies users way search database indexed information retrieve data looking front-end search engines also coded numerous programming languages search engines spider single application responsible crawling irc indexing data however others user based indexers latter rely users install add-on irc client add-on sends database channel information whatever channels user happens many users implemented ad hoc search engines using logging features built many irc clients search engines usually implemented bots dedicated particular channel group associated channels irc changed much life internet new server software added multitude new features effort standardization adding new features irc protocol ircv3 working group irc still lacks single globally accepted standard convention transmit characters outside 7-bit ascii repertoire irc servers normally transfer messages client another client byte sequences without interpretation recoding characters irc protocol unlike e.g mime http lacks mechanisms announcing negotiating character encoding options put responsibility choosing appropriate character codec client practice irc channels largely used character encodings also used operating systems particular unix derivatives respective language communities today utf-8 encoding unicode/iso 10646 would likely contender single future standard character encoding irc communication standard ever relaxed 510-byte message size restriction utf-8 ascii compatible covers superset commonly used coded character set standards much like conventional p2p file sharing users create file servers allow share files using customised irc bots scripts irc client often users group together distribute warez via network irc bots technically irc provides file transfer mechanisms file sharing implemented irc clients typically using direct client-to-client dcc protocol file transfers negotiated exchange private messages clients vast majority irc clients feature support dcc file transfers hence view file sharing integral feature irc commonplace usage protocol however sometimes also causes dcc spam dcc commands also used exploit vulnerable clients performing action disconnecting server exiting client | [
10242,
1036,
3610,
10269,
10271,
3105,
35,
2085,
4133,
6184,
1581,
3629,
562,
8758,
3133,
5181,
7239,
8265,
4687,
5199,
6231,
3675,
10341,
10344,
9834,
1643,
2156,
4725,
3191,
5760,
8320,
5251,
4229,
649,
9868,
6797,
11408,
3218,
8341,
93... | None |
5,252 | 4 | DataGravity:datagravity datagravity inc. industry data management company produced security software company founded april 2012 paula long john joseph company raised 92m charles river ventures general catalyst andreessen horowitz accel partners datagravity announced first products vmworld 2014 best show new technology awards event began shipping first products october 2014 company focused protection security data stored array named new type storage data-aware storage publicly changed product strategy february 2016 data storage appliances software solution focused behavioral data security product strategy change resulted multiple rounds layoffs multiple reports use conflicting terminology final fate company reports say hytrust acquired datagravity reports including press release issued hytrust say hytrust acquired assets datagravity signed liquidator hytrust told fortune founder ceo paula long left datagravity weeks transaction announced co-founder john joseph left time according reports datagravity ceased day-to-day operations june 2017 cancelled employee benefit plans signed company liquidator barry kallander kallander group one report correspondence datagravity president barry kallander states corporation sold assets company ... unfortunately common shares worthless conversely datagravity cto david siles quoted saying company shut transaction n't fire sale acquired complete vision add value customers love together offer compelling offering marketplace solving pressing needs many enterprises approximately 20 former datagravity employees joined hytrust support datagravity product integration led former datagravity cto david siles datagravity products remain part hytrust portfolio cloudadvisor suite | [
7563
] | None |
5,253 | 9 | Waterbed_theory:waterbed theory waterbed theory observation ascribed larry wall systems human computer languages contain minimum amount complexity attempting push complexity system one place invariably cause complexity pop elsewhere behavior likened waterbed mattress contains certain amount water possible push mattress one place displaced water always cause mattress rise elsewhere water compress impossible push waterbed everywhere volume water remains constant waterbed theory cited significant part design philosophy perl 6 | [
5249,
11492,
4294,
8262,
8582,
2281,
6313,
8941,
4398,
3988,
7764,
9014,
11610,
7518
] | None |
5,254 | 5 | DNSCrypt:dnscrypt dnscrypt network protocol authenticates encrypts domain name system dns traffic user computer recursive name servers originally designed frank denis yecheng fu although multiple client server implementations exist protocol never proposed internet engineering task force ietf way request comments rfc dnscrypt wraps unmodified dns traffic client dns resolver cryptographic construction order detect forgery though n't provide end-to-end security protects local network man-in-the-middle attacks also mitigates udp-based amplification attacks requiring question least large corresponding response thus dnscrypt helps prevent dns spoofing dnscrypt also used access control done comodo cdome shield product addition private deployments dnscrypt protocol adopted several public dns resolvers vast majority members opennic network well virtual private network vpn services opendns part cisco announced first public dns service supporting dnscrypt december 2011 shortly followed cloudns australia march 29 2016 yandex announced support dnscrypt protocol public dns servers well web browser later infoblox announced activetrust cloud leveraging dnscrypt secure dns communications october 2016 adguard added dnscrypt dns filtering module users could move isps custom adguard dns servers online privacy ad blocking quad9 public dns resolver service run not-for-profit organization contributed ibm packet clearing house global cyber alliance announced support dnscrypt september 2018 servers support secure protocol mentioned dnscrypt creators ’ list dnscrypt used either udp tcp cases default port 443 even though protocol radically differs https instead relying trusted certificate authorities commonly found web browsers client explicitly trust public signing key chosen provider public key used verify set certificates retrieved using conventional dns queries certificates contain short-term public keys used key exchange well identifier cipher suite use clients encouraged generate new key every query servers encouraged rotate short-term key pairs every 24 hours queries responses encrypted using algorithm padded multiple 64 bytes order avoid leaking packet sizes udp response would larger question leading server respond short packet whose tc truncated bit set client retry using tcp increase padding subsequent queries versions 1 2 protocol use x25519 algorithm key exchange eddsa signatures well xsalsa20-poly1305 xchacha20-poly1305 authenticated encryption dnscrypt protocol also used access control accounting accepting predefined set public keys used commercial dns services identify customers without rely ip addresses | [
4224,
138,
1297,
8211,
11413,
1692,
9117,
3742,
10908,
2848,
5536,
8615,
3625,
4268,
10924,
2228,
8630,
4793,
3643,
8640,
3777,
8130,
2884,
3781,
2887,
8265,
6098,
8283,
2661,
3941,
10341,
9193,
6513,
4725,
5749,
503,
5372,
5887
] | None |
5,255 | 8 | Mustache_(template_system):mustache template system mustache web template system implementations available actionscript c++ clojure coffeescript coldfusion common lisp dart delphi erlang fantom go haskell io java javascript julia lua .net objective-c ocaml perl php pharo python r racket ruby rust scala smalltalk swift tcl cfengine xquery mustache described logic-less system lacks explicit control flow statements like else conditionals loops however looping conditional evaluation achieved using section tags processing lists lambdas named mustache heavy use braces resemble sideways moustache mustache used mainly mobile web applications mustache-1 inspired ctemplate et started github distribution end 2009 first version template engine implemented ruby running yaml template texts preserved main principles input data class input data characterized mvc-view mustache template nothing reference methods input data view logic decisions code contained view markup ex output xml contained template mvp context input data mvp- presenter mustache template mvp- view simplest template hello template section tag text codice_1 boolean value section tag acts like conditional codice_1 array acts like foreach loop template escaped codice_3 contains html wo n't escaped syntax highlighting available atom coda emacs textmate vim visual studio code mustache templates support built many web application frameworks ex cakephp support javascript includes client-side programming many javascript libraries ajax frameworks jquery dojo yui well server-side javascript using node.js commonjs many mustache engine implementations available meet common specification see external links — final users results common syntax march 2011 last spec_version 1.1.2 mustache engines v1.x architecture render method mustache_compiler class parser class mustache inspired numerous javascript template libraries forked original simplicity add certain functionality use handlebars.js self-described br handlebars.js extension mustache templating language created chris wanstrath handlebars.js mustache logicless templating languages keep view code separated like know handlebars differs predecessor h1 /h1 h2 /h2 using context var context mustache would require either block nested object flattening context thus would h1 /h1 h2 /h2 | [
4482,
3462,
8582,
2062,
9614,
1435,
155,
8605,
9245,
803,
3876,
5031,
4777,
5165,
5677,
1203,
692,
5048,
6718,
7871,
8644,
5833,
7292,
7889,
11221,
10198,
9948,
479,
10470,
2666,
8554,
10097,
3573,
6775,
3705,
2556
] | Validation |
5,256 | 6 | Chattr:chattr bsd-like systems including macos always analogous command set attributes command specifically meant display specific options command used instead solaris commands specifically meant manipulate used instead unices general analogous commands similar-sounding commands hp-ux aix exist unrelated functions among things command useful make files immutable password files certain system files erased software upgrades attributes manipulate originally specific second extended filesystem family ext2 ext3 ext4 available part e2fsprogs package however functionality since extended fully partially many systems including xfs reiserfs jfs ocfs2 btrfs file system includes attribute functionality including codice_1 flag turns built-in copy-on-write cow feature btrfs due slower performance associated cow form command form command gnu 1.41.3 attributes include command specific particular file systems ufs bsd systems apfs hfs+ smb afp fat macos support least flags form command bsd-like systems general default user-level command specifically meant display flags file command either codice_13 codice_14 depending system flags passed traditional attributes set cleared super-user also set cleared owner file attributes include bsd systems offer additional flags like offline snapshot sparse uarchive see references | [
3330,
515,
9733,
9735,
3976,
5256,
6669,
4750,
2194,
2197,
2198,
2199,
5397,
6812,
6434,
2597,
5158,
7847,
4398,
11184,
819,
10036,
823,
1336,
7356,
9151,
451,
8772,
965,
8522,
3659,
8404,
9946,
6494,
7136,
5985,
8675,
11363,
1509,
6120,
... | Test |
5,257 | 9 | Circuit_breaker_design_pattern:circuit breaker design pattern circuit breaker design pattern used modern software development used detect failures encapsulates logic preventing failure constantly recurring maintenance temporary external system failure unexpected system difficulties assume application connects database 100 times per second database fails application designer want error reoccur constantly also want handle error quickly gracefully without waiting tcp connection timeout generally circuit breaker used check availability external service external service database server web service used application circuit breaker detects failures prevents application trying perform action doomed fail safe retry implementations circuit breaker design pattern need retain state connection series requests must offload logic detect failures actual requests therefore state machine within circuit breaker needs operate sense concurrently requests passing one way achieved asynchronously multi-node clustered server state upstream service need reflected across nodes cluster therefore implementations may need use persistent storage layer e.g network cache memcached redis local cache disk memory based record availability application external service circuit breaker records state external service given interval external service used application storage layer queried retrieve current state safe say benefits outweigh consequences implementing circuit breaker negatively affect performance much depends storage layer used generally available resources largest factors regard type cache example disk-based vs. memory-based local vs. network following sample implementation php proof concept stores status mysql server shared memory cache apc following script could run set interval crontab | [
7175,
3848,
9225,
10924,
333,
337,
7347,
2901,
3990,
2011
] | Test |
5,258 | 7 | D-Grid:d-grid d-grid initiative german grid initiative government project fund computer infrastructure education research e-science germany uses term grid computing d-grid started september 1 2005 six community projects integration project dgi well several partner projects d-grid integration project intended integrate community projects d-grid integration project acted service provider science community germany project office located institute scientific computing iwr forschungszentrum karlsruhe resources ensure sustainable grid infrastructure provided four work packages six community projects participated d-grid initiative astrogrid-d also referred german astronomy community grid gacg joint research project thirteen astronomical institutes grid-oriented computer science groups supported supercomputing centers main objective astrogrid-d integration german research facilities unified nationwide research infrastructure field astronomy goal improve efficiency usability hardware software resources including computer clusters astronomical data archives observational facilities robotic telescopes astrogrid-d supports standards international virtual observatory alliance ivoa cooperates closely international projects grid development astrogrid-d managed astrophysical institute potsdam aip collaborative climate community data processing grid c3-grid scientific researchers trying understand earth system including subsystems like oceans atmosphere biosphere last decades amount data increased enormously field climate research one hand due rapid rise computing power scientists able use models higher resolution perform long term simulations scientists able couple models mentioned subsystems complex cumulative simulations producing petabytes output collected distributed data archives hand monitoring earth satellites results second huge data stream climate research uniform access distributed data available creates bottleneck scientific research c3-grid proposes link distributed data archives management c3-grid alfred wegener institute polar marine research awi bremerhaven gdi-grid geodateninfrastrukturen-grid spatial data infrastructure grid project focuses solutions efficient integration processing geodata based gis sdi technologies project integrate gdi grid technologies working gdi-grid infrastructure thus demonstrate complementarity fields science distributed geospatial data—currently accessed via standardized gis sdi services—will build basis endeavour data basis put use processing merging data creating standards-based multi-functional generic sdi services project focuses data models services workflows spatial data infrastructures services integration processing management spatial data developed implemented within d-grid infrastructure proof concept given using number representative scenarios emergency routing disaster management flood simulation sound propagation simulation project managed university hanover regional computing center lower saxony rrzn hep-grid project focused high energy physics nuclear well astroparticle physics main task hep-grid optimize data analysis using distributed computing storage resources project developments extensions grid middleware enabling grids e-sciencee project european grid infrastructure large hadron collider lhc computing grid lcg project provide significant improvements data analysis experiments currently taking data planned proposed international linear collider ilc hep-grid deutsches elektronen synchrotron desy german electron synchrotron hamburg collaborates eight german research facilities universities set associate partners ingrid community project field grid computing engineering sciences ingrid aims enable engineering projects grid-based applications allow common efficient use common compute software resources grid technologies promised combine competences modeling simulation optimization five typical applications foundry technologies metal forming technologies groundwater flow transport turbine simulation fluid-structure interaction considered showcases cover three central areas computationally intensive engineering applications coupled multi-scale problems coupled multi-discipline problems distributed simulation-based optimization particular adaptive scalable process models grid based runtime environments tasks developed support virtual prototyping optimization scientific engineering operational sequences emphasis project project management ingrid provided high performance computing center höchstleistungsrechenzentrum stuttgart hlrs university stuttgart joint project medigrid unifies research institutes medicine biomedical informatics life sciences consortium partners industry healthcare research facilities main goal medigrid development aggrid middleware integration platform enabling escience services biomedical life science project formed four modules middleware ontology resource fusion escience developed grid infrastructure biomedical users user communities represented three research modules biomedical informatics image processing clinical research sugi sustainable grid infrastructure gap project german grid initiative major task disseminate knowledge grid technology enhance use thus sugi addresses academic computing centers well enterprises still adopted grid technology supported providing grid resources services experiences d-grid projects made available institutions thus sugi offers training courses attends external courses create video audio recordings provide online d-grid communities via scaling training infrastructure sugi-portal sugi claimed develop training systems grid middleware simplify installation servicing procedures work development evaluation legal organizational structures grid technologies developed natural life sciences opportunities deploying grid computing e-science concepts areas well textgrid grid project humanities uses buzzword e-humanities textgrid promised create grid-based infrastructure collaborative editing annotation analysis publication specialist texts researchers philology linguistics related fields addition providing comprehensive toolset project establishes open platform projects plug textgrid valuegrids developed service level management service value networks supposed enable providers software-as-a-service solutions utilize grid infrastructures leverage german national grid infrastructure valuegrids project partners sap ag coordinator conemis ag ibm deutschland research development gmbh university freiburg karlsruhe institute technology several partner projects involved d-grid e-science project wisent wissensnetz energiemeteorologie promised optimize cooperation scientific organizations energy meteorology employing grid technologies main focus research influence weather climate transformation transport utilisation energy 100 german research facilities funded 20 billion euros 3 years german federal ministry education research | [
5956,
5414,
1480,
5210,
3323
] | None |
5,259 | 2 | D3DX:d3dx computing d3dx direct3d extension deprecated high level api library written supplement microsoft direct3d graphics api d3dx library introduced direct3d 7 subsequently improved direct3d 9 provides classes common calculations vectors matrices colors calculating look-at projection matrices spline interpolations several complicated tasks compiling assembling shaders used 3d graphic programming compressed skeletal animation storage matrix stacks several functions provide complex operations 3d meshes like tangent-space computation mesh simplification precomputed radiance transfer optimizing vertex cache friendliness strip reordering generators 3d text meshes 2d features include classes drawing screen-space lines text sprite based particle systems spatial functions include various intersection routines conversion from/to barycentric coordinates bounding box sphere generators d3dx library contains pre-written routines things common 2d/3d applications games since direct3d api relatively low-level using d3dx library usually much simpler 2012 microsoft announced d3dx would deprecated windows 8 sdk along development frameworks xna shader effects texture management geometry optimizations mesh models available separate sources published codeplex mathematical constructs d3dx like vectors matrices would consolidated xnamath directxmath spherical harmonics math provided separate source d3dx library follows com object oriented programming model functionality accessed using c++-like interfaces id3dxeffect interface used compiling binding fx shaders .fx supports automatic mapping named shader parameters hardware constant registers parameter pools mapping textures available samplers specifying 'techniques modifying render states id3dxfont interface used draw 2d text see also d3dxcreatetext creates 3d meshes text id3dxline interface used drawing anti-aliased screen-space lines pattern id3dxmesh interface used storage meshes mesh optimization vertex cache friendliness strip reordering functions d3dx operate interface example d3dxcomputetangentframe creating tangent-space frame effects like normal parallax mapping descendant class id3dxpmesh geometry simplification used precomputed radiance transfer technique similar spherical harmonics lighting used precomputed global illumination soft ambient lighting id3dxsprite interface c++ class used drawing 2d image screen known sprite computer graphics directx 7 typically done using directdraw api deprecated programmer typically needs call id3dxsprite object begin method set render state world transform 2d drawing call draw method add textures list drawn finally call end method draw images screen restore original graphics state common criticism d3dxsprite slow issue addressed direct3d 9 computes tangent-space frame mesh used effects like normal/bump mapping parallax mapping anisotropic lighting models handles vertices tangent-space discontinuities making duplicates thus solving hairy ball problem n't handle reversed uv winding faces models mirrored texture mapping may run lighting troubles | [
10243,
10769,
9234,
1043,
1055,
2083,
8227,
1577,
4143,
9263,
11316,
1077,
8246,
4174,
4178,
9813,
603,
2145,
1656,
5754,
9340,
5761,
9348,
5765,
10886,
2183,
653,
3224,
4771,
7846,
10414,
8391,
214,
9943,
9434,
2783,
736,
4321,
6370,
483... | Train |
5,260 | 3 | Wizardry:_Proving_Grounds_of_the_Mad_Overlord:wizardry proving grounds mad overlord wizardry proving grounds mad overlord first game wizardry series role-playing video games developed andrew greenberg robert woodhead 1980 norman sirotek formed sir-tech software inc. launched beta version product 1980 boston computer convention final version game released 1981 game one first dungeons dragons-style role-playing games written computer play first game offer color graphics also first true party-based role-playing video game game eventually ended first trilogy also included proving grounds needs completed order create party could play remainder trilogy starting town represented text-based menu player creates party six characters assortment five possible races humans elves dwarves gnomes hobbits three alignments good neutral evil four basic classes fighter priest mage thief four elite classes bishop priest mage spells samurai fighter mage spells lord fighter priest spells ninja fighter thief abilities unlocked characters progressed sufficiently good evil characters normally assigned party characters equipped basic armor weaponry party descends dungeon trebor castle consists maze ten levels progressively challenging last classes multiple spells seven levels characters learn advance style play employed game come termed dungeon crawl goal subsequent role-playing video games find treasure including ever potent items gain levels experience killing monsters face evil arch-wizard werdna bottom level retrieve powerful amulet goal levels find elevator stairs going next level without killed process graphics original game extremely simple today standards screen occupied text 10 devoted first-person view dungeon maze using high-resolution line graphics standards day however graphics improved text-only games far common monsters encountered dungeon maze disappears replaced picture one monsters combat 1 4 groups monsters game lack automap feature invented time release practically forces player draw map level graph paper included box walk 20x20 dungeon maze step step – failing often results becoming permanently lost many locations maze permanent darkness spell upon square making player walk blindly teleport spell sending player new location magic spell used determine current location party higher levels teleport spell used quickly transition maze levels care necessary teleporting player must enter level coordinates teleport number steps north south east west current location easily possible land trap solid stone ending game original releases wizardry also announce player teleported play resumes one step forward taken game unforgiving difficulty players save progress within dungeon must exit dungeon first event total party kill play resumed however new party may recover bodies items dead adventurers later wizardry games made easier restarting point dungeon characters died take hundreds hours finish game wizardry saves player party game progress onto scenario disk booting new one may created blank floppy disk existing one used completion proving ground mad overlord necessary play sequels wizardry ii iii since require characters first game imported scenario disk series exploits involves identification ability bishops allows characters gain massive experience points gold according co-author robert woodhead cheats actually bug caused game lack bounds-checking disabled fit within 48k ram ibm pc version game released bug declared feature deliberately included andrew greenberg cornell university student began project development 1978 game early playable state fall 1979 became popular among fellow students wizardry drew influences earlier games plato system notably 1977 role-playing game oubliette initially coded applesoft basic greenberg woodhead rewrote ucsd pascal basic proved slow playable wait run-time system available early 1981 publishing game took two half man-years complete delay benefited wizardry permitting almost one year playtesting game balancing release distinguishing others ultima frederick sirotek norman businessman father company financier insisted packaging documentation professional also distinguishing game others sold ziploc bags commodore 64/128 versions wizardry 1-3 share common code base apple originals use run-time 6502 pascal interpreter provides support overlays low-level functions interface hardware uscd pascal also used ibm versions x86 version interpreter lengthy load time extensive disk access problem wizardry however commodore versions particularly suffer provided variety workarounds c128 mode vdc memory used store overlays reus supported c64 c128 mode wizardry 2-5 also detect 16k 64k vdc memory present use 1571 drive burst mode faster load time werdna trebor names greenberg woodhead spelled backwards names also appear initials i.e. acg rjw map eighth ninth floors sir-tech published wizardry revision 2 1982 implemented number near features john m. morrison space gamer 50 commented time old disk wearing definitely recommend sending 5 transfer backup characters 'll get revision 2 boot wizardry shipped september 1981 almost immediately became hit popular apple ii game year 30 june 1982 sold 24,000 copies making one best-selling computer rpgs north america time comparison temple apshai 1979 sold 30,000 copies 1981 sold 20,000 copies time electronic games described wizardry 1983 without doubt popular fantasy adventure game apple ii present time wizardry eventually sold 200,000 copies course three years outselling original ultima time based sales market-share data video magazine listed wizardry tenth list best selling video games february 1985 ninth best seller list march 1985 ii computing listing wizardry third list top apple ii games october–november 1985 behind zork sargon iii ahead zaxxon ultima iii within months wizardry release least two commercial game trainers appeared despite sir-tech denouncing use game also perhaps first strategy guide wizisystem promised average player could succeed game successful easy-to-follow format child psychiatrist reported success using game therapy game eventually led series eight games spanning twenty years helped set genre standards intuitive layout interface forrest johnson reviewed wizardry space gamer 46 johnson commented wizardry represents leap computer game design certainly best d-style computer game market game reviewed 1982 dragon 65 bruce humphrey humphrey stated much good game difficult decide begin concluded describing easily beaten solved recommend anyone tired mediocre programs ho-hum dungeon encounters computer gaming world year praised one all-time classic computer games complex yet playable major faults minor one described review ease parties initially killed macintosh version game known fans macwizardry reviewed 1986 dragon nowiki /nowiki first role computers column reviewers called macwizardry delightful reintroduction marvelous classic subsequent column reviewers gave mac version game 4 5 stars jerry pournelle named one two games month march 1986 writing n't know fascination wizardry describe objective terms seems boring—which certainly witness time eaten month wizardry series ported various japanese computers nec pc-8801 became popular along ultima inspired jrpg series like dragon quest final fantasy 1984 softline readers named game popular apple program time game top-rated adventure five years computer gaming world reader poll ultima iv replaced 1986 score 7.69 10 1988 wizardry among first members magazine hall fame honoring games rated highly time readers magazine 1982 review predicted 1990 game received ninth-highest number votes survey computer gaming world readers all-time favorites 1991 1993 magazine scorpia wrote mainly hack-and-slash still grand expedition even today 1996 magazine named wizardry 16th best game ever editors wrote seminal dungeon romp rpg sent ad fans scrambling buy apple iis | [
577,
9446,
712,
3307,
4527,
10449,
4530,
11411,
3413,
4536,
5436
] | None |
5,261 | 4 | Shedun:shedun shedun family malware software also known kemoge shiftybug shuanet targeting android operating system first identified late 2015 mobile security company lookout company affecting roughly 20,000 popular android applications lookout claimed hummingbad malware also part shedun family however claims refuted avira protection labs stated shedun family malware detected cause approximately 1500-2000 infections per day three variants virus known share roughly ~80 source code mid 2016 arstechnica reported approximately 10.000.000 devices would infected malware new infections would still surging malware primary attack vector repackaging legitimate android applications e.g facebook twitter whatsapp candy crush google snapchat adware included app remains functional released third party app store downloaded application generates revenue serving ads estimated amount 2 us per installation users get rid virus without getting new device way get rid malware root affected devices re-flash custom rom addition shedun-type malware detected pre-installed 26 different types chinese android-based hardware smartphones tablet computers shedun-family malware known auto-rooting android os using well-known exploits like exynosabuse memexploit framaroot causing potential privilege escalation serving trojanized adware install within system partition operating system even factory reset remove malware infected devices shedun malware known targeting android accessibility service well downloading installing arbitrary applications usually adware without permission classified aggressive adware installing potentially unwanted program applications serving ads april 2016 shedun malware security researchers considered next impossible remove entirely avira security researcher pavel ponomariov specialized android malware detection tools mobile threats detection mobile malware detection automation research published in-depth analysis computer virus | [
11266,
1892,
901,
7739,
8997,
10756,
2538,
9771,
877,
7983,
3473,
7515,
2259,
2041,
1242,
1083,
10141
] | None |
5,262 | 2 | Google_Daydream:google daydream daydream virtual reality vr platform developed google built android mobile operating system versions nougat 7.1 later compatible phones follow platform software hardware specifications thus designated daydream-ready used google daydream view virtual reality head-mounted display mount daydream platform announced google i/o developer conference may 2016 first vr headset released november 10 2016 daydream company second vr platform following google cardboard low-cost system intended encourage interest vr built compatible mobile apps rather operating system confused daydream screensaver feature introduced android 4.2 2012 renamed screen saver 2016 launch vr platform first-generation google daydream view announced october 4 2016 daydream-ready smartphones placed front compartment daydream view viewed vr headset two lenses view distinguished previous vr head mounts constructed light-weight cloth material well featuring capacitive nubs nfc chip simplify process setting virtual reality viewing daydream view released november 10 2016 daydream view launched slate color option two new color choices crimson snow became available december 8 2016 review google daydream view adi robertson verge wrote headset best mobile headset 'd ever used complimenting squishy foam-and-fabric body significantly smaller lighter portable samsung gear vr design keeps lenses relatively protected travel also liked device weight distribution writing rests weight forehead cheeks option 've found comfortable allows wear easily hours time also praised material particularly plastic sliders rather velcro patches head strap writing allows wider range sizes avoids gathering lint view overall design could almost pass airplane sleep mask meaning avoids looking ostentatiously high-tech intimidating google daydream headsets packaged wireless controller controller used interacting virtual world button presses waving device on-board sensors used track orientation controller approximate position user hand daydream view controller stored inside headset use controller touch pad two circular buttons one functioning home button one functioning app-specific button two volume buttons along status light controller rechargeable charges via usb-c. support pages google notes daydream view n't include charger cables instead directs users purchase google store may 2016 google i/o developer conference google announced virtual reality vr mode called daydream would coming new android release nougat vr mode lets players use virtual reality apps including youtube google maps street view google play movies tv google photos immersive view google recruited media companies like netflix ubisoft entertainment apps january 2017 google opened daydream program third-party developers second-generation daydream view unveiled made google 2017 event first time available three colors namely charcoal fog coral largely similar first-generation improvements including slightly altered design improved lenses wider field view hand augmented reality major upgrade exclusive second-generation design released 19 october 2017 launch price us 99 lenovo mirage solo headset announced ces 2018 first standalone headset running google daydream platform powered qualcomm snapdragon 835 system-on-chip 4 gb ram 64 gb internal storage expandable microsd dual mics 3.5mm headphone jack 2560 x 1440 lcd screen 4,000 mah battery highlight feature support google worldsense improved position tracking technology headset designed coupled mirage camera point-and shoot 180-degree 3d vr camera two lenses capture 4k lenovo released device may 2018 price 399 daydream work certain newer phones specific components google announced google i/o conference eight hardware partners make daydream-ready phones samsung htc lg xiaomi huawei zte asus alcatel phones dedicate processing power daydream mode order reduce latency prevent nausea sundar pichai expects 11 android smartphones support daydream vr sale end 2017 following phones confirmed daydream-ready google play movies app daydream developed maintained google discontinued june 2019 | [
4096,
5637,
8719,
3600,
7700,
9244,
11294,
1578,
10284,
5677,
3633,
1083,
10303,
6212,
69,
8262,
4683,
4685,
11343,
3664,
8280,
8285,
2658,
8821,
11391,
1670,
9863,
7816,
6800,
11408,
10393,
8858,
7835,
673,
7841,
8870,
1191,
1203,
9913,
... | None |
5,263 | 3 | The_Fairyland_Story:fairyland story gameplay often compared taito platform games bubble bobble newzealand story liquid kids japanese msx version developed published hot-b released 1987 sharp x68000 port developed published 1991 sps fairyland story would included arcade game collections taito legends 2 taito memories jokan taito legends power-up 2003 port japanese mobile phones made available i-mode ezweb network services fairyland story platform arcade game player controls witch ptolemy series single-screen stages objective defeat enemies screen ptolemy main weapon projectile magic temporarily transform enemies large cakes caked form enemies destroyed either magic attacks dropped platform possibly squashing enemies squashing one enemy results award points sometimes extra bonuses 2000 points awarded squashing enemy cake additional enemy doubling number points awarded two enemies killed one spot coin appear spot may collected additional points collected multiply points long player n't lose life ptolemy enemies based upon typical fantasy beings include orcs pig-like soldiers salamanders dragon-like creatures breath fire wizards mages make ptolemy shrink disappear clerics bishops multiply golems wraiths hooded creatures phase ptolemy magic ptolemy takes long clear level last remaining enemy eventually enemy disappear without award points however ptolemy takes long clear one enemy level flying devil named horned appears kill ptolemy devil invulnerable ptolemy magic way survive ptolemy kill remaining enemies game element similar beluga skel monsta fish limit time allowed level later taito game bubble bobble ptolemy deaths animated different ways depending enemy kills sometimes collect utility bonuses increase power range magic short offensive bonuses usually result cake-ification destruction on-screen enemies various intervals levels intermission screen appears game showing ptolemy riding back large wingless blue dragon named rodemy message appears intermission screens either congratulating player warning hazard next level many messages contain incorrect english idioms grammar typical engrish reviewing taito legends 2 kristan reed eurogamer wrote fairyland story lot fun although lacks two-player co-op fun sadly ... hugely addictive though msx port developed published hot-b released september 3 1987 port featured degraded graphics sound arcade version typical arcade ports msx new stages perhaps make degradation graphics sound new stages based taito properties like level 37 resembling mr. chack n chack n pop port also featured two new enemies iron golem golem enemy immune ptolemy magic fleck enemy use magic ptolemy hot-b also developing port famicom port later cancelled unknown reasons later 1992 sharp x68000 port developed published sps released september 27 1991 unlike msx port however straightforward port arcade version like arcade ports sharp x68000 added several features found original arcade version like level progress high score saving choice two soundtracks choices emulation original soundtrack remixed soundtrack 2003 port made available japanese mobile phones via i-mode ezweb network services much information known port besides screenshots music port appearing soundtrack album mobile games made taito emulated versions original arcade version would later included arcade collections taito legends 2 taito memories jokan taito legends power-up ptolemy appears player character space invaders dx 1994 pop n pop 1998 daifugo party 2010 arkanoid vs. space invaders 2017 also made cameo appearances several games including new zealand story 1988 bubble symphony 1994 bubble memories 1996 arkanoid ds 2007 1987 secret island based fairyland story named magical island enemies music used secret island ptolemy appear versions rainbow islands feature secret island however make cameo appearance game boy color port rainbow islands cutscenes proceeding magical island worm enemy makes appearances doko 1989 doko 2 1991 many bubble bobble new zealand story gameplay elements even graphics bonuses first appeared fairyland story | [
5882,
10931,
1693,
9006
] | None |
5,264 | 3 | UAE_(emulator):uae emulator uae computer emulator emulates hardware commodore international amiga range computers released gnu general public license uae free software uae released 1995 originally called unusable amiga emulator due inability boot early stages known unix amiga emulator later names well since none popular expansions fit abbreviation longer stands anything software simply known uae — occasionally gets backronymed universal amiga emulator ultimate amiga emulator ubiquitous amiga emulator uae almost full-featured amiga emulator emulates functions software uae may use disk images made original amiga floppy disks images file extension adf amiga disk file actual amiga disks used limitations floppy controllers used computers images amiga formatted hard drives also made uae also supports mapping host operating system directories amiga hard drives uae include original amiga operating system rom files required running amiga system included license packages like amiga forever original kickstart 3.1 rom images also included amigaos4 powerpc since version 4.1 update 4 uae also supports alternative system roms derived aros project however provide degree software compatibility original roms uae ported many host operating systems including linux macos freebsd dos microsoft windows risc os beos palm os android xbox console psp psvita gp2x handhelds ios wii dreamcast consoles even amigaos morphos aros many threads past usenet public forums people argued possibility writing amiga emulator considered uae attempting impossible demanding system read process output 100 mb/s data fastest pc 66 mhz 486 keeping various emulated chips amiga chipset sync appearing supposed appear software uae almost entirely unusable first releases slowly step step fleshed support amiga chipset end 1997 able emulate amiga 500 quality speed sufficient productivity use many games since uae usable thanks partly effort taken develop partly big improvements technology brought computers many times faster uae initially running many amiga games applications run smoothly pentium ii-era system realization useful amiga emulator could written contributed increase enthusiasm emulation started sped-up efforts write emulators often less popular computer electronic game architectures major improvement made 2000 bernd meyer use just-in-time compilation significantly improved emulation speed extent average pcs could emulate amiga software faster real amiga could run uae use much host power native mode possible balance requirements host os accurately reflect original speed depending user choice uae also provides rtg-compatible video card amiga side emulation tailored display host hardware limited emulation original amiga video hardware five main forks original program active fork winuae current versions still contain bugs compatibility issues specific versions | [
3462,
7305,
2058,
139,
6797,
2193,
9236,
3350,
2073,
3233,
8609,
9249,
8618,
10284,
6062,
7983,
432,
8369,
8115,
823,
6075,
11076,
8776,
10570,
5709,
1742,
850,
4564,
6233,
8410,
5729,
7269,
5736,
11370,
5743,
10224,
11123,
5492,
7286,
98... | Validation |
5,265 | 3 | Yamaha_YM2413:yamaha ym2413 ym2413 a.k.a opll cost-reduced fm synthesis sound chip manufactured yamaha corporation based ym3812 opl2 make chip cheaper manufacture many internal registers removed result ym2413 play one user-defined instrument time 15 instrument settings hard-coded altered user cost-cutting modifications number waveforms reduced two channels mixed using adder instead chip dac uses time-division multiplexing play short segments channel sequence also done ym2612 ym2413 used | [
3168,
10018,
9957,
3788,
2861,
9006,
5009,
8561,
8945,
6197
] | Test |
5,266 | 3 | Osborne_PC_prototype:osborne pc prototype early summer 1983 effort launched produce version osborne executive would compatible ibm pc although venture partners contributed 9 million funding april another 11 million june osborne unable raise additional 20 million considered necessary get ibm-compatible product market tiger team formed primarily create prototype dos compatible printed circuit board front bezel accommodate changes connectors design used many parts executive including disc drives display chassis power supply keyboard completed six weeks shown number potential investors unable generate sufficient interest save company bankruptcy 2 august new jersey plant shut 89 workers laid days later 200 workers let go hayward ca facility early september banks seized company accounts receivable 9 september additional 270 workers fired production ceased leaving 80 employees california payroll three days later 12 september porter hurt filed suit 4.5 million owed firms pc boards 13 september 1983 occ filed chapter 11 protection oakland ca federal bankruptcy court listing assets 40 million liabilities 45 million 600 creditors | [
1776,
7983
] | None |
5,267 | 3 | DNA-OS:dna-os dna-os french-made operating system supersede muteka obsolete operating system still providing posix thread api said soclib website kernel-mode lightweight operating system multiprocessor system chip build top thin hal ease porting new platforms processor architecture dna/os support virtual memory dna-os layered microkernel operating system written c99 released gnu gplv3 license | [
7745,
7170,
2179,
4039,
8713,
11145,
4076,
4569,
10156,
7823,
1584,
7187,
11062,
1399,
7224,
3129,
3451,
1853
] | Train |
5,268 | 7 | Satmetrix:satmetrix satmetrix systems inc. privately held experience management company headquartered san mateo california united states satmetrix systems operates subsidiary nice ltd company founded customercast inc. 1997 andre o. schwager roselie buonauro acquired nice systems july 2017 company provides satmetrix npx customer experience management cem platform provides business consulting services including design strategy analytics implementation satmetrix provides survey platform market research customer satisfaction loyalty customer feedback along bain company fred reichheld satmetrix systems co-developed net promoter score nps metric serves measure loyalty consumer provider | [
2328,
6737,
9305
] | None |
5,269 | 3 | Ducks_demo:ducks demo ducks demo tech demo demonstrated capabilities playstation 2 e3 2000 playstation 3 e3 2005 playstation 2 demo one duck shown interacting water bathtub playstation 3 demo many ducks interacting environment visual representation leap processing abilities playstation 2 sony executives promise playstation 3 deliver ducks demo basis super rub dub downloadable title ps3 produced scee demo phil harrison shows crowd small bathtub rubber ducks uses demonstrate real-time water ripples dynamics uses two toy pirate ships demonstrate cloth dynamics show cell processing power adds huge amount ducks tub reacting would real-life due advanced physics engine phil comments dryly possible use lod technology n't know lod stands lots ducks phil harrison invites creator eyetoy show new technology playstation 3 use plugging standard playstation 2 eyetoy playstation 3 picks two ordinary cups proceeds move cups scooping motion scoops water pictured screen animating reacting real water would ducks demo basis super rub dub downloadable title ps3 produced scee | [
8937,
5746,
10316,
6311
] | None |
5,270 | 5 | IEEE_802.3:ieee 802.3 ieee 802.3 working group collection institute electrical electronics engineers ieee standards produced working group defining physical layer data link layer media access control mac wired ethernet generally local area network lan technology wide area network wan applications physical connections made nodes and/or infrastructure devices hubs switches routers various types copper fiber cable 802.3 technology supports ieee 802.1 network architecture 802.3 also defines lan access method using csma/cd | [
8708,
7045,
9860,
3847,
7049,
1297,
7698,
5118,
5529,
5531,
2206,
5671,
9767,
5291,
172,
4396,
6187,
816,
434,
3762,
2998,
3383,
7865,
11321,
5437,
5439,
5185,
3780,
11332,
7498,
8266,
9939,
7258,
10332,
3040,
2785,
1893,
4581,
5863,
4202... | None |
5,271 | 4 | Virtual_private_database:virtual private database virtual private database vpd masks data larger database subset data appears exist without actually segregating data different tables schemas databases typical application constraining sites departments individuals etc operate records time allowing privileged users operations e.g reports data warehousing etc access whole table term typical oracle dbms implementation general tables associated sql functions return predicate sql expression whenever query executed relevant predicates involved tables transparently collected used filter rows select insert update delete different rules | [
2369,
1314,
10340,
2901
] | Test |
5,272 | 3 | NUMAlink:numalink numalink system interconnect developed silicon graphics sgi use distributed shared memory ccnuma computer systems numalink originally developed sgi origin 2000 onyx2 systems time systems introduction branded craylink sgi brief ownership cray research hewlett packard enterprise entered original equipment manufacturer oem arrangement silicon graphics international sgi use numalink foundation mission critical servers numalink 1 sgi engineers deemed system interconnect used stanford dash first generation numalink interconnect numalink 2 branded craylink second generation interconnect announced october 1996 used onyx2 visualization systems origin 200 origin 2000 servers supercomputers numalink 2 interface hub asic numalink 2 capable 1.6 gb/s peak bandwidth two 800 mb/s pecl 400 mhz 16-bit unidirectional links numalink 3 third generation interconnect introduced 2000 used origin 3000 altix 3000 numalink 3 capable 3.2 gb/s peak bandwidth two 1.6 gb/s unidirectional links name numaflex used modular design approach around time numalink 4 fourth generation interconnect introduced 2004 used altix 4000 numalink 4 capable 6.4 gb/s peak bandwidth two 3.2 gb/s unidirectional links numalink 5 fifth generation interconnect introduced 2009 used altix uv series numalink 5 capable 15 gb/s peak bandwidth two 7.5 gb/s unidirectional links numalink 6 sixth generation interconnect introduced 2012 used sgi uv 2000 sgi uv 3000 sgi uv 30 numalink 6 capable 6.7 gb/s bidirectional peak bandwidth 256 socket system 64tb coherent shared memory numalink 7 seventh generation interconnect introduced 2014 used hpe integrity mc990 x/sgi uv 300 sgi uv 30ex sgi uv 300h sgi uv 300rl numalink 7 capable 14.94 gb/s bidirectional peak bandwidth 64 socket system 64tb coherent shared memory numalink 8 eighth generation interconnect introduced 2017 used hpe superdome flex numalink 8 capable 853.33 gb/s bisection peak bandwidth 64 links cut 32 socket system 48tb coherent shared memory | [
5380,
7942,
5898,
7311,
5523,
5156,
426,
3764,
11447,
7234,
10051,
6858,
9932,
5076,
2264,
7001,
221,
6243,
1638,
5356,
1398,
1149
] | Test |
5,273 | 7 | IBM_Intelligent_Cluster:ibm intelligent cluster ibm intelligent cluster cluster solution high-performance computing composed primarily ibm system x ibm bladecenter ibm system storage components integrated network switches various vendors optional high-performance infiniband interconnects solution previously known ibm system cluster 1350 eserver cluster 1350 simply e1350 roughly twice year solution components updated include then-current products ibm vendors solution predated eserver cluster 1300 e1300 based then-current pentium iii processors introduced november 2001 replaced e1350 october 2002 introduction pentium 4-based intel xeon processors operating system choices officially limited enterprise linux distributions red hat suse microsoft windows hpc server 2008 systems management ibm offered xcat additional software gpfs loadleveler could also ordered ibm intelligent cluster systems integrated factory-built tested cluster solutions comprehensive warranty service components including third-party options system could comprise traditional rack-optimized nodes well ibm bladecenter idataplex nodes processor choices intel xeon amd opteron processors along integrated storage switches provide turnkey linux microsoft cluster environment | [
6597,
3791,
9455,
6677,
1115,
7615
] | Test |
5,274 | 2 | Nokia_N85:nokia n85 nokia n85 high-end smartphone produced nokia announced 27 august 2008 part nseries line n85 runs symbian os v9.3 s60 3rd edition platform feature pack 2 released october retailing 450 euros taxes major feature n85 introduced amoled display giving brighter sharper colours n85 dual-slider like nokia n95 access either media playback buttons numeric keypad 25 slimmer size upper sliding keys illuminate four multimedia keys music video playback two gaming keys playing n-gage 2.0 games also navi wheel like nokia n81 replaced bases design well gps receiver 5-megapixel camera dual led flash fm transmitter n85 well received decent upgrade n95 well better actual flagship nokia n96 costed 100 euros additions somewhat critically negative compared n96 n85 thinner lighter camera lens cover larger battery capacity usb charging via microusb port amoled screen although without large internal memory dvb-h receiver two-way slider spring assistance mechanism optional dvb-h nokia mobile tv receiver su-33w possible watch television screen phone | [
1537,
4609,
8577,
3205,
11655,
9359,
1424,
529,
2449,
8083,
10770,
5143,
2072,
7063,
8472,
5019,
5659,
669,
11545,
4003,
4132,
6310,
167,
40,
3626,
5290,
10410,
9262,
10802,
7220,
821,
5175,
7866,
1083,
1728,
7617,
4291,
7877,
10053,
199,... | Test |
5,275 | 3 | SWIV:swiv swiv 2d vertically scrolling shoot 'em game originally released 1991 commodore amiga atari st commodore 64 zx spectrum amstrad cpc home computer formats converted game boy color 2001 game considered spiritual successor tecmo arcade game silkworm sales curve previously converted home computer formats 1989 game heritage evident game design whereby one player pilots helicopter armoured jeep swiv official sequel noted ex-sales curve producer dan marchant swiv n't really sequel silkworm certainly inspired several shoot-'em-ups played loved game amiga manual however explained swiv acronym special weapons interdiction vehicle also short silkworm iv even though silkworm ii iii swiv vertically scrolling shoot-em-up plays typical fashion games genre player chooses using either helicopter jeep beginning game plays chosen vehicles scrolling levels shooting oncoming enemies two players present vehicles used certain enemies shot drop shield power-ups either picked afford temporarily invincibility detonated destroy enemies onscreen every often boss enemy attack destruction bosses give upgrades player forward firing gun amiga version ’ cheat mode could activated typing ncc1701d title screen release swiv met positive reviews magazines time receiving 92 amiga format magazine 88 commodore format c64 version 91 amiga action 90 computer video games 90 sinclair game ranked 27th best game time amiga power swiv popular enough spawn direct sequel arrived super nes title super swiv later ported mega drive mega swiv 1997 sequel titled swiv 3d released making use 3d terrain models | [
8709,
4043,
8492,
9006,
10862,
4690,
6390,
9501,
1693,
4894
] | None |
5,276 | 3 | Ceva_(semiconductor_company):ceva semiconductor company ceva publicly listed semiconductor intellectual property ip company headquartered mountain view california specializes digital signal processor dsp technology company main development facility located herzliya israel sophia antipolis france ceva recently named israeli 100 companies list technologies changed world ceva created november 2002 combination dsp ip licensing division dsp group parthus technologies plc irish company founded 1993 company develops semiconductor intellectual property core technologies multimedia wireless communications technology ceva claimed largest number baseband processors 2010 90 dsp ip market share 2011 july 2014 acquired rivierawaves sas private company based france | [
10725,
9042,
9413,
11094
] | Test |
5,277 | 9 | Jean_E._Sammet:jean e. sammet jean e. sammet march 23 1928 – may 20 2017 american computer scientist developed formac programming language 1962 also one developers influential cobol programming language received b.a mathematics mount holyoke college 1948 m.a mathematics university illinois urbana-champaign 1949 received honorary d.sc mount holyoke college 1978 sammet employed sperry gyroscope 1955 1958 supervised first scientific programming group 1958 1961 worked sylvania staff consultant programming research member original cobol group joined ibm 1961 developed formac first widely used computer language symbolic manipulation mathematical formulas ibm researched use restricted english programming language use natural language mathematical programs programming technology planning manager federal systems division 1968 1974 appointed software technology manager 1979 sammet founded acm special interest committee symbolic algebraic manipulation sicsam 1965 chair special interest group programming languages sigplan first female president acm 1974 1976 jean e. sammet born march 23 1928 new york city jean sister helen born harry ruth sammet lawyers jean helen attended public elementary schools manhattan sammet strong interest mathematics unable attend bronx high school science accept girls instead sammet attended julia richman high school sammet chose enroll mount holyoke college based strength mathematics program sammet majored mathematics took education courses allowed certified teach high school mathematics new york minored political science graduating mount holyoke sammet pursued graduate studies university illinois received 1949 taking courses toward ph.d. teaching assistant mathematics department university illinois 1948 1951 sammet first encountered computer 1949 university illinois impressed considering obscene piece hardware 1951 sammet began looking position education sammet forced search positions new jersey new york city hiring new teachers authorities new jersey determined sammet missing two courses studies course education one history new jersey sammet fought determination stating knowledge new jersey history strengthen ability teach mathematics high school forced sammet seek types employment 1951 sammet took position metropolitan life insurance company trainee actuary agreed participate in-house training program learn punched card accounting machines sammet took electronic accounting machines unable work machines training complete left position insurance office enrolled columbia university pursue ph.d. mathematics sammet worked teaching assistant barnard college 1952-1953 school year decided academic life 1953 1958 sammet mathematician sperry gyroscope new york spent time working mathematical analysis problems clients ran analog computer sammet worked department navy ’ submarine program time early january 1955 sammet began life programmer sperry gyroscope working digital computer sperry electronic digital automatic computer speedac asked sammet programmer first task write basic loader speedac 20-line program took three days toggle computer hand binary sammet became group leader called “ open shop ” sperry began hiring programmers “ open shop ” consisted programmers acting consultants engineers involved scientists assisted writing testing routines group produced system software focused scientific engineering computations 1955 sperry gyroscope remington rand merged became sperry rand merger allowed sammet access univac computer grace hopper fall 1956 sammet taught one earliest graduate-level courses computer programming applied mathematics department adelphi college university long island despite fact adelphi computer textbooks programming existed time sammet able instruct two courses two years sammet decided leave sperry work company computers focal point classifieds time separated gender sammet unable find position woman field interested decided scan men ’ list found engineer position sylvania electric products needham massachusetts sammet instead hired oversee software development mobidic project carl hammer person responsible sylvania ’ software development 1959 sammet five programmers established much design influential cobol programming language proposal written span two weeks eventually accepted sylvania u.s. government clients around 1965 1966 sammet noticed need exchange intellectual information others working languages software worked formac member acm number years active became interested starting special interest group would allow speak professionals field couple failed attempts contacting person charge special interest groups special interest committees acm sammet contacted george forsythe president acm 1964 1966 named chairperson special interest committee symbolic algebraic manipulation order gain interest sicsam sammet wrote letters people identified publications happening field time identified people bell labs carnegie mellon ibm different divisions groups sammet faced resistance interest group numerical analysis acm roughly five years sicsam formed conference mathematical software called signum sammet states fought way give paper signum group interested non-numerical analysis kind activity assistance interested sicsam sammet organized conference held march 1966 symposium symbolic algebraic manipulation symsam june 1966 tony oettinger elected president acm sammet elected northeast regional representative 1966-1968 also member acm council acm lecturer 1967 1968 1972 bernie galler elected president acm 1968 august 1968 sammet became chairperson acm committee sigs sics 1971 elected chair sigplan served one year two-year term resigning elected vice president acm 1972 chairperson sigplan organized conferences sigplan various special interest groups sammet stated conferences organized based recognition fundamental programming languages different aspects within computing sammet served vice president acm june 1972 june 1974 working president acm time tony ralston sammet made finances acm priority time vice presidency acm almost bankrupt sammet convinced ralston hold member-office forum prior annual conference sammet encouraged based recognition acm realistic way communicating membership sammet died may 20 2017 silver spring maryland brief illness | [
9889,
4483,
1864,
2804,
8502,
4985,
3323
] | None |
5,278 | 0 | Postmodernism_Generator:postmodernism generator postmodernism generator computer program automatically produces close imitations postmodernist writing written 1996 andrew c. bulhak monash university using dada engine system generating random text recursive grammars free version also hosted online essays produced formal grammar defined recursive transition network nassim nicholas taleb writes monte carlo generators 2001 book fooled randomness real instance reverse turing test human declared unintelligent writing told apart generated one mentioned biologist richard dawkins conclusion article postmodernism disrobed 1998 scientific journal nature reprinted book devil chaplain 2004 | [
1890,
1652,
10591,
5098
] | None |
5,279 | 2 | Immunix:immunix immunix discontinued commercial operating system provided host-based application security solutions last release immunix gnu/linux distribution version 7.3 november 27 2003 immunix inc. creator apparmor application security system may 10 2005 novell acquired immunix inc. long-time partner novell apparmor one novell primary interests result adopted company renamed novell apparmor powered immunix september 2007 novell laid apparmor team | [
8837,
7435,
10127,
2321,
4887,
10394,
673,
3745,
10530,
9253,
10149,
11305,
7854,
7983,
9646,
2738,
4790,
823,
439,
56,
59,
7483,
3903,
4673,
2375,
4039,
8907,
1110,
9693,
6625,
2914,
6754,
485,
3685,
9064,
4841,
6890,
7913,
7020,
10860,
... | Test |
5,280 | 2 | Trusted_Solaris:trusted solaris trusted solaris discontinued security-evaluated operating system based solaris sun microsystems featuring mandatory access control model trusted solaris 8 common criteria certified evaluation assurance level eal4+ capp rbacpp lspp protection profiles basis dodiis trusted workstation program features previously available trusted solaris fine-grained privileges part standard solaris release solaris 10 11/06 update new component called solaris trusted extensions introduced making longer necessary different release modified kernel labeled security environments solaris trusted extensions opensolaris project solaris trusted extensions enabled enforces mandatory access control policy aspects operating system including device access file networking print window management services achieved adding sensitivity labels objects thereby establishing explicit relationships objects appropriate explicit authorization allows applications users read and/or write access objects component also provides labeled security features desktop environment apart extending support common desktop environment trusted solaris 8 release delivered first labeled environment based gnome solaris trusted extensions facilitates access data multiple classification levels single desktop environment solaris trusted extensions also implements labeled device access labeled network communication commercial internet protocol security option cipso standard cipso used pass security information within labeled zones solaris trusted extensions complies federal information processing standards fips | [
2179,
8077,
4239,
2967,
6049,
6445,
9646,
7983,
10036,
9665,
8904,
10962,
11363,
366,
381,
11506,
5240,
4858,
125,
9343
] | Validation |
5,281 | 4 | Dialer:dialer dialer american english dialler british english electronic device connected telephone line monitor dialed numbers alter seamlessly provide services otherwise require lengthy national international access codes dialed dialer automatically inserts modifies numbers depending time day country area code dialed allowing user subscribe service providers offer best rates example dialer could programmed use one service provider international calls another cellular calls process known prefix insertion least cost routing line powered dialer need external power instead takes power needs telephone line another type dialer computer program creates connection internet another computer network analog telephone integrated services digital network isdn many operating systems already contain program connections point-to-point protocol ppp wvdial many internet service providers offer installation cds simplify process setting proper internet connection either create entry os dialer install separate dialer aol software recent years term dialer often refers specifically dialers connect without user full knowledge cost creator dialer intending commit fraud call centers several dialling modes depending call placed 'manual dialing refers calls placed manually agent 4 different dialing modes depending software dialers selects contacts going called starts making calls automated dialers sold noble systems avaya convoso formerly safesoft solutions place calls using *preview* *power* auto dialing predictive dialing dialing modes defined according campaign type business preview dialing enables agents first view available information customer decide place call addition information customer agents may also view history customer contact center viewing information customer agent requests system make call example preview dialing useful debt collection campaigns allow agents view information customer define strategy starting talk customer system delivers preview calls agents automatically taking account priority call skills agent handle call preview dialing keeps agents dialing calls manually power dialer similar autodialer software enables telemarketers sales teams call centers dial list phone numbers automatically completely hands-free thus saving valuable time energy would otherwise wasted dialing hand predictive dialing state-of-the-art pacing mode used call large number customers within short period time predictive dialing optimizes time agents reducing idle times connected calls freeing agents dialing calls predictive dialing gathers statistics concerning duration calls long takes calls answered often calls answered agent become idle system places several calls predictive dialing campaigns achieve agent productivity 50 minutes per hour nuisance ratios 3 less system continually updating predictive dialing probabilities monitoring nuisance ratios performance compliance legislation example predictive dialing useful sales campaigns call large number contacts maximizing working time agents performance predictive dialing takes consideration accuracy contact lists policies nuisance calls contact list poor performance predictive dialing campaign risk agents connected live contacts able business power ivr used deliver pre-recorded message large call list call answered power ivr play audio file collect touch tone key responses speech command end message transfer call agent remove caller call list words ivr technology allows computer interact humans use voice dtmf tones input via keypad voice drop power ivr except wait touch tone key responses speech command end message playing message call dropped mostly used payment reminders similar dialers necessary connect internet least non-broadband connections dialers designed connect premium-rate numbers providers dialers often search security holes operating system installed user computer use set computer dial number make money calls alternatively dialers inform user promise special content accessible via special number examples content include software download usually illegal trojans posing mp3s trojans posing pornography 'underground programs cracks keygens cost setting service relatively low amounting thousand dollars telecommunications equipment whereupon unscrupulous operator typically take 90 cost premium rate call overheads users dsls similar broadband connections usually affected dialer downloaded installed dialing possible regular phone numbers dsl network users typically dial-up modem connected phone line however isdn adapter additional analog modem installed dialer might still able get connection malicious dialers identified following characteristics computers running microsoft windows without anti-virus software proper updates could vulnerable visual basic-scripts install trojan horse changes values windows registry sets internet explorer security settings way activex controls downloaded internet without warning change made user accesses malicious page email message start installing dialer script also disables modem speaker messages normally come dialing network users microsoft office outlook outlook express internet explorer especially affected running activex controls javascript allowed latest security patches microsoft installed march 2004 malicious dialers could installed fake anti-virus software e-mail spam so-called antivirus team example contained download links programs named downloadtool.exe antivirus.exe malicious dialers ways transmission include electronic greeting cards link pages tricks user install activex controls turn install dialers background therefore links spam emails never opened automatically started downloads canceled soon discovered one check dial-up internet see whether displayed phone number unchanged another way protect oneself disable premium numbers one phone services course disables services one never run foreign code privileged environment unless source trustworthy also advisable protect oneself anti-malware programs 15 august 2003 new law came effect germany called gesetz zur bekämpfung des missbrauchs von 0 190er/ 0 900er mehrwertdiensterufnummern law combat misuse 0 190/ 0 900 value added service numbers law contains following regulations 4 march 2004 german federal supreme court karlsruhe decided fees usage dialers paid used without user knowledge december 2016 ofcom office communications announced changes call centre regulations focused persistent use dialers make call residential telephone numbers also added extra clarity call centres approach issue silent abandoned calls ofcom also regulate abandoned call messages work message state company name reason calling importantly used opportunity market business | [
3072,
5250,
6786,
5764,
7044,
3462,
10245,
10756,
9227,
9356,
9102,
7441,
8978,
4863,
4883,
4245,
278,
9233,
10392,
1690,
3867,
9242,
10141,
9761,
2213,
5926,
8998,
9256,
10026,
9771,
300,
7983,
1970,
2611,
4023,
6712,
10297,
3643,
6588,
... | Test |
5,282 | 4 | Dave_Aitel:dave aitel dave aitel computer security professional joined nsa research scientist aged 18 worked six years employed consultant stake three years 2002 founded security software company immunity cto aitel co-authored several books also well known writing several security tools dave aitel infrequent guest fox news channel provides commentary information security news | [
5512,
7887,
9488,
2262,
2558
] | Test |
5,283 | 7 | CaBIG:cabig cancer biomedical informatics grid cabig us government program develop open-source open access information network called cagrid secure data exchange cancer research initiative developed national cancer institute part national institutes health maintained center biomedical informatics information technology cbiit 2011 report cabig raised significant questions effectiveness oversight budget scope significantly trimmed may 2012 national cancer informatics program ncip created cabig successor program national cancer institute nci united states funded cancer biomedical informatics grid cabig initiative spring 2004 headed kenneth buetow goal connect us biomedical cancer researchers using technology known grid computing program led center bioinformatics information technology cbiit began 3-year pilot phase pilot phase concluded march 2007 trial announced buetow promoted program 2008 addition cagrid underlying infrastructure data sharing among organizations cabig developed software tools data sharing policies common standards vocabularies facilitate data sharing software tools targeted cabig sought provide foundational technology approach biomedicine called “ learning healthcare system. ” relies rapid exchange information among sectors research care researchers clinicians able collaboratively review accurately incorporate latest findings work ultimate goal speed biomedical research process also promoted often called personalized medicine cabig technology used adaptive clinical trials investigation serial studies predict therapeutic response imaging molecular analysis 2 i-spy2 designed use biomarkers determine appropriate therapy women advanced breast cancer health information technology hit promoted management secure exchange medical information among researchers health care providers consumers hit initiatives mentioning cabig nci american society clinical oncology initiated collaboration create oncology-specific electronic health record system using cabig standards interoperability enable oncologists manage patient information electronic format accurately captures specific interventional issues unique oncology nationwide health information network initiative share patient clinical data across geographically disparate sources create electronically linked national health information exchange might somehow related big health consortium formed 2008 promote personalized medicine disbanded 2012 july 2009 cabig announced collaboration dr. susan love research foundation build online cohort women willing participate clinical trials called army women goal one million database december 2009 site launched 30,000 women men signed 2010 cancer genome atlas aimed characterize 10,000 tumors across least 20 cancers 2015. cabig provided connectivity data standards tools collect organize share analyze diverse research data database since 2007 nci worked uk national cancer research institute ncri two organizations shared technologies collaborative research secure exchange research data using cagrid ncri oncology information exchange onix web portal announced august 2009 onix shut march 2012 duke cancer institute used cabig clinical trials tools collaboration beijing cancer hospital peking university project intended connect 65 nci-designated cancer centers enable collaborative research participating institutions could either “ adopt ” cabig tools share data directly cagrid “ adapt ” commercial in-house developed software cabig-compatible cabig program developed software development kits sdks interoperable software tools instructions process adapting existing tools developing applications cabig-compatible enterprise support network program included domain-specific expertise support service providers third party organizations provide assistance contract-for-services basis web portal using liferay software available 2008 2013 since 2004 cabig program used open-source communities adapted public-private partnerships cabig program produced software contract software development teams largely within commercial research community general software developed us government contracts property us government us taxpayers depending terms specific contracts might accessible request freedom information act foia timeliness response requests might preclude requester ever gaining secondary value software released foia request cabig program placed cabig software software repository freely accessible download open source means anyone modify downloaded software however licensing applied downloaded software allows greater flexibility typical individual enterprise allowed contribute modified code back cabig program required likewise modifications made available open source required made available open source cabig licensing even allows use cabig applications components combined additions modifications released commercial products aspects cabig program actually encourage commercialization cabig technology 2008 glaxosmithkline announced would share cancer cell genomic data cabig private companies claimed benefits cabig technology 2010 cagrid community web site created 2007 1.x version core software added github project mid-2013 bsd 3-clause license used version 4.03 globus toolkit taverna workbench system manage workflow business process execution language software called introduce developed around 2006 contributors included ohio state university center clinical translational science private companies ekagra software technologies semantic bits 2008 questioned program benefiting large pharmaceutical companies 2011 project spent estimated 350 million although goal considered laudable much software unevenly adopted developed great expense compete commercial offerings march 2011 nci working group assessment concluded cabig ... expanded far beyond goals implement overly complex ambitious software enterprise nci-branded tools especially clinical trial management system ctms space produced limited traction cancer community compete established commercial vendors create financially untenable long-term maintenance support commitments nci 2012 nci announced new program national cancer informatics program ncip successor cabig cagrid computer network software supported cancer biomedical informatics grid cabig initiative national cancer institute us national institutes health cabig voluntary virtual informatics infrastructure connects data research tools scientists organizations 2013 national cancer informatics program ncip re-released cagrid bsd 3-clause license migrated source repository github cagrid uses version 4.03 globus toolkit produced globus alliance cagrid portal web-based application built liferay enables users discover interact services available cagrid infrastructure portal serves primary visualization tool cagrid middleware also served cabig information source cagrid portal users access information cabig participants cagrid points contact pocs cagrid-related news events cagrid workflow uses march 2011 nci published extensive review cabig nci cbiit program funded cagrid software development see included long list problems program recommended software development projects discontinued | [
5956,
2501,
10020,
5768,
105,
9320,
5612,
7983,
10641,
11221,
11353,
8122
] | None |
5,284 | 4 | List_of_digital_forensics_tools:list digital forensics tools 1980s digital forensic investigations consisted live analysis examining digital media directly using non-specialist tools 1990s several freeware proprietary tools hardware software created allow investigations take place without modifying media first set tools mainly focused computer forensics although recent years similar tools evolved field mobile device forensics list includes notable examples digital forensic tools memory forensics tools used acquire analyze computer volatile memory ram often used incident response situations preserve evidence memory would lost system shut quickly detect stealthy malware directly examining operating system running software memory mobile forensics tools tend consist hardware software component mobile phones come diverse range connectors hardware devices support number different cables perform role write blocker computer devices software forensics science analyzing software source code binary code determine whether intellectual property infringement theft occurred centerpiece lawsuits trials settlements companies dispute issues involving software patents copyrights trade secrets software forensics tools compare code determine correlation measure used guide software forensics expert | [
7426,
5636,
645,
2437,
10756,
2824,
778,
268,
5010,
4500,
5397,
8469,
10392,
3099,
7968,
6177,
9377,
6443,
11182,
10290,
4789,
7605,
823,
2231,
8119,
8635,
6588,
2494,
830,
7618,
8389,
6472,
7369,
6475,
10189,
4049,
3290,
4956,
4194,
2275... | Test |
5,285 | 3 | Wavefront_Technologies:wavefront technologies wavefront technologies computer graphics company developed sold animation software used hollywood motion pictures industries founded 1984 santa barbara california bill kovacs larry barels mark sylvester started company produce computer graphics movies television commercials market software off-the-shelf computer animation tools available time 1995 wavefront technologies purchased kroyer films silicon graphics rhythm hues merged alias research form alias|wavefront wavefront developed first product preview first year business company production department helped tune software using commercial projects creating opening graphics television programs one first customers purchase preview universal studios television program knight rider early customers included nbc electronic arts nasa wavefront early animation software created bill kovacs jim keating john grower left robert abel associates roy hall others developed company flagship product wavefront advanced visualizer 1988 wavefront released personal visualizer desktop workstation interface high-end rendering software wavefront software developed silicon graphics computers later ported sun ibm hewlett-packard tektronix dec sony systems wavefront purchased silicon graphics first production workstation offer buy prototype given demo knocked back 1989 company released data visualizer early commercial tool scientific visualization 1991 wavefront introduced composer image manipulation product composer became standard 2d 3d compositing special effects feature films television 1992 wavefront released two new animation tools worked advanced visualizer kinemation character animation system used inverse kinematics natural motion dynamation tool interactively creating modifying particle systems realistic natural motion dream quest images used dynamation composer create 90 visual effects sequences film crimson tide 1994 year rival alias made deal nintendo wavefront partnered atari develop gameware game development software gameware exclusive graphics animation development system atari jaguar wavefront software used numerous major films including luxo jr. great mouse detective akira tin toy technological threat knick knack dogs go heaven rock-a-doodle outbreak aladdin true lies stargate electronic arts richard taylor said wavefront software beautifully designed even non-technical person could learn wavefront major reason cg took leap forward wavefront involved several mergers major computer graphics software companies 1980s 1990s 1988 wavefront acquired abel image research division robert abel associates founder bill kovacs previously worked acquisition partially financed belgian government following wavefront establishment office ghent association barco graphics kortrijk acquiring abel image research increased wavefront presence japan japanese conglomerate csk became part owner wavefront japan 1990 helping expand company asia wavefront acquired rival computer graphics company thomson digital images france 1993 tdi software featured innovations nurbs modeling interactive rendering company also extensive distribution channels europe asia february 7 1995 silicon graphics announced would purchase wavefront technologies alias research deal totaling approximately 500 million sgi merged two companies create alias|wavefront goal creating advanced digital tools combining companies strengths reducing duplication time merger wavefront market value 119 million 1994 revenues 28 million partially motivated merger microsoft purchase alias wavefront competitor softimage sgi saw microsoft entrance market threat merged alias wavefront compete microsoft alias owned autodesk softimage october 2008 1997 whilst working wavefront jim hourihan received academy award technical achievement creation dynamation bill kovacs roy hall received scientific engineering academy award 1998 work advanced visualizer 2003 alias|wavefront awarded academy award scientific technical achievement maya software created combination earlier software wavefront alias tdi | [
9665,
10051,
5384,
921,
3323
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.