node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
5,286 | 6 | JFFS:jffs journaling flash file system jffs log-structured file system use flash memory devices linux operating system superseded jffs2 flash memory specifically flash must erased prior writing erase process several limitations constraints combine produce profound asymmetry patterns read write access flash memory contrast magnetic hard disk drives offer nearly symmetrical read write access read speed write speed nearly identical constrained rate disk spins possible read write small blocks sectors typically 512 4096 bytes practical limit number times magnetic media written rewritten traditional file systems ext2 fat designed use magnetic media typically update data structures in-place data structures like inodes directories updated on-disk every modification concentrated lack wear-levelling makes conventional file systems unsuitable read-write use flash devices jffs enforces wear levelling treating flash device circular log changes files directories written tail log nodes node header containing metadata written first followed file data nodes chained together offset pointers header nodes start valid become obsolete newer version created free space remaining file system gap log tail head runs low garbage collector copies valid nodes head tail skips obsolete ones thus reclaiming space | [
5120,
2564,
6669,
3598,
10257,
9236,
6677,
5142,
8214,
3611,
5661,
9249,
9762,
5158,
7225,
11323,
8772,
1109,
4708,
9836,
7789,
9333,
6263,
9335,
9343,
7818,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
10405,
5293,
7344,
2230,
5816,
1... | None |
5,287 | 9 | FastTrack_Scripting_Host:fasttrack scripting host fasttrack automation studio formerly known fasttrack scripting host – often referred fasttrack – scripting language windows system administrators product ’ goal handle kind scripting might required automate processes microsoft windows networks web site product located www.fasttrackscript.com fasttrack produced fasttrack software headquartered aalborg denmark product promoted manufacturer one-stop shop windows script writers development paradigm “ one operation one script line ” script writers use purpose-built editor create scripts inserting script lines via menus drag ’ n drop simply typing scripts may used box created scratch imported forums users customized product documentation simple scripts include advanced scripts include hood scripts comprise commands functions collections conditions script executed components converted many lines c code sometimes hundreds lines depending particular script operation scripts compiled exe files msi packages treated standalone windows applications fasttrack scripting host fasttrack first developed around 2006 ease administration burden system administrators windows networks idea product came founder president fasttrack software lars pedersen background systems administration previously telenor denmark ’ major telephone company pedersen performed various roles systems administration programming web development also worked consultant developer several major projects various companies europe dissatisfied experiences frustrations administering windows networks pederson looked way make life easier system administrators particular wanted something could minimize amount time needed day perform routine mundane tasks waste time expertise committed projects leading small team developers pedersen developed fasttrack scripting host simplify automate routine tasks system administrators resulting product definitely scripting language used intuitively like programming language without requiring users learn syntax concepts typically associated programming languages april 2010 fasttrack software entered agreement binary research international based city milwaukee united states market sell product globally fsh received windows pro community choice award 2012 first version produced june 2006 contained 51 components commands functions conditions collections making fasttrack following table summarizes dates components major releases companies organizations noaa kawasaki goodyear used implemented fasttrack scripting host | [
9728,
929,
11683,
3366,
6797,
9780,
10518,
1049,
5435
] | Validation |
5,288 | 0 | National_Centre_for_Text_Mining:national centre text mining national centre text mining nactem publicly funded text mining tm centre established provide support advice information tm technologies disseminate information larger tm community also providing tailored services tools response requirements united kingdom academic community software tools services nactem supplies allow researchers apply text mining techniques problems within specific areas interest – examples tools highlighted addition providing services centre also involved makes significant contributions text mining research community nationally internationally initiatives europe pubmed central centre located manchester institute biotechnology operated organized university manchester school computer science nactem contributes expertise natural language processing information extraction including named-entity recognition extractions complex relationships events hold named entitites along parallel distributed data mining systems biomedical clinical applications termine domain independent method automatic term recognition used help locate important terms document automatically ranks acromine finds known expanded forms acronyms appeared medline entries conversely used find possible acronyms expanded forms previously appeared medline disambiguates medie intelligent search engine semantic retrieval sentences containing biomedical correlations medline abstracts facta+ medline search engine finding associations biomedical concepts facta+ visualizer web application aids understanding facta+ search results intuitive graphical visualisation kleio faceted semantic information retrieval system medline abstracts europe pmc evidencefinder europe pmc evidencefinder helps users explore facts involve entities interest within full text articles europe pubmed central database eupmc evidence finder anatomical entities meta-knowledge similar europe pmc evidencefinder allowing exploration facts involving anatomical entities within full text articles europe pubmed central database facts filtered according various aspects interpretation e.g. negation certainly level novelty info-pubmed provides information graphical representation biomedical interactions extracted medline using deep semantic parsing technology supplemented term dictionary consisting 200,000 protein/gene names identification disease types organisms ascot efficient semantically-enhanced search application customised clinical trial documents hom semantic search system historical medical document archives biolexicon large-scale terminological resource biomedical domain genia collection reference materials development biomedical text mining systems grec semantically annotated corpus medline abstracts intended training ie systems and/or resources used extract events biomedical literature corpus medline abstracts annotated experts metabolite enzyme names collection corpora manually annotated fine-grained species-independent anatomical entities facilitate development text mining systems carry detailed comprehensive analyses biomedical scientific text enrichment genia event corpus events enriched various levels information pertaining interpretation aim allow systems trained distinguish events factual information experimental analyses definite information speculated information etc objective argo project develop workbench analysing primarily annotating textual data workbench accessed web application supports combination elementary text-processing components form comprehensive processing workflows provides functionality manually intervene otherwise automatic process annotation correcting creating new annotations facilitates user collaboration providing sharing capabilities user-owned resources argo benefits users text-analysis designers providing integrated environment development processing workflows annotators/curators providing manual annotation functionalities supported automatic pre-processing post-processing developers providing workbench testing evaluating text analytics big mechanisms large explanatory models complicated systems interactions important causal effects whilst collection big data increasingly automated creation big mechanisms remains largely human effort becoming made increasingly challenging according fragmentation distribution knowledge ability automate construction big mechanisms could major impact scientific research one number different projects make big mechanism programme funded darpa aim assemble overarching big mechanism literature prior experiments utilise probabilistic interpretation new patient panomics data integrate machine reading cancer literature probabilistic reasoning across cancer claims using specially-designed ontologies computational modeling cancer mechanisms pathways automated hypothesis generation extend knowledge mechanisms 'robot scientist performs experiments test hypotheses repetitive cycle text mining modelling experimental testing worldview updating intended lead increased knowledge cancer mechanisms project aims produce knowledge repository philippine biodiversity combining domain-relevant expertise resources philippine partners text mining-based big data analytics university manchester national centre text mining repository synergy different types information e.g. taxonomic occurrence ecological biomolecular biochemical thus providing users comprehensive view species interest allow 1 carry predictive analysis species distributions 2 investigate potential medicinal applications natural products derived philippine species collaboration text-mining group european bioinformatics institute ebi mimas data centre forming work package europe pubmed central project formerly ukpmc hosted coordinated british library europe pmc whole forms european version pubmed central paper repository collaboration national institutes health nih united states europe pmc funded consortium key funding bodies biomedical research funders contribution major project application text mining solutions enhance information retrieval knowledge discovery application technology developed nactem projects large scale prominent resource biomedicine community project aims transform biodiversity heritage library bhl next-generation social digital library resource facilitate study discussion via social media integration legacy science documents biodiversity worldwide community raise awareness changes biodiversity time general public project integrates novel text mining methods visualisation crowdsourcing social media bhl resulting digital resource provide fully interlinked indexed access full content bhl library documents via semantically enhanced interactive browsing searching capabilities allowing users locate precisely information interest easy efficient manner project aims conduct novel research text mining machine learning transform way evidence-based public health ebph reviews conducted aims project develop new text mining unsupervised methods deriving term similarities support screening searching ebph reviews develop new algorithms ranking visualising meaningful associations multiple types dynamic iterative manner newly developed methods evaluated ebph reviews based implementation pilot ascertain level transformation ebph reviewing | [
8440,
4131,
2059,
7780
] | None |
5,289 | 6 | Plumber_(program):plumber program plumber plan 9 bell labs inferno operating systems mechanism reliable uni- multicast inter-process communication formatted textual messages uses plan 9 network file protocol 9p rather special-purpose ipc mechanism number clients may listen named port file messages ports port routing defined plumbing rules rules dynamic listening program receives copy matching messages example data /sys/lib/plumb/basic plumbed standard rules sent edit port port write copy message listener case running editors interpret message file name open file plumber 9p file server provides service clients may use libplumb format messages since messages 9p network transparent | [] | None |
5,290 | 2 | Nokia_X7-00:nokia x7-00 nokia x7-00 symbian^3 smartphone nokia xseries first xseries phone nokia symbian^3 platform shipped anna update also successor x6 previous multimedia touchscreen phone similar features specifications series x7-00 announced 12 april 2011 alongside nokia e6 16 october 2018 hmd global announced new android smartphone china nokia x7 well known nokia 8.1 globally | [
1537,
8577,
6276,
3205,
11271,
11655,
9359,
1424,
529,
2449,
659,
8083,
10770,
5143,
2072,
7063,
5274,
5019,
5659,
669,
8472,
11545,
4003,
4132,
6310,
167,
40,
1833,
3626,
10410,
9137,
10802,
7220,
821,
5175,
7866,
1083,
1216,
1728,
7617,... | Test |
5,291 | 9 | Squeezebox_(network_music_player):squeezebox network music player squeezebox network music player logitech squeezebox originally discontinued favor visually similar simplified logitech ue smart radio 2013 logitech added official menu option install squeezebox software smart radio effectively turning squeezebox radio slim devices established 2000 first known slimserver used streaming music launched hardware player named slimp3 able play streams 2001 although first player fairly simple supporting wired ethernet mp3 natively followed two years later slightly advanced player renamed squeezebox versions followed gradually adding native support additional file formats wi-fi-support gradually adding larger advanced displays well version targeting audiophile users support playing music external streaming platforms pandora napster last.fm sirius also added devices general two operating modes either standalone device connects internet streaming service directly local computer running logitech media server network-attached storage device server software large parts firmware recent players released open source licenses 2006 slim devices acquired logitech 20 million usd logitech continued development player announced august 2012 would discontinued online service mysqueezebox.com needed use squeezebox without private server still maintained logitech given cross-platform nature server software client users ensured continued use platform utilizing raspberry pi dedicated squeezebox device client server first-generation hardware requires logitech media server formerly slimserver squeezecenter squeezebox server run free open source software wired-ethernet natively supports one audio format mp3 logitech media server transcode audio formats mp3 fly using lame mp3 encoder second generation hardware also called sb1 avoid confusing squeezebox product range sb1 originally used display slimp3 main feature additions included optional 802.11b wi-fi support uncompressed pcm/wav/aiff audio streams headphone coaxial optical s/pdif outputs successor models required server may slimserver ended rev 6.5.4 squeezecenter rev 7.x logitech media server slim devices offered bitmap display upgrade hardware longer available units 40×2 noritake character display others 280×16 pixel noritake bitmap display third generation hardware features included optional 802.11g wi-fi native support audio formats flac wma ogg upgraded 320×32 pixel greyscale bitmap vfd display visualizers bitmapped fonts model infrared remote control analog outputs volume control headphone jack coaxial optical digital outputs squeezebox2 supports numerous audio formats including mp3 windows media audio musepack monkey audio apple lossless flac shorten wav aiff ogg vorbis unencrypted aac mp3 windows media flac wav aiff ogg vorbis natively supported player firmware remainder automatically transcoded logitech media server host software one player-supported formats drm-crippled aac apple itunes music store supported squeezebox classic aka squeezebox3 aka sb3 aka squeezebox 3rd generation fourth generation hardware features technical specifications identical squeezebox2 new board chassis design used well new remote internal wi-fi antennas introduction duet squeezebox3 renamed squeezebox classic transition logitech production sb3 available slim devices logitech housing dimensions 7.6 w × 3.7 h × 3.1 192 mm × 93 mm × 80 mm including stand fifth generation hardware features similar squeezebox v3 geared towards audiophiles additional features squeezebox v3 include dual 320×32 pixel displays front panel buttons tactile feedback knob redesigned backlit remote control balanced xlr unbalanced audio outputs balanced unbalanced digital inputs outputs aes/ebu s/pdif inputs operation standalone dac rs-232 serial connection external control infrared input output new design consists sophisticated remote called squeezebox controller aka sbc display like sonos separate simplified network music player box called squeezebox receiver aka sbr connecting stereo sbr operate without sbc although supported logitech recommended advanced users sbc also operate audio player integrated speaker integrated headphone jack additional sbrs could bought separately differences squeezebox classic squeezebox duet include squeezebox controller first unit squeezebox line runs squeezeos embedded linux distribution devices less slim previous squeezeboxes squeezebox radio squeezebox touch also squeezeos based squeezebox controller largely rendered obsolete smartphone tablet pc apps squeezebox touch surpasses squeezebox receiver respects squeezebox duet discontinued early 2011 departure previous models boom combines squeezebox functionality dsp 30 w integrated amplifier bi-amped stereo two-way speakers produce self-contained device requires network connection either wired wireless power without network connection boom still amplify play line level signal external player 3.5mm mini-jack plug squeezebox boom discontinued early 2011 replacement model squeezebox radio adds color screen 2.4 all-in-one design older sibling squeezebox boom mono configuration squeezebox radio powered optional proprietary battery pack made available march 2010 running logitech media server two squeezebox radios synchronized set play one stereo channel thus working stereo device also using headphones one use one single squeezebox radio stereo device squeezebox touch functional successor sb3 couple new features simplified interface limited functionality visually similar squeezebox radio interface option switch squeezebox firmware discontinued 2014 | [
10945,
4675,
7108,
9163,
753,
5746,
1974,
5270,
1849,
4186,
10270
] | Validation |
5,292 | 2 | Dock_(macOS):dock macos dock prominent feature graphical user interface macos used launch applications switch running applications dock also prominent feature macos predecessor nextstep openstep operating systems earliest known implementations dock found operating systems risc os nextstep ios version dock iphone ipod touch ipad apple applied us patent design dock 1999 granted patent october 2008 nearly decade later application dragged dropped onto dock add dock application dragged dock remove except finder trash permanent fixtures leftmost rightmost items highest lowest items dock vertically oriented respectively part macos core services dock.app located /system/library/coreservices/ nextstep openstep dock application launcher holds icons frequently used programs icon workspace manager recycler always visible dock indicates program running showing ellipsis icon program running n't ellipsis icon macos running applications variously identified small black triangle mac os x 10.0-10.4 blue-tinted luminous dot mac os x 10.5-10.7 horizontal light bar os x 10.8 10.9 simple black white dot os x 10.10-present macos however dock used repository program file operating system hold number items resizes dynamically fit using magnification better view smaller items default appears bottom edge screen also instead placed left right edges screen user wishes applications normally keep icons dock still appear running remain quit features unlike dock next operating systems capacity dock dependent display resolution may attempt recover shelf functionality since macos inherits technology nextstep minimal shelf functionality implemented finder changes dock bring functionality also close apple newton os button bar found messagepad 2x00 series likes applications could dragged extras drawer finder-like app onto bar also screen put landscape mode user could choose position button bar right left side screen like dock macos macos dock also extended menus control applications without making visible screen applications simple options quit keep dock remove dock options though applications use menus purposes itunes uses menu way user control certain playback options applications include changing status online alias msn aim/ichat etc automatically saving changes made document current application feature made available macos docklings mac os x 10.4 earlier also opened using right-mouse button mouse one time either clicking holding control-click bring menu mac os x leopard docklings replaced stacks stacks stack files small organized folder dock opened left-clicking stacks could shown three ways fan grid list similar docklings grid view folders stack opened directly stack without need open finder ios dock used store applications since ios 4 folders containing applications unlike macos dock maximum 4 icons placed dock iphone ipod touch maximum ipad however 16 icons 13 apps 3 recently opened apps size dock ios changed application dock launched clicking jump software finished loading additionally application requires attention user jump even higher icon clicked user attends demands original version dock found mac os x public beta 10.0 presents flat white translucent interface aqua styled pinstripes dock found mac os x 10.1 tiger removes pinstripes otherwise identical mac os x leopard lion presents applications three-dimensional glassy surface perspective instead traditional flat one resembling sun microsystems project looking glass application dock os x mountain lion mavericks changes look resemble frosted glass rounded corners os x yosemite reverts two-dimensional appearance similar mac os x tiger although translucent blur effect iphone os 1 3 dock used metal look looks similar front mac pro ios 4 adopted dock design mac os x leopard lion used ios 7 uses similar dock mac os x tiger ios 7 styled blur effects ios 11 dock ipad redesigned resemble macos dock classic mac os dock-like application called launcher first introduced macintosh performa models 1993 later included part system 7.5.1 performs basic function also add-ons dragthing added dock users earlier versions microsoft implemented simplified dock feature windows 98 quick launch toolbar feature remained windows vista various docks also used linux bsd examples window maker emulates look feel nextstep gui docky avant window navigator kxdocker amongst others kde various gdesklet/adesklets docks afterstep wharf derivation nextstep ui itask ng module used enlightenment-based linux distributions gos blackbox slit bruce tognazzini usability consultant worked apple 1980s 1990s mac os x developed wrote article 2001 listing ten problems saw dock article updated 2004 removing two original criticisms adding new one one concerns dock uses much screen space another icons show labels pointer hovers similar-looking folders files windows difficult distinguish tognazzini also criticized fact icons dragged dock vanish easy way get back called behavior object annihilation john siracusa writing ars technica also pointed issues dock around releases mac os x public beta 2000 noted dock centered adding removing icons changes location icons review mac os x v10.0 following year also noted dock far many tasks optimum ease-of-use including launching apps switching apps opening files holding minimized windows siracusa criticized dock release mac os x v10.5 noting made less usable sake eye-candy siracusa criticized 3d look reflections faint blue indicator open applications less distinguishable files folders thom holwerda managing editor osnews stated concerns dock including facts grows directions holds trash icon persistent labels holwerda also criticized revised dock appearance mac os x v10.5 | [
9732,
4615,
5647,
1042,
6700,
4657,
1074,
8754,
576,
9802,
5713,
3670,
4184,
2141,
4702,
2149,
8303,
6771,
2676,
9343,
3719,
10888,
11402,
7307,
8852,
1686,
7318,
3228,
7325,
2207,
1699,
8877,
1710,
5294,
3766,
2232,
9912,
9406,
1729,
684... | None |
5,293 | 6 | Comparison_of_file_systems:comparison file systems following tables compare general technical information number file systems | [
5120,
6148,
2055,
6153,
10763,
6669,
3598,
10257,
9236,
6677,
5142,
8214,
9762,
5158,
4151,
3640,
11323,
8767,
576,
10303,
8772,
8774,
10828,
5709,
1623,
9308,
10851,
4708,
9835,
3692,
7789,
9836,
5231,
9840,
9333,
6263,
2168,
9335,
3708,
... | None |
5,294 | 2 | Shelf_(computing):shelf computing shelf interface feature nextstep openstep used repository store links commonly used files directories programs temporary holding place move/copy files directories around file system hierarchy macos items may dragged onto sidebar area finder behave placeholders manipulated manner dynamics shelf file system operations illustrated comparison metaphor used microsoft windows operating systems order move file following steps may taken next operating systems addition moving files dragging window window following method used note file dragged shelf moved anywhere changed way shelf icon merely placeholder file moving placeholder shelf actual action occurs next functionality builds upon concept allowing destination directory put shelf well file merely dragged destination directory icon process similar microsoft windows functionality copying cutting file system objects file files folder folders combination clipboard objects copied removed original location paste operation new location completed shelf concept though older powerful file system objects sources destinations persistent available long shelf windows cut copy paste metaphor objects locations persist one copy/move operation complete something else placed clipboard since shelf icons 'placeholders sorts icons put shelf representing commonly used directories commonly used programs put shelf well nextstep openstep file management application called fileviewer run workspace manager also allowed users different shelves associated particular directories users simply opened new browser rooted particular subdirectory browser window would show corresponding shelf allowing users many different shelves based whatever folder hierarchy happened using organize files | [
7307,
5292,
6797,
8505,
7806
] | Train |
5,295 | 7 | Alibaba_Cloud:alibaba cloud alibaba cloud also known aliyun chinese cloud computing company subsidiary alibaba group alibaba cloud provides cloud computing services online businesses alibaba e-commerce ecosystem alibaba cloud international operations registered headquartered singapore alibaba cloud offers cloud services services available pay-as-you-go basis include elastic compute data storage relational databases big-data processing anti-ddos protection content delivery networks cdn outside status largest cloud computing company china alibaba cloud operates 19 data center regions 56 availability zones around globe june 2017 alibaba cloud placed visionaries quadrant gartner magic quadrant cloud infrastructure service worldwide alibaba cloud 19 regional data centres globally including china north china south china east us west us east europe united kingdom middle east japan hong kong singapore australia malaysia india indonesia data center germany operated vodafone germany frankfurt certified c5 alibaba cloud provides cloud computing iaas paas saas including services e-commerce big data iot object storage oos kubernetes data customization managed alibaba web page using codice_1 command line tool 2017 alibaba cloud singapore university social sciences suss jointly launched university-accredited entrepreneurship program tertiary students | [
11392,
11530,
1935,
4388,
10020,
1705,
4011,
3376,
6458,
331,
4429,
7248,
8914,
467,
8921,
9181,
354,
4194,
2409,
8170,
3819,
10090
] | Test |
5,296 | 2 | Departmental_boot_image:departmental boot image departmental boot image boot image computer enhanced adding applications passwords specific task group department organization many advantages thin client strategy done operating system base long boot device large enough accommodate boot applications together typical departmental windows xp boot image usually large requires dvd store may large network booting accordingly usually installed fixed removable hard drive kept inside machine rather installed network rom boot image control complexity total cost operations advantages using departmental boot image instead common boot image entire organization thin client disadvantages include complexity creating managing several large boot images determining department needs upgrade applications user allowed discipline soon degrades shop easier manage one consists one-off computers quirks frequently requiring re-imaging whose issues really diagnosable comparable experts believe departmental boot image regime degrades rather quickly state without extraordinary discipline controls advocate thin clients ensure control however increasingly possible restrict users installing applications standard boot image automatically re-install variant boot image detected would draconian large organization one boot image often quite acceptable boot image maintained departmental level users request upgraded minimum bureaucracy waiting | [
5370,
11108,
7983
] | Validation |
5,297 | 3 | PowerPC_e6500:powerpc e6500 powerpc e6500 multithreaded 64-bit power isa-based microprocessor core freescale semiconductor part nxp e6500 power entire range qoriq amp series system chip soc processors share common naming scheme txxxx hard samples manufactured 28 nm process available early 2012 full production later 2012 revised memory subsystem compared previous e5500 core four cores combined cpu cluster sharing large l2 cache e6500 cores supports eight cpu clusters large multiprocessing implementations core first multithreaded core designed freescale reintroduces enhanced version altivec products multithreading allows two virtual cores per hard core organized 2x2-way superscalar one virtual core e6500 often perform better entire e5500 core since freescale essentially duplicated lot logic instead virtualizing addition enhancements core core five integer units four simple one complex two load-store units one 128-bit altivec unit 32+32 kb instruction data l1 caches speeds range 2.5 ghz core designed highly configurable via corenet fabric meet specific needs embedded applications features like multi-core operation interface auxiliary application processing units apu e6501 core revision introduced 2013 enhanced virtualization interrupt support | [
6914,
7299,
3844,
4868,
1158,
3846,
4743,
6663,
5642,
3467,
1548,
1933,
7302,
6415,
3472,
4881,
7305,
2073,
7065,
1563,
1309,
3493,
6949,
6311,
8102,
1321,
9391,
10543,
4017,
11314,
11447,
8120,
8761,
6715,
9020,
1725,
1983,
1985,
10945,
... | Test |
5,298 | 7 | The_Linkup:linkup linkup formerly mediamax spin-off streamload nirvanix social network file sharing service let users send receive store large amounts data via web one first internet based storage services winning numerous awards one largest failures resulting user data loss june 15 2007 system administrator script accidentally misidentified deleted good data along dead data 3.5 million former user accounts files took october 2007 complete partial restore data much irretrievably lost linkup finally experienced meltdown july 10 2008 left 20,000 paying subscribers without digital music video photo files august 8 2008 site place message saying 're sorry mediamax linkup closed affiliate link competitor box.net | [
7983
] | Test |
5,299 | 5 | Cn3D:cn3d cn3d windows macintosh unix-based software united states national library medicine acts helper application web browsers view three-dimensional structures national center biotechnology information entrez retrieval service simultaneously displays structure sequence alignment powerful annotation alignment editing features according official site cn3d public domain source code available | [
576,
5492,
6797
] | Test |
5,300 | 4 | Backup_and_Restore:backup restore backup restore formerly windows backup restore center component microsoft windows introduced windows vista included later versions allow users create backups restore backups created earlier replacement ntbackup included previous windows versions became deprecated feature windows 8 completely removed windows 8.1 favor file history however windows 10 re-incorporated operating system backup restore supports two different types backup file backup system image backup windows uses volume shadow copy service ensure files changed backed vss ensures file system-level consistency application-level consistency applications registered vss writers newer backup media cd dvd blu-ray discs supported backup restore windows backup service windows service responsible backup restore operation backup restore application however way interfacing service wbadmin command-line utility may also used entire disk individual files restored utility addition vhd file attached mounted separate disk regardless latest backup incremental full attached disk reflect state disk latest backup previous version feature exposing older backup sets image-based full-system backup option called complete pc backup windows vista system image windows 7 allows imaging entire system including operating system data volumes backed-up image later restored windows recovery environment either computer new computer different brand type file format used image-based backup vhd vhd image also mounted extracting individual files booted using windows 7 enterprise ultimate full-system image backup done beginning windows vista sp1 system images restored machine different motherboard may different disk controller machine must number disks volume shadow copy service also creates maintains periodic copies system user data local volume part system restore operation stores previous versions files incremental block-level changes automatically volume restored using system restore previous versions shell extension windows backup support tape drives also support backing restoring subfolder disk instead creates subfolders backup restore make system image disks ntfs file system system image saved usb flash drive must formatted ntfs file system version windows backup supplied windows server 2008 support hard disk drives large sector sizes 4096 bytes unless support 512 byte emulation features included backup restore may differ depending edition windows windows vista home premium business enterprise ultimate editions schedule automatic backups back files folders network location windows vista business enterprise ultimate editions support complete pc backup windows vista business edition support writing pc backup images dynamic drives e.g flash drives another notable limitation backup restore center windows vista allow users specify individual files folders backed skipped allows users choose file type categories based mime type application association file extension documents music videos etc limitation removed windows 7 windows vista complete pc backup could performed network location windows 7 allows performing full system image backup network location however subsequent incremental system image backups performed network image-based backups network must full backups full system image backups local removable storage incremental windows 7 file backup network share available windows 7 professional enterprise ultimate editions whereas included windows vista home premium manual image-based full system backup including incremental backup done local removable media windows 7 home premium full system backup network also requires windows 7 professional editions backup restore removed windows 8 windows server 2012 microsoft said program underused touting file history feature replace file-based backup access points removed except control panel applet called windows 7 file recovery windows 8.1 control panel applet removed functionality still available system image backup file history windows 8.1 system image backup function allow backing individual files folders libraries also users longer schedule backups gui although wbadmin tool still available used execute scheduled backups using task scheduler windows 10 backup restore control panel returned operating system known backup restore windows 7 part interface scheduling backups lost completely windows 8.1 made available non-system image file backups however program deprecated longer actively developed microsoft since windows 10 fall creators update | [
11270,
5643,
4624,
537,
540,
3102,
9762,
8227,
8740,
1577,
10281,
2101,
7739,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
9819,
3170,
622,
9839,
4210,
7796,
1656,
6265,
7290,
4731,
10879,
8841,
6797,
2193,
9... | Test |
5,301 | 9 | CircuitLogix:circuitlogix circuitlogix software electronic circuit simulator uses pspice simulate thousands electronic devices models circuits circuitlogix supports analog digital mixed-signal circuits spice simulation gives accurate real-world results graphic user interface allows students quickly easily draw modify combine analog digital circuit diagrams circuitlogix first launched 2005 popularity grown quickly since time 2012 reached milestone 250,000 licensed users became first electronics simulation product global installed base quarter-million customers 100 countries circuitlogix developed dr. colin simpson electronics professor george brown college toronto canada john bud skinner computer programmer electronics program awards including award excellence association canadian community colleges accc professional version circuitlogix circuitlogix pro includes 10,000 device models well 8 virtual instruments also includes 3dlab software product combines interactive 3-dimensional learning environment electronic devices tools enhance user comprehension electronics 3dlab virtual components include batteries switches motors lamps resistors inductors capacitors instruments including oscilloscopes signal generators frequency counters fast accurate simulation electronic circuits essential provides information needed perform accurate analysis circuit behavior spice simulators used verify analog mixed-signal circuits yield expected outputs schematic netlist file circuit input values fed spice software simulates circuit behavior specified length time circuitlogix allows observation voltage current levels circuit node change frequency time allows obtaining accurate results even simulating complex circuits hierarchical blocks reused circuitlogix simulation engine based berkeley spice contains gui make circuit design easier efficient circuitlogix 32-bit spice engine interactive allowing example frequency sources changed potentiometers adjusted switches thrown simulation spice engine fully integrated schematic capture waveform tools circuitlogix passes schematic edits simulator automatically running components fuses leds controlled switches automatically updated schematic simulation runs circuitlogix simulates analog digital mixed analog-digital circuits simulator first divides circuit analog digital portions analog circuitry simulated time-step driven spice engine digital parts simulated separately event-driven simulation engine circuitlogix digital engine developed directly .net faster spice macros simulator automatically performs signal conversion possible connect analog digital part system ’ model library contains hybrid parts analog-to-digital digital-to-analog conversion circuitlogix mixed-mode schematic editor includes analog event-driven simulation capabilities simulation may contain components analog event driven digital sampled-data combination entire mixed signal analysis driven one integrated schematic digital models circuitlogix provide accurate specification propagation time rise/fall time delays event-driven algorithm used circuitlogix general-purpose supports non-digital types data example elements use real integer values simulate dsp functions sampled data filters event-driven algorithm faster standard spice matrix simulation time greatly reduced circuits use event-driven models place analog models mixed-mode simulation handled three levels circuitlogix primitive digital elements use timing models built-in 12-state digital logic simulator b subcircuit models use actual transistor topology integrated circuit finally c in-line boolean logic expressions two modeling techniques use spice solve problem third method digital primitives uses mixed-mode capability component library includes | [
7819,
6797,
7983,
3573,
5881
] | None |
5,302 | 1 | KeyBase:keybase keybase database web application managing deploying interactive taxonomic keys plants animals developed royal botanic gardens victoria keybase provides medium pathway keys traditionally developed print classical types media used effectively internet environment platform uses concept called keys easily linked together joined keys merged larger seamless keys groups still available browsed independently keys keybase database filtered displayed variety ways filters formats examples keybase database | [] | Test |
5,303 | 8 | Web_Single_Sign-On_Metadata_Exchange_Protocol:web single sign-on metadata exchange protocol web single sign-on metadata exchange protocol web services federated identity specification published microsoft sun microsystems defines mechanisms service query identity provider metadata concerning protocol suites supports goal operation increase ability given service interoperate given identity provider | [
9665,
10020,
7878,
1097,
2013
] | None |
5,304 | 5 | Non-orthogonal_frequency-division_multiplexing:non-orthogonal frequency-division multiplexing non-orthogonal frequency-division multiplexing n-ofdm method encoding digital data multiple carrier frequencies non-orthogonal intervals frequency sub-carriers low-pass equivalent n-ofdm signal expressed formula_2 data symbols formula_3 number sub-carriers formula_4 n-ofdm symbol time sub-carrier spacing formula_5 formula_6 makes non-orthogonal symbol period section describes simple idealized n-ofdm system model suitable time-invariant awgn channel n-ofdm carrier signal sum number not-orthogonal subcarriers baseband data subcarrier independently modulated commonly using type quadrature amplitude modulation qam phase-shift keying psk composite baseband signal typically used modulate main rf carrier formula_7 serial stream binary digits inverse multiplexing first demultiplexed formula_8 parallel streams one mapped possibly complex symbol stream using modulation constellation qam psk etc. note constellations may different streams may carry higher bit-rate others digital signal processor dsp computed set symbols giving set complex time-domain samples samples quadrature-mixed passband standard way real imaginary components first converted analogue domain using digital-to-analogue converters dacs analogue signals used modulate cosine sine waves carrier frequency formula_9 respectively signals summed give transmission signal formula_10 receiver picks signal formula_11 quadrature-mixed baseband using cosine sine waves carrier frequency also creates signals centered formula_12 low-pass filters used reject baseband signals sampled digitised using analog-to-digital converters adcs forward fft used convert back frequency domain returns formula_8 parallel streams use appropriate symbol detector 1st method optimal processing n-ofdm signals fft proposed 1992 combination n-ofdm mimo technology similar ofdm fast-ofdm method proposed 2002 fbmc filter-bank multi-carrier modulation example fbmc consider wavelet n-ofdm n-ofdm become technique power line communications plc area research wavelet transform introduced replace dft method creating non-orthogonal frequencies due advantages wavelets offer particularly useful noisy power lines create sender signal wavelet n-ofdm uses synthesis bank consisting formula_14-band transmultiplexer followed transform function receiver side analysis bank used demodulate signal bank contains inverse transform followed another formula_14-band transmultiplexer.\ relationship transform functions n-ofdm spectrally efficient method sefdm methods similar n-ofdm gfdm generalized frequency division multiplexing | [
3040,
1121,
5664,
7490,
3140,
7108,
8160,
11686,
2920,
7400,
10381,
1550,
2994,
2968,
1977,
5020,
5304
] | None |
5,305 | 4 | Natalya_Kaspersky:natalya kaspersky natalya ivanovna kasperskaya born 5 february 1966 moscow soviet union -- west uses surname masculine form kaspersky —is russian entrepreneur president 'infowatch group companies co-founder former ceo antivirus security software company 'kaspersky lab addition one wealthiest women russia one influential figures russian industry natalya kasperskaya maiden name stutser born 5 february 1966 moscow family engineers soviet defense research institute employees natalya elected member school pioneer council later member district pioneer headquarters also komsomol member organizer alongside main education natalya also played basketball children youth sports school seriously intended become veterinarian giving dream difficulties studying chemistry eighth year education natalya moved ordinary secondary school physics-mathematical school run moscow aviation institute finishing school natalya took entrance exams lomonosov moscow state university enrolled missing half point however results good enough gain entry moscow institute electronics mathematics 1984 1989 natalya studied applied mathematics moscow institute electronics mathematics topic diploma mathematical model nuclear reactor cooling system later earned bachelor degree open university uk studies moscow institute met first husband eugene kaspersky married 1986 graduating institute natalya assigned central scientific construction bureau moscow worked half year research scientist going maternity leave natalya started career age 28 took job january 1994 salesperson computer accessories software firm 50-dollar monthly salary job based newly opened store kami information technologies center created former professor natalya ex-husband eugene kaspersky higher school kgb soviet epoch believes personal data search history geolocation contacts correspondence photo video materials belong state september 1994 natalya became head distribution department antiviral toolkit pro avp development eugene kaspersky team since 1991 two three years natalya successfully built distribution channels technical support network entered international markets sales growing rapidly initial 100–200 per month 1994 130,000 year 600,000 1996 1 million 1997 revenue divided team mother company 1997 future founders 'kaspersky lab decided start business natalya launched kaspersky lab foundation june 1997 key naming new company worked ceo 10 years shares 'kaspersky lab initially split eugene kaspersky 50 two teammate programmers alexey de-monderik vadim bogdanov 20 natalya kasperskaya 10 1997 kaspersky lab sales started double yearly turnover reaching around 7 million 2001 exceeding 67 million 2006 august 2007 natalya unseated suspended key management functions eugene kaspersky due couple divorce deepening ideological divide two eventually natalya agreed stay chairperson newly established board 'kaspersky lab finally breaking ties previously family driven business 2011 kaspersky lab buying natalya stake company 2007 2011 around 30 shares 2007 natalya supervision kaspersky lab turned leading antivirus corporation network regional offices worldwide moment power change 2007 annual sales revenue reached 126 million company estimated capitalization 1.3 billion yearly revenue 700 million 2011 natalya sold remaining stake departed change management company rate growth dropped visibly global revenue growing 40 2009 13.7 2011 3 2012 6 2013 'kaspersky lab bought antispam technology developed 'ashmanov partners head latter igor ashmanov gave buyer idea use antispam engine backwards protection data leaks 2001—2002 'kaspersky lab programmers developed solution later became known infowatch traffic monitor enterprise offers protection corporate users internal threats dlp system december 2013 subsidiary called 'infowatch established develop distribute new software natalya kasperskaya ceo majority owner 'infowatch since october 2007 stake company linked business separation deal ex-husband natalya made main investments 'infowatch 'kribrum 'nanosemantics co-owned igor ashmanov g data software ag german antivirus company 'infowatch software vague prospects time spin-off albatross around 'kaspersky lab neck unlike 'kaspersky lab technological solutions product line new company initially targeted large medium enterprises starting 300 workstations rather small businesses retailers required fundamentally different skill set approach natalya previous experience management turning particularly relevant nevertheless 2012 infowatch previously unprofitable recorded first earnings went growing annual rate 60—70 according 'forbes infowatch annual revenue reached around 12 million 2015 independent experts polled russian daily newspaper 'kommersant spring 2015 estimating business worth 40–50 million today infowatch group companies working two main business areas — corporate protection internal threats external targeted attacks — company holding almost 50 share russian confidential data protection market dlp systems among longstanding clients russian governmental organizations well 'sberbank 'beeline lukoil 'tatneft 'surgutneftegas 'sukhoi 'magnitogorsk iron steel works etc addition infowatch actively developing german middle east south-east asian markets current infowatch shareholders natalya kasperskaya company deputy ceo rustem khairetdinov according forbes natalya kasperskaya fortune around 220 million march 2013 – estimate increased 230 million 2014 270 million 2015 march 2015 russian news portal 'lenta.ru agreed forbes ’ 2014 estimation july 2015 german magazine 'der spiegel published estimation €207 million finally august year women magazine 'cosmopolitan published estimate 270 million according 'der spiegel majority natalya kasperskaya fortune form funds derived asset sales kaspersky october 2015 response question whether 'forbes calculations accurate emphasized company non-public thus need reveal level capitalization adding “ nevertheless good see people seem appreciate value 'infowatch ” natalya kasperskaya member board russian union industrialists entrepreneurs association software developers 'domestic software also member expert russian software council affiliated ministry telecom mass communications russia grant committee skolkovo foundation supervisory board skolkovo institute science technology skoltech furthermore natalya kasperskaya member russian mechanical engineering union association information protection business information security association bisa april 2008 march 2012 natalya member board addition 2009 2011 head working party information computer technologies federal target program ministry education science russia referred “ research inventions priority scientific technology development areas russia 2014—2020 ” natalya kasperskaya enjoyed participating social activities ever since school remembers singing children choir taking part school performances concerts even leading pioneer team agitators addition formed school placard newspaper wrote poetry also interested sports like basketball skiing swimming well phaleristics collecting stamps soviet coins student natalya fascinated moscow theatre life knew repertoires main youth theatres time mossovet theatre taganka theatre sovremennik etc. sometimes queued overnight buy tickets popular performances furthermore also passion guitar poetry often sang played guitar parties natalya interest trekking skiing travelling friends children reading professional literature came later considers good great written american business consultant jim collins favorite books saying influenced outlook addition also speaks english german fluently kasperskaya admits little interest cooking although cook family maternity leave similarly also particular interest fashion clothing brands waste much time shopping instead buying whatever clothes finds suit style addition natalya fan designer brands since knows clothes actually produced natalya perceives gadgets social networks somewhat negatively understands provide capabilities increased surveillance regularly use work sony xperia phone natalya typically allows pr team manage social network presence uses media rarely natalya met first husband eugene kaspersky health resort january 1987 twenty couple marrying six months later 1989 fifth year institute natalya gave birth first son maxim second son ivan following 1991 couple split 1997 divorced 1998 eugene instigation however due joint rapidly growing business divorce covered couple years order demotivate employees panic market natalya met second husband igor ashmanov 1996 cebit computer expo hannover working neighboring stands year later natalya igor renewed acquaintance started communicating one another regularly professional basis natalya kasperskaya remembers started dating two three years later divorce eugene couple deciding marry 2001 2005 igor natalya daughter alexandra followed second daughter maria 2009 third daughter varvara 2012 natalya sons first marriage studied lomonosov moscow state university maxim graduating faculty geography ivan faculty computational mathematics cybernetics april 2011 natalya 20-year-old son ivan kidnapped strogino district moscow way work perpetrators holding one villages sergievo-posadsky subregion moscow oblast suburb demanding ransom €3 million parents however five days later ivan freed thanks actions russian intelligence services five kidnappers including two repeat offenders sentenced prison terms ranging 4.5 11 years | [
7809,
2213,
10245,
9488,
3955,
2005,
4475,
6431
] | Test |
5,306 | 4 | The_Rootkit_Arsenal:rootkit arsenal rootkit arsenal escape evasion dark corners system book written bill blunden published jones bartlett publishers may 2009 book takes reader depth rootkit technology uses covers topics ia-32 assembly windows system architecture kernel debugging advanced rootkit development much concerning rootkit technology applied onto e.g white hat hacking book also provides many source code examples rootkit development properly use required recommended fair understanding computer programming operating systems order fully comprehend contents book back cover states advanced book topic book divided four parts 14 chapters goes detail specific technology information required advanced rootkit development use also provides information network file system analysises kernel objects drivers much related rootkit technology reader create fully working rootkit using source codes appendix product description states book sheds light material traditionally poorly documented partially documented intentionally undocumented book received mostly positive reviews websites specializing computer reviews computing reviews writes book book addresses controversial timely issue field network security rootkits notoriously used black hat hacking community rootkit allows attacker subvert compromised system subversion take place application level case early rootkits replaced set common administrative tools dangerous occurs kernel level rootkit hides network traffic processes files attacker decides keep invisible administrators system management tools… work defensive solutions—anti-virus malware detection tools—or interested low-level system programming must read book fact intended audience one best books 2009 richard austin ieee computer society technical committee security privacy also published review book second edition 2014 | [
5380,
6797,
7983,
477,
2430,
9791
] | Train |
5,307 | 7 | EMBRACE:embrace embrace european model bioinformatics research community education project year 2005 2010 objective drawing together wide group experts throughout europe involved use information technology biomolecular sciences embrace network worked integrate major databases software tools bioinformatics using existing methods emerging grid service technologies integration efforts driven set test problems representing key issues bioinformatics service providers end-user biologists result groups throughout europe able use embrace service interfaces local proprietary data tools embrace made many bioinformatics web services available international research community project run ebi hinxton england fred marcus eu project coordinator embrace project funded european commission within fp6 programme thematic area life sciences genomics biotechnology health contract number lhsg-ct-2004-512092 | [] | Test |
5,308 | 4 | Samuel_C._Phillips:samuel c. phillips general samuel cochran phillips february 19 1921 – january 31 1990 united states air force four-star general served director nasa apollo manned lunar landing program 1964 1969 seventh director national security agency 1972 1973 commander air force systems command 1973 1975 phillips born springerville arizona february 19 1921 attended public schools cheyenne wyoming graduating cheyenne high school 1938 earned bachelor science degree electrical engineering university wyoming 1942 master science degree electrical engineering university michigan 1950 member kappa sigma fraternity summer break 1940 earned private pilot license phillips commissioned second lieutenant infantry completion reserve officers training corps training graduation university wyoming entered active military service transferred army air corps attended flying school earned pilot wings world war ii phillips served combat pilot 364th fighter group eighth air force based england completed two combat tours duty european theater operations awarded distinguished flying cross oak leaf clusters air medal seven oak leaf clusters french croix de guerre war assigned european theater headquarters frankfurt germany july 1947 phillips transferred langley air force base virginia phillips research development assignments included six years engineering division wright-patterson air force base ohio duty electronics officer nuclear weapons experiments eniwetok atoll operation greenhouse project officer assignments b-52 stratofortress heavy bomber aim-4 falcon air-to-air missile bomarc surface-to-air missile programs phillips returned england 1956 served 7th air division strategic air command participation negotiating completing international agreement united kingdom deployment use american thor nuclear-armed intermediate-range ballistic missile irbm latter assignment earned phillips legion merit medal phillips returned united states 1959 assigned air force ballistic missile division air research development command los angeles california director minuteman intercontinental ballistic missile program icbm 1963 nasa associate administrator manned space flight george e. mueller admired phillips skill managing minuteman air force projects proposed bringing nasa detached military duty program controller manned space flight phillips air force superior agreed condition phillips hired instead director apollo manned lunar landing program december accomplished phillips assigned nasa time achieved rank major two-star general phillips aggressively took job constant daily meetings phone contact visits contractor sites kept road 75 per cent time described job new york times reporter john noble wilford way november 1965 phillips took team north american aviation downey california prime contractor command/service module also saturn v launch vehicle s-ii second stage investigate problems delays quality shortfalls cost overruns december 19 wrote memo naa president lee atwood copy report findings recommended fixes also sent mueller mueller also sent atwood follow-on letter strongly expressing disappointment csm s-ii problems requiring response end january 1966 follow-on visit phillips team march apollo 1 fire killed three astronauts ground test january 27 1967 first manned apollo mission congressional investigation uncovered existence came known phillips report nasa administrator james e. webb called congress testified unaware existence report ignited congressmen senators criticism nasa selection north american contractor however political support president lyndon b. johnson controversy blew next eighteen months apollo got back track toward manned missions goal first lunar landing 1970 small dinner party launch apollo 10 may 1969 dr. wernher von braun director marshall space flight center huntsville ala. praised general phillips one responsible pulling many pieces apollo program together making work time apollo 11 mission july 1969 achieved program manned landing goal phillips announced intention leave nasa return air force duty nasa service promoted lieutenant general september 1969 phillips placed command space missile systems organization samso air force systems command afsc los angeles august 1972 phillips appointed director national security agency dirnsa also chief central security service two years positions phillips assigned commander air force systems command august 1973 andrews air force base maryland retired air force 1975 general phillips fellow institute electrical electronics engineers member american institute aeronautics astronautics selected fellowship organization october 1969 notable valuable contributions sciences technology addition phillips fellow american astronautical society honorary member national business fraternity alpha kappa psi member board governors national space club member board directors united services automobile association president military benefit association phillips awarded air force distinguished service medal september 1969 service nasa july 1972 service commander samso phillips also awarded two nasa distinguished service medals agency 1968 1969 distinguished contributions apollo program phillips held honorary doctor laws degree university wyoming september 26 1971 phillips awarded smithsonian institution langley gold medal aviation space exploration contributions apollo program 1964 1969 14th recipient langley medal since award first presented wright brothers 1909 april 1971 gen. phillips elected member national academy engineering leadership direction minuteman missile program apollo program phillips received general thomas d. white u.s. air force space trophy september 11 1972 also flying tiger pilot trophy awarded american volunteer group july 7 1973 phillips married betty anne phillips three daughters phillips initiated scottish rite freemasonry till 33rd highest degree becoming past master four scottish rite bodies dallas active member supreme council office sovereign grand inspector general scottish rite masons texas.. phillips died cancer palos verdes california january 31 1990 aged 68 | [
6017,
8726,
1189,
9517,
1838,
1986,
6343,
6344,
11335,
7119,
7759,
7887,
3154,
8276,
7893,
991,
7137,
3305,
7145,
2419,
6005,
6136,
766
] | Test |
5,309 | 3 | Goldmont:goldmont goldmont microarchitecture low-power atom celeron pentium branded processors used systems chip socs made intel apollo lake platform 14 nm goldmont core unveiled intel developer forum idf shenzhen china april 2016 goldmont architecture borrows heavily skylake core processors offers 30 percent performance boost compared previous braswell platform used implement power-efficient low-end devices including cloudbooks 2-in-1 netbooks small pcs ip cameras in-car entertainment systems goldmont 2nd generation out-of-order low-power atom microarchitecture designed entry level desktop notebook computers goldmont built 14 nm manufacturing process supports four cores consumer devices includes intel gen9 graphics architecture introduced skylake goldmont microarchitecture builds success silvermont microarchitecture provides following enhancements similar previous silvermont generation design flaws found processor circutry resulting cease operation processors actively used several years errata named apl46 system may experience inability boot may cease operation added documentation june 2017 stating low pin count real time clock sd card gpio interfaces may stop functioning mitigations found limit impact systems firmware update lpc bus called lpc_clkrun reduces utilization lpc interface turn decreases eliminates lpc bus degradation systems however compatible new firmware recommended use sd card boot device remove card system use possible solution using uhs-i cards operating 1.8v congatec also states issues impact usb buses emmc although mentioned intel public documentation usb maximum 12 active time 60tb transmit traffic life expectancy lifetime port emmc maximum 33 active time set d3 device low power state operating system use newer designs atom c3000 denverton seem affected list desktop processors follows list mobile processors follows list embedded processors follows also atom a3900 series exclusively automotive customers aec-q100 qualification willow trail platform canceled apollo lake offered instead | [
3459,
5380,
3973,
8325,
9095,
5386,
9611,
4108,
9741,
398,
6926,
5649,
7313,
5523,
6804,
8851,
4886,
9111,
3352,
5883,
6815,
2088,
10669,
9391,
10675,
4276,
1461,
10548,
2237,
8125,
8126,
6339,
5444,
9541,
1998,
2638,
977,
5073,
5844,
879... | Test |
5,310 | 4 | Solomon_Kullback:solomon kullback solomon kullback april 3 1907august 5 1994 american cryptanalyst mathematician one first three employees hired william f. friedman us army signal intelligence service sis 1930s along frank rowlett abraham sinkov went long distinguished career sis eventual successor national security agency nsa kullback chief scientist nsa retirement 1962 whereupon took position george washington university kullback–leibler divergence named kullback richard leibler kullback born jewish parents brooklyn new york attended boys high school went city college new york graduating ba 1927 math 1929 completed doctorate math george washington university 1934 intention teach returned boy high school found taste discovered real interest using mathematics teaching suggestion abraham sinkov showed civil service flyer junior mathematicians us 2,000 per year took examination passed assigned washington junior cryptanalysts upon arrival washington kullback assigned william f. friedman friedman begun intensive program training cryptology new civilian employees several summers running sis cryptanalysts attended training camps fort meade received commissions reserve officers army kullback sinkov took friedman admonitions education seriously spent next several years attending night classes received doctorates mathematics afterward kullback rediscovered love teaching began offering evening classes mathematics george washington university 1939 completed training three put work actually hired compilations cipher code material u.s. army another task test commercial cipher devices vendors wished sell u.s. government kullback worked partnership frank rowlett red cipher machine messages almost overnight unravelled keying system machine pattern – nothing intercepted messages hand using talents linguist john hurt translate text sis started issuing current intelligence military decision-makers may 1942 five months pearl harbor kullback major sent britain learned bletchley park british producing intelligence high quality exploiting enigma machine also cooperated british solution conventional german codebook-based systems shortly return states kullback moved japanese section chief national security agency nsa formed 1952 rowlett became chief cryptanalysis primary problem facing research development post-war period development high-speed processing equipment kullback supervised staff 60 including innovative thinkers automated data processing development leo rosen sam snyder staff pioneered new forms input memory magnetic tape drum memory compilers make machines truly multi-purpose kullback gave priority using computers generate communications security comsec materials kullback book information theory statistics published john wiley sons 1959 book republished additions corrections dover publications 1968 solomon kullback retired nsa 1962 focused teaching george washington university publishing new papers 1963 elected fellow american statistical association reached rank colonel inducted military intelligence hall fame kullback remembered colleagues nsa straightforward one described totally guileless always knew stood one former nsa senior recalled man unlimited energy enthusiasm man whose judgment usually sound right | [
11397,
4007,
6572,
173,
7887,
6578,
1941,
1783
] | Test |
5,311 | 9 | John_Resig:john resig john resig american software engineer entrepreneur best known creator lead developer jquery javascript library resig graduated undergraduate degree computer science rochester institute technology 2005 time worked ankur teredesai data mining instant messaging networks jon schull exploring new ways encouraging real-time online collaboration currently works application developer khan academy previously javascript tool developer mozilla corporation work jquery inducted rochester institute technology innovation hall fame april 30 2010 resig started contributed many javascript libraries including resig frequent guest speaker companies like google yahoo presented many conferences related web technology including sxsw webstock mix tech4africa resig author widely read blog author book pro javascript techniques published apress 2006 secrets javascript ninja bear bibeault published manning publications december 2012 several papers | [
1409,
259,
8068,
3462,
6791,
1802,
6154,
10507,
8854,
4378,
8605,
7455,
8735,
1698,
803,
3761,
1203,
11060,
438,
4920,
1470,
7871,
2880,
9152,
4171,
11087,
339,
84,
4056,
9560,
9561,
603,
8289,
482,
5219,
7396,
487,
5483,
9195,
5101,
10... | Test |
5,312 | 3 | BIOS_interrupt_call:bios interrupt call bios interrupt calls facility operating systems application programs use invoke facilities basic input/output system ibm pc compatible computers traditionally bios calls mainly used dos programs software boot loaders including mostly historically relatively simple application software boots directly runs without operating system—especially game software bios runs real address mode real mode x86 cpu programs call bios either must also run real mode must switch protected mode real mode calling bios switch back reason modern operating systems use cpu protected mode generally use bios support system functions although use bios probe initialize hardware resources early stages booting computers software instructions control physical hardware screen disk keyboard etc moment power switched pc bios pre-loaded rom main board takes control immediately processor reset including power-up hardware reset button pressed bios initializes hardware finds loads runs boot program usually necessarily os loader provides basic hardware control operating system running machine usually operating system may directly booting single software application ibm part provided information needed use bios fully directly utilize hardware avoid bios completely programming early ibm pc models prior ps/2 beginning programmers choice using bios per-hardware-peripheral basis today bios new pc still supports bios interrupt function calls defined ibm ibm introduced 1984 along many newer ones plus extensions originals e.g expanded parameter ranges combined similar degree hardware compatibility means programs written ibm still run correctly new pc today assuming faster speed execution acceptable typically games use cpu-based timing despite considerable limitations services accessed bios interrupts proven extremely useful durable technological change bios interrupt calls perform hardware control i/o functions requested program return system information program key element purpose bios calls abstraction bios calls perform generally defined functions specific details functions executed particular hardware system encapsulated bios hidden program example program wants read hard disk need know whether hard disk ata scsi sata drive earlier days esdi drive mfm rll drive perhaps seagate st-506 controller perhaps one several western digital controller types different proprietary controller another brand program needs identify number drive wishes access address sector needs read write bios take care translating general request specific sequence elementary operations required complete task particular disk controller hardware connected drive program freed needing know control low level every type hard disk display adapter port interface real-time clock peripheral may need access makes programming operating systems applications easier makes programs smaller reducing duplication program code functionality included bios need included every program needs relatively short calls bios included instead operating systems bios used service calls provided operating system generally fulfill function purpose bios also frees computer hardware designers extent programs written use bios exclusively constrained maintain exact hardware compatibility old systems designing new systems order maintain compatibility existing software example keyboard hardware ibm pcjr works differently keyboard hardware earlier ibm pc models programs use keyboard bios difference nearly invisible good example side issue significant share pc programs use time pcjr introduced use keyboard bios exclusively ibm also included hardware features pcjr emulate way original ibm pc ibm pc xt keyboard hardware works hardware emulation exact programs try use keyboard hardware directly work correctly pcjr programs use bios keyboard services addition giving access hardware facilities bios provides added facilities implemented bios software example bios maintains separate cursor positions eight text display pages provides tty-like output automatic line wrap interpretation basic control characters carriage return line feed whereas cga-compatible text display hardware one global cursor automatically advance cursor interpret control characters operating systems software communicates bios software order control installed hardware via software interrupts software interrupt specific variety general concept interrupt interrupt mechanism cpu directed stop executing main-line program immediately execute special program called interrupt service routine isr instead isr finishes cpu continues main program x86 cpus isr call interrupt occurs found looking table addresses called interrupt vectors memory interrupt invoked type number 0 255 type number used index table address found table address isr run response interrupt software interrupt simply interrupt triggered software command therefore software interrupts function like subroutines main difference program makes software interrupt call need know address isr interrupt number advantages modularity compatibility flexibility system configuration bios interrupt calls thought mechanism passing messages bios operating system bios client software messages request data action bios return requested data status information and/or product requested action caller messages broken categories interrupt number categories contain sub-categories called functions identified function numbers bios client passes information bios cpu registers receives information back way data large fit registers tables control parameters disk sector data disk transfers passed allocating buffer i.e space memory passing address buffer registers sometimes multiple addresses data items memory may passed data structure memory address structure passed bios registers interrupt number specified parameter software interrupt instruction intel assembly language int instruction function number specified ah register caller sets ah register number desired function general bios services corresponding interrupt number operate independently functions within one interrupt service handled bios program independent last point relevant reentrancy bios software usually returns caller error code successful status code and/or requested data successful data small one bit large 65,536 bytes whole raw disk sectors maximum fit one real-mode memory segment bios expanded enhanced years many times many different corporate entities unfortunately result evolution bios functions called use consistent conventions formatting communicating data reporting results bios functions report detailed status information others may even report success failure return silently leaving caller assume success test outcome way sometimes also difficult determine whether certain bios function call supported bios certain computer limits call parameters computer bios interrupt calls use cpu register-based parameter passing calls oriented made assembly language directly made high-level languages hlls however high level language may provide library wrapper routines translate parameters form usually stack-based used high-level language register-based form required bios back hll calling convention bios returns variants c bios calls made using inline assembly language within c module support inline assembly language part ansi c standard language extension therefore c modules use inline assembly language less portable pure ansi standard c modules invoking interrupt done using int x86 assembly language instruction example print character screen using bios interrupt 0x10 following x86 assembly language instructions could executed list common bios interrupt classes found note bioses particularly old ones implement interrupt classes bios also uses interrupts relay hardware event interrupts programs choose receive route messages use table includes bios interrupts intended called programs using int assembly-language software interrupt instruction request services information traditionally jumped implementation cassette basic provided microsoft stored option roms call would typically invoked bios unable identify bootable disk volumes startup time original ibm pc ibm machine type 5150 released 1981 basic rom key feature contemporary popular personal computers commodore 64 apple ii line also microsoft cassette basic rom though commodore renamed licensed version commodore basic substantial portion intended market ibm pc needed basic compete systems ibm pc rom basic served primitive diskless operating system allowing user load save run programs well write refine original ibm pc also pc model ibm like aforementioned two competitors included cassette interface hardware base model ibm pc 16 kib ram disk drives kind cassette interface basic rom essential make base model usable five 8 kib rom chips original ibm pc totaling 40 kib four contain basic one contains bios rom basic accounts half total system memory 4/7ths precise time went basic longer shipped pcs interrupt would simply display error message indicating bootable volume found famously rom basic explanatory messages later bios versions bios versions would prompt user insert bootable volume press key user pressed key would loop back bootstrap loader int 19h try booting digital rainbow 100b used call bios incompatible ibm bios turbo pascal turbo c turbo c++ repurposed int 18 memory allocation paging programs also reused vector purposes dos systems io.sys ibmbio.com hooks int 13 floppy disc change detection tracking formatting calls correcting dma boundary errors working around problems ibm rom bios 01/10/84 model code 0xfc first call many modern operating systems linux newer versions windows bypass built-in bios interrupt communication system altogether preferring use software control attached hardware directly original reason primarily operating systems run processor protected mode whereas calling bios requires switching real mode back switching real mode slow however also serious security reasons switch real mode bios code limitations functionality speed motivate operating system designers find replacement fact speed limitations bios made common even dos era programs circumvent order avoid performance limitations especially video graphics display fast serial communication problems bios functionality include limitations range functions defined inconsistency subsets functions supported different computers variations quality bioses i.e bioses complete reliable others abridged buggy taking matters hands avoiding reliance bios operating system developers eliminate risks complications face writing supporting system software hand developers become responsible providing bare-metal driver software every different system peripheral device intend operating system work inducing hardware producers provide drivers thus apparent compact operating systems developed small budgets would tend use bios heavily large operating systems built huge groups software engineers large budgets would often opt write drivers instead using bios—that even without considering compatibility problems bios protected mode | [
389,
5000,
8590,
7188,
8345,
7983,
8625,
823,
7099,
7501,
5457,
11601,
10839,
5080,
4441,
477,
2019,
6118,
1515,
8301,
6129,
9330,
499,
11634,
3445,
2811,
1535
] | None |
5,313 | 4 | Back_in_Time_(Linux_software):back time linux software back time backup application linux versions integrate favorably gnome kde sc 4 available directly repositories many linux distributions released terms gnu general public license gpl free software back time uses rsync backend characteristic feature using hard links files identical snapshots different times thus using disk space files remained unchanged possible use several backup profiles e.g backups different hard disks also create schedules symbolic links backed absolute relative ones hard links treated due used backup method back time also supports encryption backups backup ssh advantages hard link method easy look snapshots system different times also easy remove old snapshots compared incremental backup methods save difference information consecutive backup times however drawback back time allow compression requires file systems support hard links backup location graphical interface written qt | [
9025,
6280,
5482,
8554,
1358,
7983,
5969,
1844,
823
] | Test |
5,314 | 9 | Railo:railo railo server commonly referred railo open source software implements general-purpose cfml server-side scripting language often used create dynamic websites web applications intranet systems cfml dynamic language supporting multiple programming paradigms runs java virtual machine jvm railo created swiss company railo technologies gmbh intended high performance alternative adobe coldfusion 2008 railo switched open source community-driven model became jboss project railo open source project led railo technologies development work funded consulting support contracts anyone may contribute code consideration railo named alien dog star trek enterprise dog actually named rhylo written phonetically german railo thus railo pronounced either rhy-lo rai-lo acceptable railo major releases codename notable loyal dogs history railo began 2002 student project compile cfml code php choice made due ubiquity php however found give desired performance stability decision made switch java platform instead project successful enough decided continue develop full product several alpha beta releases made official 1.0 release april 2006 railo continued developed relatively unknown many cfml developers june 2008 scotch rocks conference edinburgh railo technologies used day 2 keynote announce partnership jboss switch open source may 2012 cf objective conference foundation railo company ltd announced private limited company comprising swiss company railo technologies gmbh conjunction five companies operated cfml industry 29 january 2015 lucee project fork railo 4.2 codebase announced original developer railo stated would working railo developers confirmed also focusing solely lucee although official statement made railo company community consensus development railo project unlikely 19 july 2016 railo company dissolved railo runs jvm servlet work servlet container e.g apache tomcat eclipse jetty application server e.g jboss glassfish possible connect web server e.g apache iis nginx cherokee front using connectors mod jk mod proxy equivalent required railo railo installer linux macos windows bundles apache tomcat also pre-configured railo express download using jetty v4.0 onwards railo command line version enabling cfml used general-purpose language outside servlet environment railo since v3.1 licensed lgpl v2.1 source code available github primary aim railo provide functionality coldfusion using less resources giving better performance railo technologies team continue treat slowness bug core development philosophy many performance tests shown railo perform faster cfml engines addition railo attempts resolve many inconsistencies found traditional cfml either forced changes behaviour configurable options railo administrator railo technologies team always open feedback active cfml community events keen remind people railo community project railo technologies also creates strong technology partnerships cfml software companies including blue river interactive group developers mura cms contens software gmbh developers contens cms intergral gmbh developers fusionreactor fusiondebug help ensure software works well railo addition railo technologies offer formal partner programs solutions development hosting training railo application server currently averages 7,000 downloads growing per month railo used number companies notably including cfml built-in functionality preventing code injection via codice_10 tag functions codice_11 codice_12 codice_13 also third-party cfml implementations owasp enterprise security api antisamy project one key architecture decisions railo follow jee servlet model support multiple independent web contexts single server key security factor prevents unrelated applications interfering may happen shared coldfusion server single web context railo implements cfml language see cfml syntax section examples well cfscript cfml tag-based syntax visually different languages though aside similar dynamic languages following exceptions whilst railo implements cfml generally compatible adobe coldfusion acf original cfml engine notable differences two | [
2304,
2946,
3469,
9618,
148,
4507,
4512,
6819,
8739,
3237,
10020,
5677,
7983,
4529,
9780,
7862,
1591,
3895,
823,
5048,
9144,
1468,
9666,
8644,
6860,
9293,
1363,
11221,
4439,
3545,
11097,
479,
225,
865,
102,
7274,
5872,
10994,
5492,
9467
] | None |
5,315 | 0 | Kaldi_(software):kaldi software kaldi speech recognition toolkit freely available apache license kaldi aims provide software flexible extensible supports linear transforms mmi boosted mmi mce discriminative training feature-space discriminative training deep neural networks kaldi incorporated part chime speech separation recognition challenge several successive events software initially developed part 2009 workshop johns hopkins university | [
1890,
6797,
7983,
5492,
11221,
823,
10557,
9151
] | Test |
5,316 | 9 | Visual_IRC:visual irc visual irc virc open-source internet relay chat client windows operating system unlike many irc clients nearly functionality virc driven included irc script result program behavior extended changed without altering source code much source code birc virc 2 related utilities released gpl project web site sourceforge versus scripting language originally developed irc client bisual irc currently used visual irc similar many ways scripting languages used ircii mirc well tcl c. name versus chosen could shortened vs common abbreviation vircscript language used visual irc '96 '98 versus remained mostly backward compatible vircscript existing documentation commentary mentioned vs remained mostly accurate applied versus name also alluded birc origins replacement virc object versus ovs refers object-oriented features versus scripts define classes work objects methods instead textual data aliases however practice ovs mostly used manipulate vcl objects make virc interface scripts stored files usually .vsc file extension though .lib extension sometimes used versus script file simply contains statements interpreted script loaded blocks defined script see replace blocks defined name previous scripts aliases methods including constructors destructors events menu items toolbar items referred routines code blocks hello world code example example count ten example make everyone current channel operator | [
5760,
5251,
6797,
5397,
7983,
692,
7861,
9780,
7612,
5199,
2387,
3030,
7894,
7384,
1501,
2409,
5612,
2804,
2556,
2045
] | Train |
5,317 | 9 | Mary_Kenneth_Keller:mary kenneth keller mary kenneth keller b.v.m december 17 1913 – january 10 1985 american roman catholic religious sister educator pioneer computer science irving c. tang first two people earn doctorate computer science united states keller born cleveland ohio december 17 1913 john adam keller catherine josephine née sullivan keller entered sisters charity blessed virgin mary 1932 took vows religious congregation 1940 completed b.s bachelor science mathematics 1943 m.s master science mathematics physics 1953 depaul university chicago keller earned ph.d. university wisconsin–madison 1965 dissertation inductive inference computer generated patterns focused constructing algorithms performed analytic differentiation algebraic expression written cdc fortran 63 throughout keller graduate studies affiliated various institutions including university michigan purdue dartmouth 1958 keller began working national science foundation workshop computer science center dartmouth college male-only institution time participated implementation basic programming language john g. kemeny thomas e. kurtz keller believed potential computers increase access information promote education finishing doctorate 1965 keller founded computer science department clarke college clarke university catholic women college founded sisters charity blessed virgin mary dubuque iowa year national science foundation awarded grant 25,000 payable two years instructional equipment undergraduate education one first computer science departments small college keller directed department twenty years clarke college keller computer center information services named provides computing telecommunication support clarke college students faculty members staff college also established mary kenneth keller computer science scholarship honor keller advocate involvement women computing use computers education helped establish association small computer users education ascue went write four books field acm/sigucc user services conference 1975 keller declared fully used computer greatest interdisciplinary tool invented date keller died january 10 1985 age 71 | [
11328,
9644
] | None |
5,318 | 3 | Pilot_1000:pilot 1000 pilot 1000 pilot 5000 first generations pdas produced palm computing subsidiary u.s. robotics introduced march 1996 pilot uses motorola 68328 processor 16 mhz 128 kb pilot 1000 512 kb pilot 5000 built random-access memory pda plastic case various colors dimensions 120x80x18 mm weight 160 grams pilot 160x160 pixel monochrome lcd tactile panel graffiti input zone presented bottom third screen underneath screen sits green on/off button four applications buttons date book address book list memo pad two scroll buttons left contrast control right top stylus slot back device memory slot door reset button battery compartment held two aaa batteries serial port use palmpilot cradle memory kept memory slot plastic cover back top pda 512 kb rom chip stores palm os 1.0 resident applications ram available 128 kb 512 kb 1 mb palmpilot professional memory card 2 mb ram hardware limit 12 mb ram 4 mb rom calibration test presented initial power pilot would boot ready use synchronization connecting synchronizing pda initially done utility called pilot desktop pc pilot desktop distributed either 3½ inch disk cd-rom according original floppy disk set v1.0 windows 95 included tutorial disk two win32s disks windows 3.1 v2.0 windows 95 windows nt version pilot desktop renamed palm desktop exists use mac platform open source support exists use linux distributions one preferred development platforms palm os well palm inc. sued pilot pen company using name pilot palm later involved legal battle xerox filed suit david goldberg unistroke patent | [
2308,
10500,
6790,
8976,
3606,
8982,
6178,
5164,
7983,
9013,
694,
823,
6984,
3017,
8136,
11337,
9037,
2383,
2258,
2259,
1621,
4832,
4449,
2285,
1776,
2420,
8952,
2811,
9598
] | None |
5,319 | 8 | Wolfram_Alpha:wolfram alpha wolfram|alpha also styled wolframalpha wolfram alpha computational knowledge engine answer engine developed wolfram alpha llc subsidiary wolfram research online service answers factual queries directly computing answer externally sourced curated data rather providing list documents web pages might contain answer search engine might wolfram|alpha released may 18 2009 based wolfram earlier flagship product wolfram mathematica computational platform toolkit encompasses computer algebra symbolic numerical computation visualization statistics capabilities additional data gathered academic commercial websites cia world factbook united states geological survey cornell university library publication called birds chambers biographical dictionary dow jones catalogue life crunchbase best buy faa optionally user facebook account users submit queries computation requests via text field wolfram|alpha computes answers relevant visualizations knowledge base curated structured data come sites books site use portfolio automated manual methods including statistics visualization source cross-checking expert review curated data makes alpha different semantic search engines index large number answers try match question one wolfram|alpha provide robust query results based computational facts queries social sciences cultural studies even many questions history responses require subtlety complexity able respond particularly-phrased natural language fact-based questions mary robinson born complex questions old queen elizabeth ii 1974 displays input interpretation question using standardized phrases age queen elizabeth ii royalty 1974 answer age start 1974 47 years biography link wolfram|alpha answer queries require narrative response difference julian gregorian calendars answer factual computational questions june 1 julian calendar mathematical symbolism parsed engine typically responds numerical results example lim x- 0 sin x /x yields correct limiting value 1 well plot 235 terms taylor series registered users possible derivation using l'hôpital rule also able perform calculations data using one source example fifty-second smallest country gdp per capita yields nicaragua 1160 per year wolfram|alpha written 15 million lines wolfram language code runs 10,000 cpus database currently includes hundreds datasets current historical weather datasets accumulated several years curated distinct auto-generated datasets checked quality either scientist expert relevant field someone acting clerical capacity simply verifies datasets acceptable one example live dataset wolfram|alpha use profile facebook user inputting facebook report query user authorizes facebook share account details wolfram site alpha generate personal analytics report containing age distribution friends frequency words used status updates detailed information within two weeks launching facebook analytics service september 2012 400,000 users used downloadable query results behind pay wall summaries accessible free accounts wolfram|alpha short answers api wolfram|alpha simple api wolfram|alpha spoken results api wolfram|alpha full results api wolfram|alpha conversational api wolfram|alpha fast query recognizer api wolfram|alpha summary box api wolfram|alpha instant calculators api wolfram|alpha show steps api wolfram|alpha used power searches microsoft bing duckduckgo search engines first release july 21 2017 brave web browser features wolfram|alpha one default search engines factual question answering also queried apple siri amazon alexa samsung voice dexetra iris voice control software blackberry 10 launch preparations began may 15 2009 7 pm cdt broadcast live justin.tv plan publicly launch service hours later expected issues due extreme load service officially launched may 18 2009 wolfram|alpha received mixed reviews wolfram|alpha advocates point potential even stating determines results important current usefulness december 3 2009 iphone app introduced users considered initial 50 price ios app unnecessarily high since features could freely accessed using web browser instead also complained simultaneous removal mobile formatting option site wolfram responded lowering price 2 offering refund existing customers re-instating mobile site october 6 2010 android version app released available kindle fire nook nook version available outside u.s. 71 apps available use wolfram|alpha engine specialized tasks june 18 2018 japanese version wolfram|alpha released february 8 2012 wolfram|alpha pro released offering users additional features monthly subscription fee key feature ability upload automatic analysis many common file types data including raw tabular data images audio xml dozens specialized scientific medical mathematical formats features include extended keyboard interactivity cdf data downloads in-depth step-by-step solution ability customize save graphical tabular results extra computation time changes free version site time wolfram|alpha pro launched wolfram alpha enterprise business-focused analytics tool released 2016 program combines data supplied corporation algorithms wolfram|alpha answer questions related corporation infoworld published article warning readers potential implications giving automated website proprietary rights data generates free software advocate richard stallman also opposes idea recognizing site copyright holder suspects wolfram would able make case existing copyright law | [
4995,
9732,
6408,
10506,
4624,
11538,
8085,
7069,
1443,
11555,
6827,
5830,
7885,
10452,
735,
8421,
8046,
3567,
3698
] | Test |
5,320 | 1 | SQL_Server_Integration_Services:sql server integration services sql server integration services ssis component microsoft sql server database software used perform broad range data migration tasks ssis platform data integration workflow applications features data warehousing tool used data extraction transformation loading etl tool may also used automate maintenance sql server databases updates multidimensional cube data first released microsoft sql server 2005 ssis replaced data transformation services feature sql server since version 7.0 unlike dts included versions ssis available standard business intelligence enterprise editions microsoft visual studio dev essentials possible learn use ssis visual studio 2017 free development learning purposes ssis import/export wizard lets user create packages move data single data source destination transformations wizard quickly move data variety source types variety destination types including text files sql server instances developers tasked creating maintaining ssis packages use visual development tool based microsoft visual studio called sql server business intelligence development studio bids allows users edit ssis packages using drag-and-drop user interface scripting environment write programming code also available tool package holds variety elements define workflow upon package execution tool provides color-coded real-time monitoring note recent versions ms sql server bids replaced sql server data tools business intelligence ssdt-bi package may saved file store hierarchical namespace within sql server instance either case package content persisted xml completed designer also allows user start package execution started package may readily debugged monitored ssis provides following built-in transformations conditional split transformation used conditionally route rows transformation objects based particular condition similar codice_1 construct c language aside import/export wizard designer product includes notable tools dtexec executes package command line wherever may stored running package tool may instructed apply configuration information allow package reused slightly different parameters including different connection strings endpoints dtutil provides ability manage packages command prompt tool copy move package file server store back among sundry functions used delete rename encrypt decrypt packages users may write code define connection objects log providers transforms tasks ssis features programmable object model allows developers write hosts package execution host respond events start stop packages object model also allows developers create store load packages well create destroy modify contained objects within limits ssis packages load call cli assembly dlls providing access virtually kind operation permissible .net clr ssis used sql server 2005 2008 2008 r2 2012 2014 2016 editions except express workgroup | [
2691,
6797,
10900,
10902,
11030,
3224,
5401,
7064,
11414,
5151,
5794,
8227,
11559,
4010,
1964,
10157,
7983,
11570,
11571,
6709,
315,
847,
83,
2901,
1366,
7767,
479,
608,
2401,
3303,
9205,
2943
] | None |
5,321 | 5 | Wavelength-division_multiplexing:wavelength-division multiplexing fiber-optic communications wavelength-division multiplexing wdm technology multiplexes number optical carrier signals onto single optical fiber using different wavelengths i.e. colors laser light technique enables bidirectional communications one strand fiber well multiplication capacity term wdm commonly applied optical carrier typically described wavelength whereas frequency-division multiplexing typically applies radio carrier often described frequency purely conventional wavelength frequency communicate information specifically frequency hertz cycles per second multiplied wavelength physical length one cycle equals velocity carrier wave vacuum velocity light usually denoted lower case letter c. glass fiber substantially slower usually 0.7 times c. data rate ideally might carrier frequency practical systems always fraction carrier frequency wdm system uses multiplexer transmitter join several signals together demultiplexer receiver split apart right type fiber possible device simultaneously function optical add-drop multiplexer optical filtering devices used conventionally etalons stable solid-state single-frequency fabry–pérot interferometers form thin-film-coated optical glass three different wdm types whereof one called wdm notation xwdm normally used discussing technology concept first published 1978 1980 wdm systems realized laboratory first wdm systems combined two signals modern systems handle 160 signals thus expand basic 100 gbit/s system single fiber pair 16 tbit/s system 320 channels also present 12.5 ghz channel spacing see wdm systems popular telecommunications companies allow expand capacity network without laying fiber using wdm optical amplifiers accommodate several generations technology development optical infrastructure without overhaul backbone network capacity given link expanded simply upgrading multiplexers demultiplexers end often done use optical-to-electrical-to-optical o/e/o translation edge transport network thus permitting interoperation existing equipment optical interfaces wdm systems operate single-mode fiber optical cables core diameter 9 µm certain forms wdm also used multi-mode fiber cables also known premises cables core diameters 50 62.5 µm early wdm systems expensive complicated run however recent standardization better understanding dynamics wdm systems made wdm less expensive deploy optical receivers contrast laser sources tend wideband devices therefore demultiplexer must provide wavelength selectivity receiver wdm system wdm systems divided three different wavelength patterns normal wdm coarse cwdm dense dwdm normal wdm sometimes called bwdm uses two normal wavelengths 1310 1550 one fiber coarse wdm provides 16 channels across multiple transmission windows silica fibers dense wdm dwdm uses c-band 1530 nm-1565 nm transmission window denser channel spacing channel plans vary typical dwdm system would use 40 channels 100 ghz spacing 80 channels 50 ghz spacing technologies capable 12.5 ghz spacing sometimes called ultra dense wdm new amplification options raman amplification enable extension usable wavelengths l-band 1565 nm-1625 nm less doubling numbers coarse wavelength division multiplexing cwdm contrast dwdm uses increased channel spacing allow less-sophisticated thus cheaper transceiver designs provide 16 channels single fiber cwdm uses entire frequency band spanning second third transmission windows 1310/1550 nm respectively including critical frequencies oh scattering may occur oh-free silica fibers recommended wavelengths second third transmission windows used avoiding region channels 47 49 51 53 55 57 59 61 remain commonly used os2 fibers water peak problem overcome possible 18 channels used wdm cwdm dwdm based concept using multiple wavelengths light single fiber differ spacing wavelengths number channels ability amplify multiplexed signals optical space edfa provide efficient wideband amplification c-band raman amplification adds mechanism amplification l-band cwdm wideband optical amplification available limiting optical spans several tens kilometres originally term coarse wavelength division multiplexing cwdm fairly generic described number different channel configurations general choice channel spacings frequency configurations precluded use erbium doped fiber amplifiers edfas prior relatively recent itu standardization term one common definition cwdm two signals multiplexed onto single fiber one signal 1550 nm band 1310 nm band 2002 itu standardized channel spacing grid cwdm itu-t g.694.2 using wavelengths 1270 nm 1610 nm channel spacing 20 nm itu g.694.2 revised 2003 shift channel centers 1 nm strictly speaking center wavelengths 1271 1611 nm many cwdm wavelengths 1470 nm considered unusable older g.652 specification fibers due increased attenuation 1270–1470 nm bands newer fibers conform g.652.c g.652.d standards corning smf-28e samsung widepass nearly eliminate water peak attenuation peak allow full operation 18 itu cwdm channels metropolitan networks main characteristic recent itu cwdm standard signals spaced appropriately amplification edfas limits total cwdm optical span somewhere near 60 km 2.5 gbit/s signal suitable use metropolitan applications relaxed optical frequency stabilization requirements allow associated costs cwdm approach non-wdm optical components cwdm used cable television networks different wavelengths used downstream upstream signals systems wavelengths used often widely separated example downstream signal might 1310 nm upstream signal 1550 nm gbic small form factor pluggable sfp transceivers utilize standardized cwdm wavelengths gbic sfp cwdm optics allow legacy switch system converted enable wavelength multiplexed transport fiber selecting compatible transceiver wavelengths use inexpensive passive optical multiplexing device 10gbase-lx4 10 gbit/s physical layer standard example cwdm system four wavelengths near 1310 nm carrying 3.125 gigabit-per-second gbit/s data stream used carry 10 gbit/s aggregate data passive cwdm implementation cwdm uses electrical power separates wavelengths using passive optical components bandpass filters prisms many manufacturers promoting passive cwdm deploy fiber home dense wavelength division multiplexing dwdm refers originally optical signals multiplexed within 1550 nm band leverage capabilities cost erbium doped fiber amplifiers edfas effective wavelengths approximately 1525–1565 nm c band 1570–1610 nm l band edfas originally developed replace sonet/sdh optical-electrical-optical oeo regenerators made practically obsolete edfas amplify optical signal operating range regardless modulated bit rate terms multi-wavelength signals long edfa enough pump energy available amplify many optical signals multiplexed amplification band though signal densities limited choice modulation format edfas therefore allow single-channel optical link upgraded bit rate replacing equipment ends link retaining existing edfa series edfas long haul route furthermore single-wavelength links using edfas similarly upgraded wdm links reasonable cost edfa cost thus leveraged across many channels multiplexed 1550 nm band stage basic dwdm system contains several main components introduction itu-t g.694.1 frequency grid 2002 made easier integrate wdm older standard sonet/sdh systems wdm wavelengths positioned grid exactly 100 ghz 0.8 nm spacing optical frequency reference frequency fixed 193.10 thz 1,552.52 nm main grid placed inside optical fiber amplifier bandwidth extended wider bandwidths first commercial deployment dwdm made ciena corporation sprint network june 1996 today dwdm systems use 50 ghz even 25 ghz channel spacing 160 channel operation dwdm systems maintain stable wavelength frequency needed cwdm closer spacing wavelengths precision temperature control laser transmitter required dwdm systems prevent drift narrow frequency window order ghz addition since dwdm provides greater maximum capacity tends used higher level communications hierarchy cwdm example internet backbone therefore associated higher modulation rates thus creating smaller market dwdm devices high performance factors smaller volume higher performance result dwdm systems typically expensive cwdm recent innovations dwdm transport systems include pluggable software-tunable transceiver modules capable operating 40 80 channels dramatically reduces need discrete spare pluggable modules handful pluggable devices handle full range wavelengths stage details concerning wavelength-converting transponders discussed clarify role played current dwdm technology additional optical transport layer also serve outline evolution systems last 10 years stated wavelength-converting transponders served originally translate transmit wavelength client-layer signal one dwdm system internal wavelengths 1,550 nm band note even external wavelengths 1,550 nm likely need translated almost certainly required frequency stability tolerances optical power necessary system edfa mid-1990s however wavelength converting transponders rapidly took additional function signal regeneration signal regeneration transponders quickly evolved 1r 2r 3r overhead-monitoring multi-bitrate 3r regenerators differences outlined mentioned intermediate optical amplification sites dwdm systems may allow dropping adding certain wavelength channels systems deployed august 2006 done infrequently adding dropping wavelengths requires manually inserting replacing wavelength-selective cards costly systems requires active traffic removed dwdm system inserting removing wavelength-specific cards interrupts multi-wavelength optical signal roadm network operators remotely reconfigure multiplexer sending soft commands architecture roadm dropping adding wavelengths interrupt pass-through channels numerous technological approaches utilized various commercial roadms tradeoff cost optical power flexibility network topology mesh nodes interconnected fibers form arbitrary graph additional fiber interconnection device needed route signals input port desired output port devices called optical crossconnectors oxcs various categories oxcs include electronic opaque optical transparent wavelength selective devices cisco enhanced wdm system combines 1 gb coarse wave division multiplexing cwdm connections using sfps gbics 10 gb dense wave division multiplexing dwdm connections using xenpak x2 xfp dwdm modules dwdm connections either passive boosted allow longer range connection addition cfp modules deliver 100 gbit/s ethernet suitable high speed internet backbone connections shortwave wdm uses vertical-cavity surface-emitting laser vcsel transceivers four wavelengths 846 953 nm range single om5 fiber 2-fiber connectivity om3/om4 fiber see also transponders optical communications different functional views meaning optical transponders several simulation tools used design wdm systems | [
10112,
2306,
388,
8708,
3847,
2057,
1550,
7698,
11288,
2458,
5020,
5664,
1192,
1320,
3754,
7723,
11181,
1967,
10799,
1969,
2994,
6834,
9793,
7490,
3140,
9284,
11591,
7498,
9675,
7641,
2911,
3168,
2273,
2785,
5092,
5863,
7400,
2802,
6267
] | Test |
5,322 | 2 | Cisco_NX-OS:cisco nx-os nx-os network operating system nexus-series ethernet switches mds-series fibre channel storage area network switches made cisco systems evolved cisco operating system san-os originally developed mds switches based wind river linux inter-operable cisco operating systems command-line interface nx-os similar cisco ios recent nx-os cisco-style cli bash shell available nx-os 7.0 3 i3 output codice_1 codice_2 command line argument might look like text 4.1 4.2 5.0 5.1 5.2 6.0 6.1 6.2 7.0 9.2 | [
2179,
4611,
2825,
1814,
1436,
3742,
5028,
7082,
3885,
686,
7983,
6834,
7863,
3007,
9279,
10303,
10433,
5959,
9927,
11086,
1743,
7887,
10451,
9048,
1754,
1115,
5978,
10341,
11112,
9080
] | None |
5,323 | 9 | Swing_Application_Framework:swing application framework swing application framework jsr 296 java specification simple application framework swing applications graphical user interface gui computer software defines infrastructure common desktop applications making swing applications easier create withdrawn jsr 296 specification defines basic structure swing application defines framework small set extensible classes define infrastructure common desktop applications development open-source reference implementation called appframework began 2006 originally expected implementation would means integrating jsr 296 upcoming java se 7 dolphin version java project scheduled included milestone 5 java development kit jdk7 development however august 2009 announced project would included due inability reconcile design flaws achieve consensus among jsr 296 team milestone 5 deadline original swing application framework implementation put hold indefinitely later withdrawn spec lead request june 2011 last public release appframework project version 1.03 several forks original implementation started open-source communities several application framework libraries created achieve goals similar jsr 296 last release bsaf 1.9.1 2012 bsaf still available sourceforge button says project found takes defunct project kenai | [
4960,
6338,
3562,
5677,
11221
] | Test |
5,324 | 5 | Object_Desktop:object desktop object desktop od previously object desktop network odnt online software subscription service created stardock os/2 relaunched windows 1997 object desktop includes graphical user interface customization productivity products offered stardock including windowblinds fences desktopx tweak7 iconpackager objectbar object desktop — initially entitled workplace toolset/2 — developed three years brad wardell kurt westerfeld subsequent stardock os/2 essentials pre-registered set os/2 shareware object desktop 1.0 followed 1.5 professional versions following short order 1997 os/2 isv market flagging many customers switching windows nt 4 1997 os/2 revenues 33 1996 fell 25 1996 levels 1998 led decision switch windows mid-1997 nevertheless stardock remained os/2 isv february 2001 stopped selling object desktop os/2 os/2 versions sold initial versions upgrades costing later windows versions due lower volume sales initial release object desktop praised functionality criticised performance compatibility issues object desktop 1.5 released 2 may 1996 fixing many problems adding following components users 1.0 could upgrade 37 object desktop professional name suggests aimed professional users os/2 released 24 august 1996 priced 179 users could also upgrade od 1.5 69.95 od 1.0 119 addition features od 1.5 package included object desktop 2.0 update previously released components integration professional features main package priced 99.95 users object desktop professional could upgrade 39 versions could upgraded 69.95 upgrade 2.02 released start 2000 made clear would last release became clear os/2 would remain viable platform stardock decided move windows required rewriting old components writing new ones replace appropriate windows would take time stardock needed money immediately sustain development cope cashflow problem object desktop users switched os/2 windows asked purchase windows subscriptions advance actual software understanding subscription period would begin software reasonably complete ended december 1999 program called early experience program due significant goodwill built previous years many signed stardock survived initially new object desktop package closely related os/2 versions old favourites like object edit control center task/tab launchpad ported however userbase expanded traditional core technical users wider windows market newer components shifted focus customizing graphical user interface flagship component object desktop became windowblinds popular additions iconpackager objectbar desktopx deskscapes fences impulse preceded component manager stardock central main interface registering downloading updating components roughly equivalent package manager users pay initial fee access software one year access download updates may also download new components added subscription period updates guaranteed components deemed less relevant may passed removed expiry users download software renew however lose use released non-beta software already downloaded necessary renew immediately renewals add year access date renewal expiry date historically initial subscription fee windows version object desktop 49.95 year renewal upgrade standalone component 34.95 object desktop 2008 introduced two tiers lower tier 49.95 higher tier 69.95 latter eliminated 2010 object desktop works component model many programs available separately subscribers use components available object desktop subscribers february 2010 components may remain available legacy subscribers offered new users components withdrawn service make past beta stages components brought forth windows version object desktop occasional complaint subscription model subscriber favourite component updated recently may left beta long time hand popular components windowblinds tend frequently updated beta releases every week two release versions new features every months major version changes every year non-object desktop users said beta issue creates double standard forces people upgrade object desktop order get latest features stardock says policy due many standalone users expecting beta versions reliability release versions increased ease releasing build impulse separate installation package | [
11270,
5067,
5324,
6797,
7983,
3250,
9780,
7325
] | None |
5,325 | 4 | Security_bug:security bug security bug security defect software bug exploited gain unauthorized access privileges computer system security bugs introduce security vulnerabilities compromising one security bugs need identified exploited qualify security bugs like software bugs stem root causes generally traced either absent inadequate security bugs generally fall fairly small number broad categories include see software security assurance | [
5636,
10756,
9356,
3473,
8978,
1688,
5373,
5246,
10392,
4892,
2717,
5404,
2975,
3871,
1954,
2213,
8998,
6184,
939,
5547,
3629,
9646,
7855,
9904,
2737,
1970,
5433,
7739,
3262,
9791,
1474,
3525,
7368,
9160,
4435,
1622,
2262,
9688,
7515,
355... | Test |
5,326 | 3 | 3DNow!:3dnow 3dnow extension x86 instruction set developed advanced micro devices amd adds single instruction multiple data simd instructions base x86 instruction set enabling perform vector processing improves performance many graphic-intensive applications first microprocessor implement 3dnow amd k6-2 introduced 1998 application appropriate raised speed 2–4 times however instruction set never gained much popularity amd announced august 2010 support 3dnow would dropped future amd processors except two instructions codice_1 codice_2 instructions two instructions also available bay-trail intel processors 3dnow developed time 3d graphics becoming mainstream pc multimedia games realtime display 3d graphics depended heavily host cpu floating-point unit fpu perform floating-point calculations task amd k6 processor easily outperformed competitor intel pentium ii enhancement mmx instruction set 3dnow instruction-set augmented mmx simd registers support common arithmetic operations add/subtract/multiply single-precision 32-bit floating-point data software written use amd 3dnow instead slower x87 fpu could execute 4x faster depending instruction-mix first implementation 3dnow technology contains 21 new instructions support simd floating-point operations 3dnow data format packed single-precision floating-point 3dnow instruction set also includes operations simd integer operations data prefetch faster mmx-to-floating-point switching later intel would add similar incompatible instructions pentium iii known sse streaming simd extensions 3dnow floating-point instructions following 3dnow integer instructions following 3dnow performance-enhancement instructions following little evidence second version 3dnow ever officially given trade name led confusion documentation refers new instruction set common terms extended 3dnow enhanced 3dnow 3dnow+ phrase enhanced 3dnow found locations amd website capitalization enhanced appears either purely grammatical used emphasis processors may may extensions notable references benchmark page k6-iii-p extensions extension 3dnow instruction set introduced first-generation athlon processors athlon added 5 new 3dnow instructions 19 new mmx instructions later k6-2+ k6-iii+ targeted mobile market included 5 new 3dnow instructions leaving 19 new mmx instructions new 3dnow instructions added boost dsp new mmx instructions added boost streaming media 19 new mmx instructions subset intel sse1 instruction set amd technical manuals amd segregates instructions apart 3dnow extensions amd customer product literature however segregation less clear benefits 24 new instructions credited enhanced 3dnow technology led programmers come name 19 new mmx instructions common appears integer sse isse ssemmx mmx2 also found video filter documentation public domain sector also noted isse could also refer internet sse early name sse 3dnow extension dsp instructions following mmx extension instructions integer sse following 3dnow professional trade name used indicate processors combine 3dnow technology complete sse instructions set sse1 sse2 sse3 athlon xp first processor carry 3dnow professional trade name first product athlon family support complete sse1 instruction set total 21 original 3dnow instructions five 3dnow extension dsp instructions 19 mmx extension instructions 52 additional sse instructions complete sse1 compatibility geode gx geode lx added two new 3dnow instructions currently absent processors 3dnow professional instructions unique geode gx/lx following one advantage 3dnow possible add multiply two numbers stored register sse number combined number position another register capability known horizontal intel terminology major addition sse3 instruction set disadvantage 3dnow 3dnow instructions mmx instructions share register-file whereas sse adds 8 new independent registers codice_50–codice_51 mmx/3dnow registers shared standard x87 fpu 3dnow instructions x87 instructions executed simultaneously however aliased x87 fpu 3dnow mmx register states saved restored traditional x87 codice_52 codice_53 instructions arrangement allowed operating systems support 3dnow explicit modifications whereas sse registers required explicit operating system support properly save restore new xmm registers via added codice_54 codice_55 instructions fx* instructions upgrade older x87 save restore instructions could save sse register states also x87 register states hence meant could save mmx 3dnow registers amd athlon xp k8-based cores i.e athlon 64 assembly programmers noted possible combine 3dnow sse instructions reduce register pressure practice difficult improve performance due instructions executing shared functional units | [
3459,
8452,
2821,
1798,
6151,
4491,
6924,
1677,
4237,
6038,
9369,
9500,
10270,
9126,
2088,
7983,
9391,
9911,
8120,
8506,
1085,
8125,
8126,
833,
7234,
6596,
9541,
3142,
977,
2514,
5844,
9428,
4603,
8795,
2655,
1122,
7783,
10985,
9964,
1005... | None |
5,327 | 4 | Security_Vision:security vision security vision – software meant automation information security management system isms organisation software kind representative security operations center soc functionality security vision renders information security processes comprising information security management system organization automatic compliance international information security management standards next security vision modules allow make automatic performance standard requirements following sections moment creation security vision software till creator system sticks three-level architecture – core level collection level management level core level – made collection analysis correlation events generated different sources events corporate network collection level – meant management level – made rendering information security management process automatic basically russian-speaking system management portal security vision software collects events generated process following information security information technology functioning regulatory requirements associated necessity system kind found mandatory legislation norms russian federation law well recommended international prescriptions economic sectors area regulatory security requirements industry standards international standards software core level comprises functionality stocktaking integrity control certified means 4 level control absence non-declared capabilities listed national catalog certified information security means federal office technical export control also used 2013 2012 2011 2010 | [
517,
10245,
6797,
4755,
1314,
2213,
3366,
8998,
7983,
2737,
5941,
11594,
4448,
225,
4194,
9184,
10213,
4074,
4725,
5245
] | Train |
5,328 | 2 | On-line_Debugging_Tool:on-line debugging tool on-line debugging tool odt used describe several debugger programs developed digital equipment corporation dec hardware various operating systems including os/8 rt-11 rsx-11 rsts/e implemented odt firmware console lsi-11-family processors including 11/03 11/23/24 11/53 11/73 11/83/84 debugger allowed access memory using octal addresses data within software systems debugger accessed process address space dec line pdp-11 processors implement virtual memory operating system perspective instead worked fixed address space mapped unified view program address space using active page register apr apr could map program ram increments 4k 16-bit words maximum 32k words apr could map 8 segments ram limited 4k structure maximum ram apr able map 32k 16-bit words case rsts/e usually meant runtime system rts mapped upper portion address space user program resided lower portion address space rts provided code support access operating system behalf user program rts stored non-static data address space user program rts typically read-only operating system loaded single copy rts mapped user program required rts apr would set map rts upper portion program address space 4k increments basic plus rts basic+ programming language typically mapped 16k user program mapped 4k increments lower 16k rt11 rts occupied 4k user program like rt11-based peripheral interchange program pip could expand maximum 28k odt could used patch binary modules like rts without requiring re-compilation binary source firmware console implementation accessed physical memory odt non-symbolic debugger implements similar functionality advanced debugger adb unix systems console odt replaced lights switches console many earlier processors access console odt obtained either power appropriate power mode selected execution halt instruction kernel mode use front panel halt switch button 1000/ xxxxxx 112737 lf deposits program deposit pc program counter sets pc start program deposit psw program status word locks interrupts effect write stream console check transmitter ready highly probable large number garbage characters displayed rsx-11m-plus odt essentially superset odt implementations odt implemented code linked task using task builder /da switch task built odt run odt invoked entry underscore standard odt prompt addresses odt debugger 16 bit addresses mode odt operating physical addresses used console odt pdp-8 os/8 operating system odt command invoked octal debugging technique tool subsequent pdp-11 odt programs non-symbolic could examine modify memory also set breakpoints | [
1253,
8876,
7983,
3216,
11539,
5492,
6837,
8732,
10590
] | Validation |
5,329 | 3 | Instructions_per_cycle:instructions per cycle computer architecture instructions per cycle ipc commonly called instructions per clock one aspect processor performance average number instructions executed clock cycle multiplicative inverse cycles per instruction calculation ipc done running set piece code calculating number machine-level instructions required complete using high-performance timers calculate number clock cycles required complete actual hardware final result comes dividing number instructions number cpu clock cycles number instructions per second floating point operations per second processor derived multiplying number instructions per cycle clock rate cycles per second given hertz processor question number instructions per second approximate indicator likely performance processor number instructions executed per clock constant given processor depends particular software run interacts processor indeed entire machine particularly memory hierarchy however certain processor features tend lead designs higher-than-average ipc values presence multiple arithmetic logic units alu processor subsystem perform elementary arithmetic logical operations short pipelines comparing different instruction sets simpler instruction set may lead higher ipc figure implementation complex instruction set using chip technology however complex instruction set may able achieve useful work fewer instructions given level instructions per second achieved high ipc low clock speed like amd athlon early intel core series low ipc high clock speed like intel pentium 4 lesser extent amd bulldozer valid processor designs choice two often dictated history engineering constraints marketing pressures however high ipc high frequency always give best performance useful work done computer depends many factors besides processor speed factors include instruction set architecture processor microarchitecture computer system organization design disk storage system capabilities performance attached devices efficiency operating system importantly high-level design application software use users purchasers computer system instructions per clock particularly useful indication performance system accurate measure performance relevant application benchmarks much useful awareness existence useful provides easy-to-grasp example clock speed factor relevant computer performance | [
3586,
7173,
9739,
5645,
5649,
2066,
7699,
5655,
10779,
10781,
6181,
8231,
3630,
6705,
7218,
2623,
2113,
7234,
3142,
2638,
10837,
2655,
1122,
3175,
8815,
630,
8822,
6268,
3197,
7313,
2719,
6815,
5793,
6818,
8352,
6821,
7852,
9391,
2224,
22... | None |
5,330 | 9 | C3_linearization:c3 linearization computing c3 superclass linearization algorithm used primarily obtain order methods inherited presence multiple inheritance words output c3 superclass linearization deterministic method resolution order mro c3 superclass linearization results three important properties first published 1996 oopsla conference paper entitled monotonic superclass linearization dylan adapted open dylan implementation january 2012 following enhancement proposal chosen default algorithm method resolution python 2.3 newer perl 6 parrot solidity pgf/tikz object-oriented programming module also available alternative non-default mro core perl 5 starting version 5.10.0 extension implementation earlier versions perl 5 named codice_1 exists cpan python guido van rossum summarizes c3 superclass linearization thusly c3 superclass linearization class sum class plus unique merge linearizations parents list parents list parents last argument merge process preserves local precedence order direct parent classes merge parents linearizations parents list done selecting first head lists appear tail elements list except first lists note good head may appear first element multiple lists time forbidden appear anywhere else selected element removed lists appears head appended output list process selecting removing good head extend output list repeated remaining lists exhausted point good head selected heads remaining lists appear one tail lists merge impossible compute due inconsistent orderings dependencies inheritance hierarchy linearization original class exists naive divide conquer approach computing linearization class may invoke algorithm recursively find linearizations parent classes merge-subroutine however result infinitely looping recursion presence cyclic class hierarchy detect cycle break infinite recursion reuse results previous computations optimization recursive invocation shielded re-entrance previous argument means cache memoization given linearization z computed first metaclass enable short representation objects name instead example class '__main__.a class type type class object metaclass=type pass construct inheritance tree class pass class b pass class c pass class pass class e pass class k1 b c pass class k2 b e pass class k3 pass class z k1 k2 k3 pass » z.mro z k1 k2 k3 b c e type 'object perl 6 uses c3 linearization classes default say z.^mro output z k1 k2 k3 b c e mu | [
11620,
8582,
2281,
8554,
3051,
7894,
11610,
764
] | Test |
5,331 | 4 | Visitor_management:visitor management visitor management refers tracking usage public building site gathering increasing amounts information visitor management system record usage facilities specific visitors provide documentation visitor ’ whereabouts. ref | [
2737,
1083,
6885,
5331
] | None |
5,332 | 7 | Hortonworks:hortonworks hortonworks data software company based santa clara california developed supported open-source software primarily around apache hadoop designed manage big data associated processing hortonworks completed merger cloudera january 2019 hortonworks software used build enterprise data services applications iot connected cars example single view x customer risk patient advanced analytics machine learning next best action realtime cybersecurity hortonworks three interoperable product lines hortonworks formed june 2011 independent company funded 23 million venture capital yahoo benchmark capital first office sunnyvale california company employs contributors open source software project apache hadoop hortonworks data platform hdp product includes apache hadoop used storing processing analyzing large volumes data platform designed deal data many sources formats platform includes hadoop technology hadoop distributed file system mapreduce pig hive hbase zookeeper additional components eric baldeschweiler yahoo initial chief executive rob bearden chief operating officer formerly springsource benchmark partner peter fenton board member company name refers character horton elephant since elephant symbol hadoop october 2018 hortonworks cloudera announced would merging all-stock merger equals | [
9344,
10661,
1222,
7750,
9179,
11016,
8810,
10719,
6156,
1935,
11343,
982,
8408,
8217,
3323,
253,
8735
] | None |
5,333 | 3 | Bokosuka_Wars:bokosuka wars game responsible laying foundations tactical role-playing game genre simulation rpg genre known japan blend role-playing strategy game elements game also variously described early example action role-playing game early prototype real-time strategy game unique reverse tower defense game time game considered major success japan originally developed 1983 sharp x1 computer ascii entertainment first software contest sold boxed year msx port released 1984 followed 1985 versions s1 pc-6000mkii pc-8801 pc-9801 fm-7 family computer latter released december 14 1985 login magazine november 1984 issue featured sequel x1 entitled new bokosuka wars source code included all-new enemy characters redesigned items traps level difficulty became balanced also included tape login magazine november 1984 issue never sold form pc-8801 version used sold download enterbrain ported i-mode service 2004 famicom version released wii virtual console april 8 2008 sequel bokosuka wars ii released japan november 10 2016 later famicom version king suren forces captured turned trees rocks king ogereth king suren release warriors trees rocks defeat king ogereth forces allies coming trees rocks appear famicom version earlier x1 msx pc computer versions however player starts complete army may gain extra knights freeing prison cells trees rocks soldiers turned objects original computer versions player control three chess-like units king knight pawn pressing d-pad move king suren army desired direction captive soldiers freed using knight break gates front famicom version player starts game king suren 597m acquires allies bumping trees cacti rocks walls using king suren restore normal form throughout world bokosuka obstacles certain characters pass gates soldiers locked broken knights death tiles kill characters except soldiers remove step walls 500m 400m 300m 200m broken king suren one unit collides another battle takes place tile change icon crossed swords b battle victory automatically calculated computer based difference offensive strengths units king suren dies game ends announcing wow lose king suren succeeds defeating king ogreth game ends bravo win japanese instruction manual contains lyrics onward bokosuka すすめボコスカ peculiar game music written programmer | [
5762,
10931,
9006
] | Test |
5,334 | 4 | MIMEDefang:mimedefang mimedefang gpl licensed framework filtering e-mail uses sendmail milter api c glue code perl code let user write high-performance mail filters perl mimedefang used mimedefang originally developed dianne skoll contracted royal college physicians surgeons canada 2000 help stop flood email viruses college network software written filter attachments originally called mimesweeper mimedefanger currently mimedefang skoll announced software public august 28 2000 december 21 2001 version incorporating support spamassassin released making mimedefang filter spam viruses skoll company roaring penguin software currently markets commercial anti-spam product known canit based open-source version mimedefang milter library included sendmail uses posix threads allow multiple concurrent filters mimedefang perl filter uses pre-forked process model similar traditional apache web server multi-processing model mimedefang therefore consists three components mimedefang users code filtering policies perl using infrastructure provided mimedefang.pl n't need worry thread synchronizations perl filter separate single-threaded process infrastructure provided mimedefang.pl follows milter api reasonably closely exactly includes convenience routines parsing rebuilding mime messages filter authors concentrate high-level policy rather worry low-level api details convenience comes small loss flexibility loss performance | [
865,
2945,
4294,
8582,
9053,
1967,
2737,
7739,
731,
2045
] | Validation |
5,335 | 2 | Comparison_of_OpenSolaris_distributions:comparison opensolaris distributions technical variations solaris distributions include support different hardware devices systems software package configurations organizational differences may motivated historical reasons criteria include security including quickly security upgrades available ease package management number packages available tables compare noteworthy distribution latest stable release wide-ranging objective criteria cover operating system subjective merits branches marked unstable beta compare solaris distributions operating systems basic general information distributions creator producer release date latest version forth information features distributions package numbers approximate | [
3969,
8077,
2967,
8092,
6049,
546,
6445,
2864,
11184,
9671,
5067,
1101,
8909,
463,
8147,
10971,
10851,
11363,
5096,
9320,
5356,
366,
5358,
11506,
499,
5492,
1399,
5240,
4858,
381,
9343
] | Test |
5,336 | 9 | Plus_(programming_language):plus programming language plus pascal-like system implementation language university british columbia ubc canada based sue system language developed university toronto c. 1971 another programming language named plus developed sperry univac roseville minnesota univac plus subject article plus developed university british columbia ubc computing centre alan ballard paul whaley use development michigan terminal system mts code generated compiler operating system dependent limited use development mts ubc plus compiler written largely plus runs michigan terminal system mts ibm s/370 compatible hardware ibm os/vs1 generates code ibm s/370 dec pdp-11 motorola 68000 architectures plus based large extent sue system language developed university toronto c. 1971 sue language derived particularly data structure facilities pascal plus superficially quite different sue pascal however underlying language semantics really quite similar users familiar c programming language also recognize much structure semantics plus goals compiler plus language include manual ubc plus plus programming language available description source object libraries available use plus plus source library definitions also available hello world example program prints string hello world terminal screen display | [
9345,
4069,
6342,
7269,
6248,
11625,
8524,
7983,
11219,
2045
] | None |
5,337 | 4 | BlackEnergy:blackenergy blackenergy malware first reported 2007 http-based toolkit generated bots execute distributed denial service attacks 2010 blackenergy 2 emerged capabilities beyond ddos 2014 blackenergy 3 came equipped variety plug-ins russian-based cybergang known sandworm attributed using blackenergy targeted attacks attack distributed via word document powerpoint attachment email luring victims clicking seemingly legitimate file blackenergy code facilitates different attack types infect target machines also equipped server-side scripts perpetrators develop command control c c server cybercriminals use blackenergy bot builder toolkit generate customized bot client executable files distributed targets via email spam phishing e-mail campaigns be1 lacks exploit functionalities relies external tools load bot blackenergy detected using yara signatures provided united states department homeland security dhs • target one ip address per hostname • runtime encrypter evade detection antivirus software • hides processes system driver syssrv.sys • ddos attack commands e.g icmp flood tcp syn flood udp flood http get flood dns flood etc • download commands retrieve launch new updated executables server • control commands e.g stop wait die blackenergy 2 uses sophisticated rootkit/process-injection techniques robust encryption modular architecture known dropper decrypts decompresses rootkit driver binary installs victim machine server randomly generated name update blackenergy 1 combines older rootkit source code new functions unpacking injecting modules user processes packed content compressed using lz77 algorithm encrypted using modified version rc4 cipher hard-coded 128-bit key decrypts embedded content decrypting network traffic cipher uses bot unique identification string key second variation encryption/compression scheme adds initialization vector modified rc4 cipher additional protection dropper rootkit unpacking stub used inner rootkit userspace modules primary modification rc4 implementation blackenergy 2 lies key-scheduling algorithm • execute local files • download execute remote files • updates plugins command control servers • execute die destroy commands latest full version blackenergy emerged 2014 changes simplified malware code version installer drops main dynamically linked library dll component directly local application data folder variant malware involved december 2015 ukraine power grid cyberattack • fs.dll — file system operations • si.dll — system information “ blackenergy lite ” • jn.dll — parasitic infector • ki.dll — keystroke logging • ps.dll — password stealer • ss.dll — screenshots • vs.dll — network discovery remote execution • tv.dll — team viewer • rd.dll — simple pseudo “ remote desktop ” • up.dll — update malware • dc.dll — list windows accounts • bs.dll — query system hardware bios windows info • dstr.dll — destroy system • scan.dll — network scan | [
5665,
9762,
11662,
3506,
8978,
9688,
9791
] | Test |
5,338 | 4 | PacketTrap:packettrap packettrap provider network management traffic analysis software midsize companies company headquartered san francisco california corporate parent dell located round rock texas packettrap features include desktop management server management monitor cloud assets etc | [
1400
] | None |
5,339 | 3 | Buffalo_network-attached_storage_series:buffalo network-attached storage series buffalo network-attached storage series network-attached storage devices modified miniature general purpose linux-based computers linkstation terastation intended general public kuro box intended expert hackers cheap platform linux development devices undergone various improvements since first produced example first generation device 100base-tx network adapter using parallel ata hard drive current version 1000base-t-capable connection uses serial ata interface older generations device used powerpc mips processors latest version device uses arm architecture processor linkstation powerpc mips arm based network attached storage appliance sold north america europe japan significantly notable among linux community japan us/europe hackable generic linux appliance made tasks file storage task designed linkstation ethernet usb serial ports video output made buffalo technology division melco produced japan 2006 also available american retailers best buy compusa well europe kuro box name series powerpc arm processor based computers intended use network-attached storage device original kuro box made spare hardware components manufacturer linkstation recent versions kuro box use later linkstation hardware hardware similar linkstation kuro box versions provided without hard drive case physical dimensions shape corresponding linkstation black color japanese symbols kuro box 玄箱 meaning box operated expert esoteric knowledge silver lettering side panel name also pun kuro different kanji 黒 also means 'black since january 2012 terastation uses lio iscsi target device runs linux included changes linux source code buffalo required release modified versions source code per terms gnu general public license due availability source code relatively low cost device several community projects centered around two main replacement firmware releases available device first openlink based official buffalo firmware improvements features added freelink debian distribution product designed manufacturer accept user-supplied linux distribution several including kurobox-specific distribution called sylver debian gentoo linux fedora core ported various user groups us/europe japan like linkstation device runs version linux debian gentoo linux distributions netbsd reported ported device various iterations ships universal plug play protocol distribution multimedia stored device also configured variety different media servers twonkyvision media server slimserver/squeezecenter server itunes server using digital audio access protocol samba server lio iscsi target mldonkey client well network file system server posix-based systems use backup server modified use rsync back synchronize data one many computers network pushing data even linkstation pulling data remote servers—beside use buffalo-provided backup software windows also found use number ways notably usb interface comes configured print server also use common unix printing system act usb printer users managed get use number usb devices version 2.6 linux kernel enhanced usb support additionally apache http server software already installed purpose providing buffalo configuration screens device easily converted lightweight web server buffalo content deleted serve content operator choice | [
1537,
3585,
2308,
6797,
1682,
405,
10393,
5019,
2594,
2723,
6178,
7983,
9266,
823,
1849,
1728,
7234,
8899,
7492,
10820,
11337,
9163,
6618,
2784,
865,
3300,
5482,
9964,
2285,
3053,
9581,
1776,
10606,
2420,
8700,
10109
] | Train |
5,340 | 3 | Gauntlet_(1985_video_game):gauntlet 1985 video game gauntlet fantasy-themed hack slash 1985 arcade game atari games noted one first multi-player dungeon crawl arcade games core design gauntlet comes dandy 1983 atari 8-bit family title resulted lawsuit arcade version gauntlet released november 1985 initially available dedicated 4-player cabinet total 7,848 units distributed atari later released 2-player cabinet variant june 1986 aimed operators could afford sufficient space 4-player version game set within series top-down third-person perspective mazes object find touch designated exit every level assortment special items located level increase player character health unlock doors gain points magical potions destroy enemies screen player controls one four playable fantasy-based characters thor warrior merlin wizard thyra valkyrie questor elf characters named cabinet artwork in-game 're referred title classes character unique strength weaknesses example warrior strongest hand-to-hand combat wizard powerful magic valkyrie best armor elf fastest movement characters assigned control panel 4-player version whereas 2-player version player selects character start game joining middle play enemies assortment fantasy-based monsters including ghosts grunts demons lobbers sorcerers thieves enters level specific generators destroyed bosses game dangerous enemy death destroyed using magic potion otherwise death vanish automatically drained certain amount health player game progresses higher levels skill needed reach exit success often depending willingness players cooperate sharing food luring monsters places engaged slaughtered conveniently contact enemies reduces player health health also slowly drains thus creating time limit character health reaches zero character dies character revived place full health spending game credit — inserting coin arcade — within certain short time window died allows even least proficient players keep playing indefinitely willing keep inserting coins however player final score divided amount credits used play resulting average aside ability four players game also noted narrator voice produced texas instruments tms5220c speech chip tms5220c speech encoded earl vickers narrator voiced ernie fosselius frequently makes statements repeating game rules including shots hurt players yet remember n't shoot food elf shot food warrior needs food badly narrator occasionally comments battle saying 've seen bravery let see get player life force points fall 200 narrator states life force running elf needs food valkyrie die control panel 4-player cabinet wider standard uprights order accommodate four people time player 8-way joystick two buttons one fire ranged attack one magic magic button also starts game gauntlet release games started using design popular conversion target newer games run originally called dungeons game conceived atari game designer ed logg claimed inspiration son interest paper-based game dungeons dragons interest 1983 atari 800 home computer game dandy game development spanned 1983 1985 team led designers ed logg roger zeigler working title became legally unavailable april 1985 renamed gauntlet may based upon elaborate hardware design atari history date company first coin-operated game features voice synthesizer chip gauntlet ported ms-dos apple ii apple macintosh msx nes apple iigs master system genesis gauntlet 4 atari st commodore 64 amstrad cpc zx spectrum genesis port released gauntlet 4 spelled gauntlet iv packaging manual outside japan adds three modes addition arcade mode quest action rpg battle deathmatch game record single-player variant arcade mode progress kept track via passcode emulated instance original gauntlet arcade series included midway arcade treasures 2003 compilation arcade games available nintendo gamecube playstation 2 xbox windows gauntlet deeper dungeons expansion pack original ports gauntlet 512 new levels required original program released 1987 british company u.s. gold uk europe mindscape united states released amstrad cpc msx atari st commodore 64 zx spectrum developed gremlin graphics many levels entries competition throughout europe ten winners awarded prizes gauntlet t-shirt copy program computers contest announced instructions many ported games early 1987 u.s. gold release expansion cassette gauntlet containing hundreds new levels treasure rooms chance maze included tape levels presented randomly artwork side panel artwork arcade cabinet main characters shown enemies removed image replaced pink background many reviewers noted levels much harder original game although consensus quite good first game newly released arcade sequel game highly profitable upon october 1985 launch reportedly earning one san mateo california arcade operator sixteen weeks another canadian operator nine days atari ultimately sold total 7,848 gauntlet video game arcade cabinets 1986 golden joystick awards london gauntlet game year runner-up category arcade-style game year entertainment weekly picked game 14 greatest game available 1991 saying sequels game nothing matches original gauntlet innovative fast-playing mix mazes monsters magic spells macintosh version game reviewed 1989 dragon 150 hartley patricia kirk lesser role computers column reviewers gave game 4 5 stars compute praised macintosh version sound effects computer video games praised accuracy amstrad version said great graphics good sounds perfect playability crash praised smooth fast scrolling longevity avenger listed alternative master system review ace said people ages could quickly master controls tasks spectrum version biggest selling game 1986 voted number 38 sinclair readers top 100 games time mega drive release 1993 megatech said action flawless stood test time well continued brilliant game one warrants immediate attention mega praised longevity game saying huge fun must-buy placing game 19 list best mega drive games time decade release official uk playstation magazine noted spent many night hunched fag-stained gauntlet machine said limitations become apparent late 1990s next generation including game top 100 games time noted intro record gauntlet number 101 controversy arose release game arcade subsequent port nintendo entertainment system ed logg co-creator asteroids centipede credited original game design gauntlet arcade version well 1987 nes release version release john palevich threatened lawsuit asserting original concept game dandy game atari 8-bit family written palevich published 1983 conflict settled without suit filed atari games business tengen allegedly awarding palevich gauntlet game machine credited special thanks 1986 logg entirely removed credits later releases 2007 logg claims involvement nes game dandy later reworked atari corporation published atari 2600 atari 7800 atari 8-bit family dark chambers 1988 world record holder gauntlet russ cool score 5.1 million points set december 6 2013 | [
8484,
8300,
6797,
9006,
2159,
1776,
7281,
9166,
10316,
10931,
2073,
5820,
606,
4991
] | Test |
5,341 | 4 | MySecureCyberspace:mysecurecyberspace mysecurecyberspace began 2003 initiative carnegie mellon cylab information networking institute educate public computer security network security internet safety inspired national strategy secure cyberspace initiative empowers users secure part cyberspace initiative created web portal www.mysecurecyberspace.com customized information users cybersecurity threats addition tactical countermeasures legal ethical privacy issues example using secure cyberspace tool web portal user could enter online activity email receive explanation common threats issues associated activity spam phishing scams receive advice resolve problems web portal mysecurecyberspace served people ages roles certain areas web portal contained articles resources specifically parents educators children 2005 2012 mysecurecyberspace provided flash-based interactive game designed elementary school children www.carnegiecyberacademy.com called carnegie cadets reinforced principles safe responsible computing enriched content classroom material complied national educational technology standards game could integrated fourth fifth grade curricula carnegie cyber academy website supporting materials remain available game compatible current operating systems grant national science foundation cylab information networking institute launched web portal april 2005 included prototype online carnegie cadets game carnegie cadets mysecurecyberspace game companion website officially launched october 26 2007 demonstration j.h brooks elementary school pittsburgh pa attorney general tom corbett attended kickoff event endorsed game | [
2464,
939,
10928,
9426,
2558
] | Validation |
5,342 | 9 | Lispkit_Lisp:lispkit lisp lispkit lisp lexically scoped purely functional subset lisp pure lisp developed testbed functional programming concepts first used early experimentation lazy evaluation secd machine-based implementation written algol variant published developer peter henderson 1980 compiler virtual machine highly portable result implemented many machines base language provides following functions extensions discussed henderson book explicit support lazy evaluation non-deterministic programming functions lambda let letrec similar subtle differences way treat named variables make useful different ways lambda defines returns function let binds expressions variable names letrec essentially similar let except allows definition recursive functions values e.g. infinite series | [
512,
10403,
6536,
1952
] | Test |
5,343 | 2 | Emmabuntüs:emmabuntüs emmabuntüs linux distribution derived ubuntu/debian designed facilitate repacking computers donated humanitarian organizations like emmaüs communities name emmabuntüs portmanteau emmaüs ubuntu desktop environment xfce cairo-dock lxde also included optionally installed multiple applications installed perform task order provide choice user uses system examples | [
7431,
3859,
5397,
11669,
11418,
926,
10016,
3245,
6445,
8621,
8112,
9780,
439,
7483,
2108,
1089,
3649,
708,
3654,
7626,
5067,
975,
2383,
1107,
4309,
5078,
4951,
3550,
1632,
4192,
6371,
5990,
7913,
7020,
8177,
2930,
499,
1396,
5363,
9971,
... | Test |
5,344 | 7 | Proactive_network_provider_participation_for_P2P:proactive network provider participation p2p p4p proactive network provider participation p2p method internet service providers isps peer-to-peer p2p software optimize peer-to-peer connections p4p proponents say save isp significant costs using local connections also speeds download times p2p downloaders 45 critics say favor downloaders isps come expense others established 2007 p4p working group p4pwg participants isp movie/content p2p industries focused helping isps handle demands large media files enabling legal distribution – building believe effective model transmitting movies large files customers current p2p model shares data equally peers regardless whether nearby results several nearby peers sending receiving data across world possible – working group members say currently pattern traffic poses problem p4p works isp use new itracker provides information isp network configured p2p client software p2p torrent servers called trackers query itracker identify data routes isp prefers connections avoid changing depending time day p2p software co-operatively connect peers closer cheaper isp selectively favoring peers instead choosing peers randomly provides three methods finding local peers note p4p replace control p2p networks p4p allows isps provides additional information regarding network topology p2p networks may choose utilize optimize network data delivery information used combination information p2p networks collect observed peer data transfer rates example p2p network selecting nearby peer slow far peer fast decision entirely control p2p network implementation p4p entirely voluntary part isps p2p networks adopted mutually beneficial concern existing p2p trackers p4p may used prevent piracy future p4p working group includes prominent members entertainment industry well known anti-piracy lobbyists anti-piracy measures could added future p2p industry also says p4p may slow transfers users bittorrent example designed favor fastest peers available – changed favor closest peers instead must affect speed equality balance peers would lost – clients networks good backbone slow upload speeds would download slower clients using isps support p4p would benefit using local peers p4p work software supports yet protocols currently dominate network keep blind locality liteload shay horovitz danny dolev hebrew university jerusalem presents solution leads p2p locality isps existing protocols future ones | [
8640,
11029
] | Train |
5,345 | 4 | Douglas_Thomas:douglas thomas douglas thomas born 1966 american scholar researcher journalist associate professor annenberg school communication university southern california studies technology communication culture author editor numerous books including reading nietzsche rhetorically guilford 1998 cybercrime security surveillance information age brian loader routledge 2000 hacker culture university minnesota press 2002 technological visions hopes fears shape new technologies marita sturken sandra ball-rokeach published numerous articles academic journals founding editor games culture journal interactive media 1998 1999 covered case kevin mitnick wired news july 24 2002 testified congress topic cyber terrorism critical infrastructure protection research funded annenberg center communication richard lounsbery foundation macarthur foundation focused relationship virtual worlds civic engagement digital media learning recent article co-authored john seely brown gamer disposition named harvard business review breakthrough idea 2008 also featured conversation starter blog also co-authored new culture learning cultivating imagination world constant change translated turkish | [] | None |
5,346 | 9 | BennuGD:bennugd bennugd also referred bennu game development bennu high-level open-source video game development suite originally created fenix project fork argentinian hacker splitergu officially supported windows linux gp2x wiz gp2x caanoo dingux also run multiple platforms extent including freebsd mac os x ios consoles gp2x dingoo a320 wii recently bennugd ported sega dreamcast playstation 2 bennugd focuses modularity portability makes easy beginners experienced users create games bennugd console application several integrated development environments ide available none officially supported package includes compiler run-time code different shared libraries extend core functionality bennugd created fenix project fork argentinian hacker splintergu disagreements fenix project community january 2010 first part two-part series articles bennugd published spanish todolinux magazine february 2010 second part published | [
1952,
10316,
7983,
9045,
823,
2045
] | Test |
5,347 | 9 | SAMPL:sampl sampl stands stochastic ampl algebraic modeling language resulting expanding well-known language ampl extended syntax keywords designed specifically representing stochastic programming problems recent extensions problems chance constraints integrated chance constraints robust optimization problems generate deterministic equivalent version instances using solvers ampl connects generate smps representation use specialized decomposition based solvers like fortsp sampl shares language features ampl adds constructs specifically designed expressing scenario based stochastic programming robust optimization express scenario-based sp problems additional constructs describe tree structure group decision variable stages moreover possible specify parameter stores probabilities branch tree set represents scenario set constructs easily define chance constraints integrated chance constraint sp problem available well using language constructs allows retain structure problem hence making available solvers might exploit using specialized decomposition methods like benders decomposition speed-up solution sampl supports constructs describe three types robust optimization formulations sampl currently available part software ampldev distributed www.optirisk-systems.com supports many popular 32- 64-bit platforms including windows linux mac os x free evaluation version limited functionality available following sampl version simple problem dakota show sp related constructs include data file follows normal ampl syntax see example provided ampl wikipedia page reference sampl instance level format sp problems smps therefore problem solved solver supports standard one solvers fortsp included standard sampl distribution regarding robust optimization problems needed solver depend specific formulation used ben-tal nemirovski formulation need second-order cone capable solver | [
9345,
5612,
1039,
7983,
823,
9915
] | None |
5,348 | 3 | Programmable_interval_timer:programmable interval timer computing embedded systems programmable interval timer pit counter generates output signal reaches programmed count output signal may trigger interrupt pits may one-shot periodic one-shot timers signal stop counting periodic timers signal every time reach specific value restart thus producing signal periodic intervals periodic timers typically used invoke activities must performed regular intervals counters usually programmed fixed intervals determine long counter count signals interval determines long counter count output signal intel 8253 pit original timing device used ibm pc compatibles used 1.193182 mhz clock signal one third color burst frequency used ntsc one twelfth system clock crystal oscillator contains three timers timer 0 used microsoft windows uniprocessor linux system timer timer 1 historically used dynamic random access memory refreshes timer 2 pc speaker lapic newer intel systems offers higher-resolution one microsecond timer used preference pit timer linux kernels starting 2.6.18 | [
4773,
9861,
2503,
3272,
3943,
6797,
4046,
8879,
1425,
5457,
3027,
6129,
7538,
9557,
823,
2523
] | Test |
5,349 | 4 | Topiary_(hacktivist):topiary hacktivist topiary real name jake leslie davis born 27 october 1992 former hacker worked anonymous lulzsec similar hacktivist groups associate internet group anonymous publicly claimed various online attacks including hacking hbgary westboro baptist church gawker also claimed responsibility defacing government websites countries zimbabwe syria tunisia ireland egypt 24 february 2011 topiary gained attention appeared david pakman show informed host anonymous replaced westboro baptist church webpage message anonymous on-air confrontation shirley phelps-roper recording event placed youtube reached one million views five days topiary member lulzsec ran twitter account guardian reported topiary name daniel 14 july 2011 guardian published exclusive interview topiary spoke extensively motivations describing internet denizen passion change said feared tracked authorities hope n't pinned us especially friends lulzsec later full transcript lengthy interview surfaced website freelance guardian journalist ryan gallagher 18-year-old man suspected topiary arrested shetland islands scotland 27 july 2011 31 july 2011 man charged five offences including unauthorised computer access conspiracy carry distributed denial service attack serious organised crime agency website scotland yard later identified man arrested jake davis resident island yell charged unauthorised access computer computer misuse act 1990 encouraging assisting criminal activity serious crime act 2007 conspiracy launch denial-of-service attack serious organised crime unit contrary criminal law act 1977 criminal conspiracy also criminal law act 1977 police confiscated dell laptop 100-gigabyte hard drive 16 different virtual machines hard drive also contained details relating attack sony hundreds thousands email addresses passwords london court released davis bail conditions live curfew mother access internet lawyer gideon cammerman stated client help publicise lulzsec anonymous attacks lacked technical skills anything sympathiser arrest anonymous launched 'free topiary campaign included adding free topiary banner twitter avatars similar free bradley banner davis pleaded guilty 25 june 2012 ddos attacks several websites pleaded guilty two counts encouraging others commit computer offenses fraud davis due tried along ryan cleary ryan ryan ackroyd kayla mustafa al-bassam tflow beginning 8 april 2013 court informed would take 3,000 hours view material ackroyd alone released bail except cleary 8 april 2013 davis appeared court fellow hackers ryan ackroyd ryan cleary mustafa al-bassam four pleaded guilty computer crimes sentenced 14 may 2013 davis faced maximum 10 years prison got 24 months young offenders institute served 38 days electronically tagged 21 months counted sentence | [
1024,
8320,
3843,
5636,
5764,
10502,
2187,
4240,
11152,
10003,
10132,
4117,
8726,
535,
1688,
2717,
9375,
1440,
5024,
9761,
4644,
4133,
5028,
11175,
297,
2857,
5547,
8489,
11052,
9518,
9904,
7601,
1970,
9395,
8886,
1337,
441,
1979,
4027,
1... | None |
5,350 | 0 | Computational_humor:computational humor computational humor branch computational linguistics artificial intelligence uses computers humor research relatively new area first dedicated conference organized 1996 first computer model sense humor suggested suslov early 1992 investigation general scheme information processing shows possibility specific malfunction conditioned necessity quick deletion consciousness false version specific malfunction identified humorous effect psychological grounds exactly corresponds incongruity-resolution theory however essentially new ingredient role timing added well-known role ambiguity biological systems sense humor inevitably develops course evolution biological function consists quickening transmission processed information consciousness effective use brain resources realization algorithm neural networks justifies naturally spencer hypothesis mechanism laughter deletion false version corresponds zeroing part neural network excessive energy neurons thrown motor cortex arousing muscular contractions practical realization algorithm needs extensive databases whose creation automatic regime suggested recently result magistral direction developed properly subsequent investigations accepted somewhat specialized colouring approach analysis humor classification jokes step attempt generate jokes basing rules underlie classification simple prototypes computer pun generation reported early 1990s based natural language generator program vinci graeme ritchie kim binsted 1994 research paper described computer program jape designed generate question-answer-type puns general i.e. non-humorous lexicon program name acronym joke analysis production engine examples produced jape since approach improved latest report dated 2007 describes standup joke generator implemented java programming language standup generator tested children within framework analyzing usability language skills development children communication disabilities e.g. cerebral palsy project name acronym system augment non-speakers dialog using puns allusion standup comedy children responded language playground enthusiasm showed marked improvement certain types language tests two young people used system ten-week period regaled peers staff family neighbors jokes call spicy missile hot shot joy enthusiasm entertaining others inspirational stock strapparava described program generate funny acronyms askthebrain 2002 used clustering bayesian analysis associate concepts comical way statistical machine learning algorithm detect whether sentence contained said double entendre developed kiddon brun 2011 open-source python implementation kiddon brun twss system program recognize knock-knock jokes reported taylor mazlack kind research important analysis human-computer interaction application machine learning techniques distinguishing joke texts non-jokes described mihalcea strapparava 2006 takizawa et al 1996 reported heuristic program detecting puns japanese language possible application assistance language acquisition described section pun generation another envisioned use joke generators cases steady supply jokes quantity important quality another obvious yet remote direction automated joke appreciation known humans interact computers ways similar interacting humans may described terms personality politeness flattery in-group favoritism therefore role humor human-computer interaction investigated particular humor generation user interface ease communications computers suggested craig mcdonough implemented mnemonic sentence generator converts passwords humorous sentences basing incongruity theory humor suggested resulting meaningless funny sentences easier remember example password ajqa3jtv converted arafat joined quayle ant tarar jeopardized thurmond vase john allen paulos known interest mathematical foundations humor book mathematics humor study logic humor demonstrates structures common humor formal sciences mathematics linguistics develops mathematical model jokes based catastrophe theory | [
2440,
1890,
4635,
3528
] | Test |
5,351 | 4 | Veriato:veriato veriato formerly known spectorsoft software company develops sells user behavior analytics employee monitoring software based palm beach gardens located palm beach county florida united states founded 1998 company early entrant internet monitoring software 2008 private equity firms harbourvest partners westview capital partners invested company taking majority ownership position spectorsoft originally serviced consumer business customers longer sells software consumer home use opened west palm beach office london office 2011 2012 spectorsoft acquired assets corner bowl software completely exited consumer market march 31st 2015 moved larger office palm beach gardens 2017 2016 company renamed veriato inc company provider employee monitoring user behavior analytics ransomware detection log management solutions enterprise mid-market small business veriato recon — user behavior analytics solution software detects alerts anomalies related insider threat behaviors also enables review online activity employees high risk exit period veriato 360 — user activity monitoring solution enabling companies retain review report alert employee activity used monitoring higher risk employees incident response provides visibility contextual information veriato investigator — employee investigation solution temporary focused investigations records detailed information employee activity enables exploration playback recorded data veriato log manager — provides event security log management centrally monitors windows unix linux switches routers hubs veriato server manager — adds application resource disk monitoring event log management features found spectorsoft log manager veriato ransomsafe — veriato ransomsafe™ acts vital layer ransomware defense combining just-in-time data protection multiple mechanisms detect shut attacks hold business hostage veriato cerebral — cerebral fully integrated insider threat intelligence platform powered artificial intelligence spector pro given pc magazine editors choice award 2002 review six computer activity monitoring tools 2004 version 5.0 spector pro given editors choice award field four programs 2008 spector 360 sr3 pc magazine editors choice award 2004 spectorsoft listed first time one inc. magazine top 500 fastest-growing private companies america position 224 company achieved position list 2005 number 497 2009 spectorsoft made list inc. 5000 companies number 3340 2010 2011 spectorsoft made inc. magazine 500/5000 list spectorsoft−veriato products mentioned zdnet pc/computing time cnn nbc nightly news new york times wall street journal 2014 spectorsoft sc magazine europe best fraude prevention award best interop 2014 security award spector 360 recon product target audiences spectorsoft−veriato products employers want record activities employees company-owned workstations mobile devices laptops employers may choose monitor employees using spectorsoft−veriato software however still privacy concerns things like personal email spectorsoft addresses privacy issues regularly paper authorized leading privacy attorney available website educators school administrators school districts required protect students online predators cipa ferpa schools use blocking filtering solutions may block sites needed research block new sites yet included filtering solution spector 360 works filters provide additional layer protection also helps keep students on-task providing teachers technology coordinators reports charts show web sites students visit long spent keyword alerts let lab instructors administrators see may violating school acceptable use policy aup spectorsoft−veriato tools especially eblaster used criminal activities several convictions misuse spectorsoft software contains eula specifying installation must machines owned licensee also indicating spectorsoft cooperate law enforcement compelled since spectorsoft−veriato software specifically designed difficult detect remove tools especially eblaster used thieves wish steal credit card information banking information passwords installation software occur without user knowledge permission spectorsoft openly advertise tools record user passwords recorded cases happening parents use spectorsoft−veriato software monitor children internet use spectorsoft marketed spy software people wanting catch spouses cheating however face criminal charges negative publicity spectorsoft longer markets products spouses however nothing stop spouse using products illegally example man michigan installed eblaster partner personal computer charged four felony counts facing five years prison 19,000 fines 2013 texas woman filed criminal complaint estranged husband using eblaster spy facebook e-mail communications patent infringement case helios software llc et al v. spectorsoft corporation concluded september 2014 court granted summary judgment non-infringement ‘ 571 ‘ 237 patents june 2015 five-day trial jury returned verdict direct indirect infringement spectorsoft ‘ 304 patent also found several asserted claims patent invalid anticipated rendered obvious prior art see docket entry 615 civ 12-081-lps | [
3433,
9233,
2151
] | Train |
5,352 | 9 | CDR_coding:cdr coding computer science cdr coding compressed data representation lisp linked lists developed patented mit artificial intelligence laboratory implemented computer hardware number lisp machines derived mit cadr cdr coding fact fairly general idea whenever data object ends reference another data structure b instead place structure b overlapping running end free space required reference add done many times also improve locality reference enhancing performance modern machines transformation especially effective cons-based lists created free half space node perform transformation always possible perform substitution might large enough chunk free space beyond end thus objects end real reference referenced object machine must able tell reading final cell one accomplished inefficiency software use tagged pointers allow pointer final position specifically tagged best done hardware presence mutable objects cdr coding becomes complex reference updated point another object currently object stored field object must relocated along pointers moves typically expensive impossible time cause fragmentation store problem typically avoided using cdr coding immutable data structures unrolled linked lists simpler often higher-performance cdr coding tagged pointers typically less fragmentation short lists cdr coding uses least amount space | [
3512,
4101
] | Test |
5,353 | 4 | IT_Baseline_Protection_Catalogs:baseline protection catalogs baseline protection catalogs it-grundschutz-kataloge baseline protection manual 2005 collection documents german federal office security information technology bsi provide useful information detecting weaknesses combating attacks information technology environment cluster collection encompasses 3000 pages including introduction catalogs serves basis baseline protection certification enterprise baseline protection protection encompasses standard security measures typical systems normal protection needs detection assessment weak points systems often occurs way risk assessment wherein threat potential assessed costs damage system group similar systems investigated individually approach time-intensive expensive protection may rather proceed typical threat applies 80 cases recommend adequate countermeasures way security level achieved viewed adequate cases consequently replace expensive risk assessment cases security needs greater protection used basis action familiarize user manual contains introduction explanations approach baseline protection series concept role definitions glossary component catalogs threat catalogs measures catalogs follow introductory sections forms cross-reference tables supplement collection available federal office security information technology bsi internet platform also find baseline protection guide containing support functions implementing baseline protection procedural detail catalog element identified individual mnemonic laid according following scheme catalog groups named first c stands component measure threat followed layer number affected element finally serial number within layer identifies element component catalog central element contains following five layers overall aspects infrastructure systems networks applications partitioning layers clearly isolates personnel groups impacted given layer layer question first layer addressed management including personnel outsourcing second addressed in-house technicians regarding structural aspects infrastructure layer system administrators cover third layer looking characteristics systems including clients servers private branch exchanges fax machines fourth layer falls within network administrators task area fifth within applications administrator user concerning software like database management systems e-mail web servers individual component follows layout component number composed layer number component located unique number within layer given threat situation depicted short description component examining facts itemization individual threat sources ultimately follows present supplementary information necessary work establish baseline protection necessary measures presented text short illustrations text follows facts life cycle question includes planning design acquisition necessary realization operation selection necessary preventive measures complete depiction individual measures collected list arranged according measures catalog structure rather life cycle process classification measures categories b c z undertaken category measures entry point subject b measures expand category c ultimately necessary baseline protection certification category z measures additional measures proven practice keep component compact possible global aspects collected one component specific information collected second example apache web server general b 5.4 web server component measures threats web server depicted would apply well b5.11 component deals specifically apache web server components must successfully implemented guarantee system security respective measures threats introduced component also relevant components way network individual components arises baseline protection catalogs threat catalogs connection component catalogs offer detail potential threats systems threat catalogs follow general layout layers force majeure organizational deficiencies spurious human action technical failure premeditated acts distinguished according bsi knowledge collected catalogs necessary establish baseline protection baseline protection however demand understanding measures well vigilance management individual threat sources described briefly finally examples damages triggered threat sources given measures catalogs summarize actions necessary achieve baseline protection measures appropriate several system components described centrally process layers used structuring individual measures groups following layers formed infrastructure organization personnel hardware software communication preventive measures managers initially named initiate realize measures respective measures description detailed description measures follows finally control questions regarding correct realization given realization measures personnel verify whether adaptation operation question necessary deviations initial measures documented future reference besides information summarized baseline protection manual federal office data security provides material internet forms provided serve remedy protection needs certain system components table summarizes measures applied individual components regard measure named degree realization determined degrees realization considerable yes partial distinguished finally realization terminated manager named measures realization possible reasons entered adjacent field later traceability conclusion consists cost assessment besides forms cross-reference tables another useful supplement summarize measures important threats individual components measures well threats cited mnemonics measures cited priority classification table contains correlations measures threats address however cross-reference tables cite important threats measure cited given threat applicable individual system superfluous baseline protection ensured measures realized | [
225,
8637,
10600,
4490,
11567,
6360,
4379,
5373,
383
] | Test |
5,354 | 9 | Threaded_code:threaded code computer science term threaded code refers programming technique code form essentially consists entirely calls subroutines often found compiler implementations generate code form and/or implemented form code may processed interpreter may simply sequence machine code call instructions threaded code better code density code generated alternative code generation techniques alternative calling conventions sometimes expense slightly slower execution speed however program small enough fit fully computer processor cache may run faster larger program suffers many cache misses small programs may also run faster programs fill cache switching threads threaded code best known implementation technique commonly used programming languages forth many implementations basic implementations cobol early versions b languages small minicomputers amateur radio satellites common way make computer programs 'translate computer program written symbolic language machine code using compiler code typically fast nonportable since binary code designed specific computer hardware platform different approach uses virtual machine instruction set particular target hardware interpreter executes new target hardware early computers relatively little memory example data general nova ibm 1130 many first apple ii computers 4 kb ram installed consequently lot time spent trying find ways reduce size programs would fit memory available time computers relatively slow simple interpretation noticeably slower executing machine code instead writing every step operation every part program needed programmers saved memory writing step operations see n't repeat placing subroutine processcode refactoringis used today although different reasons top-level application programs may consist nothing subroutine calls many subroutines turn also consist nothing lower level subroutine calls mainframes early microprocessors rca 1802 required several instructions call subroutine top-level application many subroutines sequence constantly repeated subroutine address changing one call next using memory store instructions repeatedly wasteful save space programmers squeezed series subroutine calls list containing contiguous addresses sub-routines used tiny interpreter call subroutine turn identical way programmers squeezed series jumps branch table dispatch table virtual method table list containing destination addresses used small selector branch selected destination threaded code techniques program becomes list entry points actual code executed years programmers created many variations interpreter small selector particular address list addresses may extracted using index general purpose register pointer addresses may direct indirect contiguous non-contiguous linked pointers relative absolute resolved compile time dynamically built one variation best situations save space programmers squeezed lists subroutine calls simple lists subroutine addresses used small loop call subroutine turn example following pseudocode uses technique add two numbers b example list labeled thread variable ip instruction pointer tracks place within list another variable sp stack pointer contains address elsewhere memory available hold value temporarily calling loop codice_1 simple repeated inline end subroutine control jumps end subroutine start another instead jumping twice via codice_1 example called direct threaded code dtc although technique older first widely circulated use term threaded code probably bell article threaded code 1973 charles h. moore invented compact notation 1970 forth virtual machine indirect threaded code itc originally moore invented easy fast nova minicomputers indirection bit every address said published remarks byte magazine forth issue found convenient propagated later forth designs forth compilers compile forth programs direct-threaded code others make indirect-threaded code programs act either way practically executable threaded code uses one another methods invoking subroutines method called threading model addresses thread addresses machine language form simple may overheads thread consists machine addresses parameters must loaded indirectly memory forth systems produce direct-threaded code many machines direct-threading faster subroutine threading see reference example stack machine might execute sequence push push b add might translated following thread routines codice_3 initialized address labeled codice_4 i.e. address codice_5 stored alternatively operands may included thread remove indirection needed makes thread larger indirect threading uses pointers locations turn point machine code indirect pointer may followed operands stored indirect block rather storing repeatedly thread thus indirect code often compact direct-threaded code indirection also typically makes slower though still usually faster bytecode interpreters handler operands include values types space savings direct-threaded code may significant older forth systems typically produce indirect-threaded code example goal execute push push b add following might used codice_3 initialized address codice_7 code fragment codice_8 codice_9 found double-indirecting codice_3 indirect block operands fragment found indirect block following fragment address requires keeping current subroutine codice_3 unlike previous examples contained next subroutine called so-called subroutine-threaded code also call-threaded code consists series machine-language call instructions addresses functions call opposed direct threading use jump early compilers algol fortran cobol forth systems often produced subroutine-threaded code code many systems operated last-in-first-out lifo stack operands well-developed compiler theory modern processors special hardware support subroutine call return instructions overhead one extra machine instruction per dispatch somewhat diminished anton ertl stated contrast popular myths subroutine threading usually slower direct threading however ertl recent tests show subroutine threading faster direct threading 15 25 test cases ertl recent tests show direct threading fastest threading model xeon opteron athlon processors indirect threading fastest threading model pentium processors subroutine threading fastest threading model pentium 4 pentium iii ppc processors example call threading push push b add token threaded code uses lists 8 12-bit indexes table pointers token threaded code notably compact without much special effort programmer usually half three-fourths size threaded-codes quarter eighth size compiled code table pointers either indirect direct forth compilers produce token threaded code programmers consider p-code generated pascal compilers well bytecodes used .net java basic c compilers token-threading common approach historically bytecode uses 8-bit opcodes often stack-based virtual machine typical interpreter known decode dispatch interpreter follows form virtual machine uses byte-size instructions codice_12 simply fetch codice_13 often commonly used 1-byte instructions plus less-common multibyte instructions case codice_12 complex decoding single byte opcodes simply efficiently handled branch table using opcode directly index instructions individual operations simple push add overhead involved deciding execute larger cost actually executing interpreters often much slower machine code however complex compound instructions overhead percentage proportionally less significant huffman threaded code consists lists tokens stored huffman codes huffman code variable length bit string used identify unique token huffman-threaded interpreter locates subroutines using index table tree pointers navigated huffman code huffman threaded code one compact representations known computer program basically index codes organized measuring frequency subroutine occurs code frequent calls given shortest codes operations approximately equal frequencies given codes nearly equal bit-lengths huffman-threaded systems implemented direct-threaded forth systems used pack large amounts slow-running code small cheap microcontrollers published uses smart cards toys calculators watches bit-oriented tokenized code used pbasic seen kind huffman threaded code example string threading operations identified strings usually looked-up hash table used charles h. moore earliest forth implementations university illinois experimental hardware-interpreted computer language also used bashforth examples show branches interpreters branch changes thread pointer codice_3 example conditional branch top-of-stack value zero might encoded follows note codice_16 location jump address handler must skipped codice_17 whether branch taken separating data return stacks machine eliminates great deal stack management code substantially reducing size threaded code dual-stack principle originated three times independently burroughs large systems forth postscript used java virtual machines three registers often present threaded virtual machine another one exists passing data subroutines 'words often threaded virtual machines implementations forth simple virtual machine heart consisting three primitives indirect-threaded virtual machine one given operations perhaps simplest fastest interpreter virtual machine | [
512,
9739,
10395,
1952,
8609,
8868,
6821,
1702,
5677,
1841,
2045,
8628,
9911,
3904,
7616,
8262,
8524,
2638,
1103,
9172,
1376,
10734,
5872,
9714,
3573,
7421
] | Validation |
5,355 | 9 | C_to_HDL:c hdl c hdl tools convert c language c-like computer code hardware description language hdl vhdl verilog converted code synthesized translated hardware device field-programmable gate array compared software equivalent designs hardware consume less power yielding higher performance per watt execute faster lower latency parallelism higher throughput however system design functional verification hardware description language tedious time-consuming systems engineers often write critical modules hdl modules high-level language synthesize hdl c hdl high-level synthesis tools c another name methodology rtl refers register transfer level representation program necessary implement logic early development c hdl done ian page charles sweeney colleagues oxford university 1990s developed handel-c language commercialized research forming embedded solutions limited esl 1999 renamed celoxica september 2000 2008 embedded systems departments celoxica sold catalytic 3 million later merged become agility computing january 2009 mentor graphics acquired agility c synthesis assets celoxica continues trade concentrating hardware acceleration financial industries c hdl techniques commonly applied applications unacceptably high execution times existing general-purpose supercomputer architectures examples include bioinformatics computational fluid dynamics cfd financial processing oil gas survey data analysis embedded applications requiring high performance real-time data processing also area use system-on-chip soc design may also take advantage c hdl techniques c-to-vhdl compilers useful large designs implementing code might change future designing large application entirely hdl may difficult time-consuming abstraction high level language large application often reduce total development time furthermore application coded hdl almost certainly difficult modify one coded higher level language designer needs add new functionality application adding lines c code almost always easier remodeling equivalent hdl code flow hdl tools similar aim flow rather c-based design | [
7699,
9366,
9371,
10658,
4773,
7462,
3886,
2224,
3762,
8508,
6716,
2623,
8514,
4036,
11333,
1480,
4811,
9932,
3159,
11487,
5090,
5861,
1770,
9330,
4596,
11125,
6268,
2045
] | None |
5,356 | 3 | X86-64:x86-64 x86-64 also known x64 x86_64 amd64 intel 64 64-bit version x86 instruction set introduces two new modes operation 64-bit mode compatibility mode along new 4-level paging mode 64-bit mode new paging mode supports vastly larger amounts virtual memory physical memory possible 32-bit predecessors allowing programs store larger amounts data memory x86-64 also expands general-purpose registers 64-bit well extends number 8 limited fixed functionality e.g stack management 16 fully general provides numerous enhancements floating point operations supported via mandatory sse2-like instructions x87/mmx style registers generally used still available even 64-bit mode instead set 32 vector registers 128 bits used store one two double-precision numbers one four single precision numbers various integer formats 64-bit mode instructions modified support 64-bit operands 64-bit addressing mode compatibility mode allows 16- 32-bit user applications run unmodified coexisting 64-bit applications 64-bit operating system supports full x86 16-bit 32-bit instruction sets remain implemented hardware without intervening emulation older executables run little performance penalty newer modified applications take advantage new features processor design achieve performance improvements also processor supporting x86-64 still powers real mode full backward compatibility x86 processors done since 80286 original specification created amd released 2000 implemented amd intel via amd k8 microarchitecture opteron athlon64 processors first implement first significant addition x86 architecture designed company intel intel forced follow suit introduced modified netburst family software-compatible amd specification via technologies introduced x86-64 via isaiah architecture via nano x86-64 architecture distinct intel itanium architecture formerly ia-64 compatible native instruction set level x86 architecture operating systems applications written one run amd64 created alternative radically different ia-64 architecture designed intel hewlett packard originally announced 1999 full specification became available august 2000 amd64 architecture positioned amd beginning evolutionary way add 64-bit computing capabilities existing x86 architecture opposed intel approach creating entirely new 64-bit architecture ia-64 first amd64-based processor opteron released april 2003 amd processors implementing amd64 architecture include opteron athlon 64 athlon 64 x2 athlon 64 fx athlon ii followed x2 x3 x4 indicate number cores xlt models turion 64 turion 64 x2 sempron palermo e6 stepping manila models phenom followed x3 x4 indicate number cores phenom ii followed x2 x3 x4 x6 indicate number cores fx fusion/apu ryzen/epyc primary defining characteristic amd64 availability 64-bit general-purpose processor registers example rax rbx 64-bit integer arithmetic logical operations 64-bit virtual addresses designers took opportunity make improvements well significant changes described although virtual addresses 64 bits wide 64-bit mode current implementations chips known planning stages allow entire virtual address space 2 bytes 16 eb used would approximately four billion times size virtual address space 32-bit machines operating systems applications need large address space foreseeable future implementing wide virtual addresses would simply increase complexity cost address translation real benefit amd therefore decided first implementations architecture least significant 48 bits virtual address would actually used address translation page table lookup addition amd specification requires significant 16 bits virtual address bits 48 63 must copies bit 47 manner akin sign extension requirement met processor raise exception addresses complying rule referred canonical form canonical form addresses run 0 00007fff'ffffffff ffff8000'00000000 ffffffff'ffffffff total 256 tb usable virtual address space still 65,536 times larger virtual 4 gb address space 32-bit machines feature eases later scalability true 64-bit addressing many operating systems including limited windows nt family take higher-addressed half address space named kernel space leave lower-addressed half user space application code user mode stacks heaps data regions canonical address design ensures every amd64 compliant implementation effect two memory halves lower half starts 00000000'00000000 grows upwards virtual address bits become available higher half docked top address space grows downwards also enforcing canonical form addresses checking unused address bits prevents use operating system tagged pointers flags privilege markers etc. use could become problematic architecture extended implement virtual address bits first versions windows x64 even use full 256 tb restricted 8 tb user space 8 tb kernel space windows support entire 48-bit address space windows 8.1 released october 2013 64-bit addressing mode long mode superset physical address extensions pae page sizes may 4 kb 2 bytes 2 mb 2 bytes long mode also supports page sizes 1 gb 2 bytes rather three-level page table system used systems pae mode systems running long mode use four levels page table pae page-directory pointer table extended four entries 512 additional page-map level 4 pml4 table added containing 512 entries 48-bit implementations full mapping hierarchy 4 kb pages whole 48-bit space would take bit 512 gb memory 0.195 256 tb virtual space intel proposed scheme five-level page table implemented would allow intel 64 processors support 57-bit virtual address space operating system also limit virtual address space details applicable given operating system compatibility characteristics section current amd64 processors support physical address space 2 bytes ram 256 tb however known x86-64 motherboards support 256 tb ram operating system may place additional limits amount ram usable supported details point given operating system compatibility characteristics section article architecture two primary modes operation long mode legacy mode long mode architecture intended primary mode operation combination processor native 64-bit mode combined 32-bit 16-bit compatibility mode used 64-bit operating systems 64-bit operating system 64-bit programs run 64-bit mode 32-bit 16-bit protected mode applications need use either real mode virtual 8086 mode order execute time run compatibility mode real-mode programs programs use virtual 8086 mode time run long mode unless modes emulated software however programs may started operating system running long mode processors supporting vt-x amd-v creating virtual processor running desired mode since basic instruction set almost performance penalty executing protected mode x86 code unlike intel ia-64 differences underlying instruction set mean running 32-bit code must done either emulation x86 making process slower dedicated x86 coprocessor however x86-64 platform many x86 applications could benefit 64-bit recompile due additional registers 64-bit code guaranteed sse2-based fpu support compiler use optimization however applications regularly handle integers wider 32 bits cryptographic algorithms need rewrite code handling huge integers order take advantage 64-bit registers legacy mode mode used 32-bit 16-bit protected mode operating systems mode processor acts like older x86 processor 16-bit 32-bit code executed legacy mode allows maximum 32 bit virtual addressing limits virtual address space 4 gb 64-bit programs run legacy mode intel 64 intel implementation x86-64 used implemented various processors made intel historically amd developed produced processors instruction sets patterned intel original designs x86-64 roles reversed intel found position adopting isa amd created extension intel x86 processor line intel project originally codenamed yamhill yamhill river oregon willamette valley several years denying existence intel announced february 2004 idf project indeed underway intel chairman time craig barrett admitted one worst-kept secrets intel name instruction set changed several times name used idf ct presumably clackamas technology another codename oregon river within weeks began referring ia-32e ia-32 extensions march 2004 unveiled official name em64t extended memory 64 technology late 2006 intel began instead using name intel 64 implementation paralleling amd use name amd64 first processor implement intel 64 multi-socket processor xeon code-named nocona june 2004 contrast initial prescott chips february 2004 enable feature intel subsequently began selling intel 64-enabled pentium 4s using e0 revision prescott core sold oem market pentium 4 model f. e0 revision also adds execute disable xd intel name nx bit intel 64 included current xeon code-named irwindale intel official launch intel 64 name em64t time mainstream desktop processors n0 stepping prescott-2m first intel mobile processor implementing intel 64 merom version core 2 processor released july 27 2006 none intel earlier notebook cpus core duo pentium celeron mobile pentium 4 implement intel 64 intel processors implementing intel64 architecture include pentium 4 f-series/5x1 series 506 516 celeron models 3x1 3x6 355 347 352 360 365 later celerons models xeon since nocona models pentium dual-core processors since merom-2m atom 230 330 d410 d425 d510 d525 n450 n455 n470 n475 n550 n570 n2600 n2800 versions pentium pentium extreme edition core 2 core i9 core i7 core i5 core i3 processors xeon phi 7200 series processors via technologies introduced first implementation x86-64 architecture 2008 five years development cpu division centaur technology codenamed isaiah 64-bit architecture unveiled january 24 2008 launched may 29 via nano brand name processor supports number via-specific x86 extensions designed boost efficiency low-power appliances expected isaiah architecture twice fast integer performance four times fast floating-point performance previous-generation via esther equivalent clock speed power consumption also expected par previous-generation via cpus thermal design power ranging 5 w 25 w. completely new design isaiah architecture built support features like x86-64 instruction set x86 virtualization unavailable predecessors via c7 line retaining encryption extensions although nearly identical differences two instruction sets semantics seldom used machine instructions situations mainly used system programming compilers generally produce executables i.e machine code avoid differences least ordinary application programs therefore interest mainly developers compilers operating systems similar must deal individual special system instructions supercomputers tracked top500 appearance 64-bit extensions x86 architecture enabled 64-bit x86 processors amd intel light olive circles red circles diagram provided section respectively replace risc processor architectures previously used systems including pa-risc sparc alpha others well 32-bit x86 green dots purple dots diagram even though intel initially tried unsuccessfully replace x86 new incompatible 64-bit architecture itanium processor main non-x86 cpu architecture still used supercomputing power isa used ibm power microprocessors blue diamond pattern diagram sparc far behind numbers top500 2011 fujitsu sparc64 viiifx based supercomputer without co-processors reached number one since dropped top-10 first arm-based supercomputer appeared list 2018 recent years non-cpu architecture co-processors gpgpu also played big role performance intel xeon phi knights corner coprocessors implement subset x86-64 vector extensions also used along x86-64 processors tianhe-2 supercomputer following operating systems releases support x86-64 architecture long mode preliminary infrastructure work started february 2004 x86-64 port development later stalled development started july 2007 continued google summer code 2008 soc 2009 first official release contain x86-64 support version 2.4 freebsd first added x86-64 support name amd64 experimental architecture 5.1-release june 2003 included standard distribution architecture 5.2-release january 2004 since freebsd designated tier 1 platform 6.0-release version cleaned quirks running x86 executables amd64 drivers work x86 architecture work currently done integrate fully x86 application binary interface abi manner linux 32-bit abi compatibility currently works x86-64 architecture support first committed netbsd source tree june 19 2001 netbsd 2.0 released december 9 2004 netbsd/amd64 fully integrated supported port 32-bit code still supported 64-bit mode netbsd-32 kernel compatibility layer 32-bit syscalls nx bit used provide non-executable stack heap per-page granularity segment granularity used 32-bit x86 openbsd supported amd64 since openbsd 3.5 released may 1 2004 complete in-tree implementation amd64 support achieved prior hardware initial release amd loaned several machines project hackathon year openbsd developers taken platform support nx bit allowed easy implementation w^x feature code amd64 port openbsd also runs intel 64 processors contains cloned use amd64 extensions since intel left page table nx bit early intel 64 processors w^x capability intel cpus later intel 64 processors added nx bit name xd bit symmetric multiprocessing smp works openbsd amd64 port starting release 3.6 november 1 2004 possible enter long mode dos without dos extender user must return real mode order call bios dos interrupts may also possible enter long mode dos extender similar dos/4gw complex since x86-64 lacks virtual 8086 mode dos aware benefits expected unless running dos emulation adequate virtualization driver backend example mass storage interface linux first operating system kernel run x86-64 architecture long mode starting 2.4 version 2001 preceding hardware availability linux also provides backward compatibility running 32-bit executables permits programs recompiled long mode retaining use 32-bit programs several linux distributions currently ship x86-64-native kernels userlands arch linux suse mandriva debian allow users install set 32-bit components libraries installing 64-bit dvd thus allowing existing 32-bit applications run alongside 64-bit os distributions fedora slackware ubuntu available one version compiled 32-bit architecture another compiled 64-bit architecture fedora red hat enterprise linux allow concurrent installation userland components 32 64-bit versions 64-bit system x32 abi application binary interface introduced linux 3.4 allows programs compiled x32 abi run 64-bit mode x86-64 using 32-bit pointers data fields though limits program virtual address space 4 gb also decreases memory footprint program cases allow run faster 64-bit linux allows 128 tb virtual address space individual processes address approximately 64 tb physical memory subject processor system limitations mac os x 10.4.7 higher versions mac os x 10.4 run 64-bit command-line tools using posix math libraries 64-bit intel-based machines versions mac os x 10.4 10.5 run 64-bit powerpc machines libraries frameworks work 64-bit applications mac os x 10.4 kernel kernel extensions 32-bit mac os x 10.5 supports 64-bit gui applications using cocoa quartz opengl x11 64-bit intel-based machines well 64-bit powerpc machines non-gui libraries frameworks also support 64-bit applications platforms kernel kernel extensions 32-bit mac os x 10.6 first version macos supports 64-bit kernel however 64-bit computers run 64-bit kernel 64-bit computers run 64-bit kernel default 64-bit kernel like 32-bit kernel supports 32-bit applications kernels also support 64-bit applications 32-bit applications virtual address space limit 4 gb either kernel os x 10.8 includes 64-bit kernel continues support 32-bit applications 64-bit kernel support 32-bit kernel extensions 32-bit kernel support 64-bit kernel extensions macos uses universal binary format package 32- 64-bit versions application library code single file appropriate version automatically selected load time mac os x 10.6 universal binary format also used kernel kernel extensions support 32-bit 64-bit kernels solaris 10 later releases support x86-64 architecture solaris 10 sparc architecture one operating system image contains 32-bit kernel 64-bit kernel labeled x64/x86 dvd-rom image default behavior boot 64-bit kernel allowing 64-bit existing new 32-bit executables run 32-bit kernel also manually selected case 32-bit executables run codice_24 command used determine system running 64-bit kernel solaris 11 64-bit kernel provided however 64-bit kernel supports 32- 64-bit executables libraries system calls x64 editions microsoft windows client server—windows xp professional x64 edition windows server 2003 x64 edition—were released march 2005 internally actually build 5.2.3790.1830 sp1 share source base operating system binaries even system updates released unified packages much manner windows 2000 professional server editions x86 windows vista also many different editions released january 2007 windows 7 released july 2009 windows server 2008 r2 sold x64 itanium editions later versions windows server offer x64 edition versions windows x64 prior windows 8.1 windows server 2012 r2 offer following windows 8.1 windows server 2012 r2 user mode kernel mode virtual address spaces extended 128 tb versions windows install processors lack codice_17 instruction following additional characteristics apply x64 versions windows playstation 4 xbox one successors incorporate amd x86-64 processors based jaguar microarchitecture firmware games written x86-64 code legacy x86 code involved since amd64 intel 64 substantially similar many software hardware products use one vendor-neutral term indicate compatibility implementations amd original designation processor architecture x86-64 still sometimes used purpose variant x86_64 companies microsoft sun microsystems/oracle corporation use contraction x64 marketing material term ia-64 refers itanium processor confused x86-64 completely different instruction set many operating systems products especially introduced x86-64 support prior intel entry market use term amd64 amd64 refer amd64 intel 64. x86-64/amd64 solely developed amd amd holds patents techniques used amd64 patents must licensed amd order implement amd64 intel entered cross-licensing agreement amd licensing amd patents existing x86 techniques licensing amd patents techniques used x86-64 2009 amd intel settled several lawsuits cross-licensing disagreements extending cross-licensing agreements | [
6151,
6153,
4108,
6158,
10254,
4112,
10258,
19,
8226,
6180,
44,
10284,
2094,
8243,
56,
2105,
8248,
2107,
6207,
8266,
4173,
4174,
6231,
4192,
6243,
10340,
2149,
6245,
4204,
8303,
4217,
8315,
6270,
8322,
2180,
8325,
8327,
10375,
142,
10383,... | None |
5,357 | 2 | Filter_(software):filter software filter computer program subroutine process stream producing another stream single filter used individually frequently strung together form pipeline operating systems unix rich filter programs windows 7 later also rich filters include windows powershell comparison however filters built cmd.exe original command-line interface windows significant enhancements relative similar filter commands available ms-dos os x includes filters underlying unix base also automator allows filters known actions strung together form pipeline unix unix-like operating systems filter program gets data standard input main input stream writes main results standard output main output stream auxiliary input may come command line flags configuration files auxiliary output may go standard error command syntax getting data device file standard input input operator codice_1 similarly send data device file standard output output operator codice_2 append data lines existing output file one use append operator codice_3 filters may strung together pipeline pipe operator codice_4 operator signifies main output command left passed main input command right unix philosophy encourages combining small discrete tools accomplish larger tasks classic filter unix ken thompson doug mcilroy cites ingrained tools outlook irrevocably operating system later tools imitating simplest prints lines containing character string output following example finds registered users foo part username using cut command take first field username line unix system password file passing input grep searches input lines containing character string foo prints output common unix filter programs cat cut grep head sort uniq tail programs like awk sed used build quite complex filters fully programmable unix filters also used data scientists get quick overview file based dataset two standard filters early days dos-based computers find sort examples filters may used batch files *.bat *.cmd etc. use command shell environment many filters available built windows freeware shareware commercial programs number mimic function features filters unix filtering programs graphical user interface gui enable users design customized filter suit special data processing and/or data mining requirements windows command prompt inherited ms-dos commands improved added example windows server 2003 features six command-line filters modifying active directory chained piping dsadd dsget dsmod dsmove dsrm dsquery windows powershell adds entire host filters known cmdlets chained together pipe except simple ones e.g codice_5 following example gets list files codice_6 folder gets size sorts size ascending order shows three filters codice_7 codice_8 codice_9 chained pipes | [
515,
8582,
7175,
9735,
9225,
3856,
10387,
3733,
3222,
3990,
5397,
8341,
11418,
7325,
929,
9507,
7983,
11442,
8644,
333,
9166,
337,
4561,
9298,
6617,
2011,
9053,
8414,
4321,
3562,
4074,
8301,
5492,
4349
] | None |
5,358 | 3 | Instruction_set_architecture:instruction set architecture instruction set architecture isa abstract model computer also referred architecture computer architecture realization isa called implementation isa permits multiple implementations may vary performance physical size monetary cost among things isa serves interface software hardware software written isa run different implementations isa enabled binary compatibility different generations computers easily achieved development computer families developments helped lower cost computers increase applicability reasons isa one important abstractions computing today isa defines everything machine language programmer needs know order program computer isa defines differs isas general isas define supported data types state main memory registers semantics memory consistency addressing modes instruction set set machine instructions comprises computer machine language input/output model instruction set architecture distinguished microarchitecture set processor design techniques used particular processor implement instruction set processors different microarchitectures share common instruction set example intel pentium advanced micro devices athlon implement nearly identical versions x86 instruction set radically different internal designs concept architecture distinct design specific machine developed fred brooks ibm design phase system/360 virtual machines support bytecode isa smalltalk java virtual machine microsoft common language runtime implement translating bytecode commonly used code paths native machine code addition virtual machines execute less frequently used code paths interpretation see just-in-time compilation transmeta implemented x86 instruction set atop vliw processors fashion isa may classified number different ways common classification architectural complexity complex instruction set computer cisc many specialized instructions may rarely used practical programs reduced instruction set computer risc simplifies processor efficiently implementing instructions frequently used programs less common operations implemented subroutines resulting additional processor execution time offset infrequent use types include long instruction word vliw architectures closely related long instruction word liw explicitly parallel instruction computing epic architectures architectures seek exploit instruction-level parallelism less hardware risc cisc making compiler responsible instruction issue scheduling architectures even less complexity studied minimal instruction set computer misc one instruction set computer oisc theoretically important types commercialized machine language built discrete statements instructions processing architecture given instruction may specify complex operations built combining simple instructions executed sequentially otherwise directed control flow instructions examples operations common many instruction sets include processors may include complex instructions instruction set single complex instruction something may take many instructions computers instructions typified instructions take multiple steps control multiple functional units otherwise appear larger scale bulk simple instructions implemented given processor examples complex instructions include complex instructions common cisc instruction sets risc instruction sets risc instruction sets may include well risc instruction sets generally include alu operations memory operands instructions move large blocks memory risc instruction sets include simd vector instructions perform arithmetic operation multiple pieces data time simd instructions ability manipulating large vectors matrices minimal time simd instructions allow easy parallelization algorithms commonly involved sound image video processing various simd implementations brought market trade names mmx 3dnow altivec traditional architectures instruction includes opcode specifies operation perform add contents memory register —and zero operand specifiers may specify registers memory locations literal data operand specifiers may addressing modes determining meaning may fixed fields long instruction word vliw architectures include many microcode architectures multiple simultaneous opcodes operands specified single instruction exotic instruction sets opcode field transport triggered architectures tta operand forth virtual machine 0-operand instruction sets lack operand specifier fields stack machines including nosc conditional instructions often predicate field—a bits encode specific condition cause operation performed rather performed example conditional branch instruction executed branch taken condition true execution proceeds different part program executed branch taken condition false execution continues sequentially instruction sets also conditional moves move executed data stored target location condition true executed target location modified condition false similarly ibm z/architecture conditional store instruction instruction sets include predicate field every instruction called branch predication instruction sets may categorized maximum number operands explicitly specified instructions due large number bits needed encode three registers 3-operand instruction risc architectures 16-bit instructions invariably 2-operand designs atmel avr ti msp430 versions arm thumb risc architectures 32-bit instructions usually 3-operand designs arm avr32 mips power isa sparc architectures instruction specifies number operands registers memory locations immediate values explicitly instructions give one operands implicitly stored top stack implicit register operands given implicitly fewer operands need specified instruction destination operand explicitly specifies destination additional operand must supplied consequently number operands encoded instruction may differ mathematically necessary number arguments logical arithmetic operation arity operands either encoded opcode representation instruction else given values addresses following instruction register pressure measures availability free registers point time program execution register pressure high large number available registers use thus higher register pressure often register contents must spilled memory increasing number registers architecture decreases register pressure increases cost embedded instruction sets thumb suffer extremely high register pressure small register sets general-purpose risc isas like mips alpha enjoy low register pressure cisc isas like x86-64 offer low register pressure despite smaller register sets due many addressing modes optimizations sub-register addressing memory operands alu instructions absolute addressing pc-relative addressing register-to-register spills cisc isas offer size length instruction varies widely little four bits microcontrollers many hundreds bits vliw systems processors used personal computers mainframes supercomputers instruction sizes 8 64 bits longest possible instruction x86 15 bytes 120 bits within instruction set different instructions may different lengths architectures notably reduced instruction set computers risc typically corresponding architecture word size architectures instructions variable length typically integral multiples byte halfword arm thumb-extension mixed variable encoding two fixed usually 32-bit 16-bit encodings instructions mixed freely must switched branch exception boundary armv8 risc instruction set normally fixed instruction length often 4 bytes 32 bits whereas typical cisc instruction set may instructions widely varying length 1 15 bytes x86 fixed-length instructions less complicated handle variable-length instructions several reasons check whether instruction straddles cache line virtual memory page boundary instance therefore somewhat easier optimize speed early computers memory expensive minimizing size program make sure would fit limited memory often central thus combined size instructions needed perform particular task code density important characteristic instruction set computers high code density often complex instructions procedure entry parameterized returns loops etc therefore retroactively named complex instruction set computers cisc however typical frequent cisc instructions merely combine basic alu operation add access one operands memory using addressing modes direct indirect indexed etc. certain architectures may allow two three operands including result directly memory may able perform functions automatic pointer increment etc software-implemented instruction sets may even complex powerful instructions reduced instruction-set computers risc first widely implemented period rapidly growing memory subsystems sacrifice code density simplify implementation circuitry try increase performance via higher clock frequencies registers single risc instruction typically performs single operation add registers load memory location register risc instruction set normally fixed instruction length whereas typical cisc instruction set instructions widely varying length however risc computers normally require often longer instructions implement given task inherently make less optimal use bus bandwidth cache memories certain embedded risc isas like thumb avr32 typically exhibit high density owing technique called code compression technique packs two 16-bit instructions one 32-bit instruction unpacked decode stage executed two instructions minimal instruction set computers misc form stack machine separate instructions 16-64 multiple instructions fit single machine word types cores often take little silicon implement easily realized fpga multi-core form code density misc similar code density risc increased instruction density offset requiring primitive instructions task research executable compression mechanism improving code density mathematics kolmogorov complexity describes challenges limits instructions constituting program rarely specified using internal numeric form machine code may specified programmers using assembly language commonly may generated programming languages compilers design instruction sets complex issue two stages history microprocessor first cisc complex instruction set computer many different instructions 1970s however places like ibm research found many instructions set could eliminated result risc reduced instruction set computer architecture uses smaller set instructions simpler instruction set may offer potential higher speeds reduced processor size reduced power consumption however complex set may optimize common operations improve memory cache efficiency simplify programming instruction set designers reserve one opcodes kind system call software interrupt example mos technology 6502 uses 00 zilog z80 uses eight codes c7 cf d7 df e7 ef f7 ff motorola 68000 use codes range a000..afff fast virtual machines much easier implement instruction set meets popek goldberg virtualization requirements nop slide used immunity-aware programming much easier implement unprogrammed state memory interpreted nop systems multiple processors non-blocking synchronization algorithms much easier implement instruction set includes support something fetch-and-add load-link/store-conditional ll/sc atomic compare-and-swap given instruction set implemented variety ways ways implementing particular instruction set provide programming model implementations instruction set able run executables various ways implementing instruction set give different tradeoffs cost performance power consumption size etc designing microarchitecture processor engineers use blocks hard-wired electronic circuitry often designed separately adders multiplexers counters registers alus etc kind register transfer language often used describe decoding sequencing instruction isa using physical microarchitecture two basic ways build control unit implement description although many designs use middle ways compromises designs use combination hardwired design microcode control unit cpu designs use writable control store—they compile instruction set writable ram flash inside cpu rekursiv processor imsys cjip fpga reconfigurable computing isa also emulated software interpreter naturally due interpretation overhead slower directly running programs emulated hardware unless hardware running emulator order magnitude faster today common practice vendors new isas microarchitectures make software emulators available software developers hardware implementation ready often details implementation strong influence particular instructions selected instruction set example many implementations instruction pipeline allow single memory load memory store per instruction leading load-store architecture risc another example early ways implementing instruction pipeline led delay slot demands high-speed digital signal processing pushed opposite direction—forcing instructions implemented particular way example perform digital filters fast enough mac instruction typical digital signal processor dsp must use kind harvard architecture fetch instruction two data words simultaneously requires single-cycle multiply–accumulate multiplier | [
4098,
6659,
1029,
7173,
7687,
8711,
8715,
8716,
9739,
528,
1042,
2066,
7699,
5655,
10779,
10781,
10786,
36,
6181,
8231,
2088,
10796,
3630,
2097,
6705,
7218,
4156,
1085,
2623,
2113,
7234,
3142,
8262,
74,
4172,
2638,
10837,
2137,
7770,
8795... | Test |
5,359 | 2 | List_of_disk_operating_systems:list disk operating systems list disk operating systems acronym dos used form names many simply referred dos within respective communities | [
6148,
8713,
10508,
7823,
6289,
532,
7959,
2201,
4764,
292,
9006,
689,
178,
8369,
9907,
10676,
4409,
6459,
1853,
7358,
8767,
10818,
10564,
8774,
8902,
9166,
5220,
10475,
8301,
2290,
2933,
4727
] | Test |
5,360 | 9 | Lisp_Machine_Lisp:lisp machine lisp lisp machine lisp programming language dialect language lisp direct descendant maclisp initially developed mid late 1970s system programming language massachusetts institute technology mit lisp machines lisp machine lisp also lisp dialect influence design common lisp lisp machine lisp branched three dialects symbolics named variant zetalisp lisp machines inc. later texas instruments ti explorer would share common code base dialect lisp machine lisp would differ version maintained mit ai lab richard stallman others lisp machine manual describes lisp machine lisp language detail manual popularly termed chine nual full title printed across front back covers letters appeared front name sometimes abbreviated blending two words chinual lisp machine lisp features | [
10752,
11269,
2056,
2062,
9231,
7184,
2577,
9749,
8728,
4633,
4122,
8226,
3119,
7732,
2105,
3132,
6717,
8258,
8771,
8262,
1613,
9299,
10841,
3675,
7267,
2660,
8293,
2666,
5751,
7805,
2179,
1159,
9865,
9877,
5803,
2225,
7867,
4799,
7880,
8... | None |
5,361 | 9 | Maclisp:maclisp maclisp maclisp sometimes styled maclisp maclisp programming language dialect language lisp originated massachusetts institute technology mit project mac derived prefix late 1960s based lisp 1.5 richard greenblatt main developer original codebase pdp-6 jon l. white responsible later maintenance development name maclisp began used early 1970s distinguish forks pdp-6 lisp notably bbn lisp maclisp descendant lisp 1.5 maclisp departs lisp 1.5 using value cell access store dynamic values variables lisp 1.5 used linear search association list determine variable value maclisp variable evaluation faster different variable semantics maclisp also employed reader macros make readable input output termed input/output i/o instead entering codice_1 one could enter codice_2 get s-expression although implementations put functions property list maclisp uses different syntax define functions maclisp also load-on-demand feature maclisp began digital equipment corporation pdp-6 pdp-10 computers running incompatible timesharing system later ported pdp-10 operating systems example timesharing total operating system tops-10 tops-20 original implementation assembly language later implementation multics used pl/i maclisp developed considerably lifetime major features added language systems would typically correspond major release numbers maclisp used implement macsyma computer algebra system cas symbolic algebra program macsyma development also drove several features maclisp shrdlu blocks-world program written maclisp language widespread use artificial intelligence ai research community early 1980s also used implement programming languages planner scheme multics maclisp used implement first lisp-based emacs maclisp influential lisp implementation longer maintained actively runs pdp-10 emulators used experimenting early ai programs maclisp began small fixed number data types cons cell atom later termed symbol integer floating-point number later additions included arrays never first-class data types arbitrary-precision integers bignums strings tuples objects except inums implemented pointers data type determined block memory pointed special case small numbers inums programs could interpreted compiled compiled behavior interpreted except local variables lexical default compiled code unless declared special error checking done inline operations car cdr ncomplr compiler mid-1970s introduced fast numeric support lisp languages generating machine code instructions arithmetic rather calling interpretive routines dispatched data type made lisp arithmetic comparable speed fortran scalar operations though fortran array loop implementation remained much faster original version limited 18-bit word memory address pdp-10 considerable effort expended keeping implementation lean simple multics maclisp far larger address space costly use memory processing power pdp-10 exceeded lisp machine invented lisp machine lisp direct descendant maclisp several lisp dialects also use need unify community resulted modern common lisp language maclisp named project mac unrelated apple macintosh mac computer predates decades various lisp systems macintosh particular similarity maclisp | [
10752,
4097,
4101,
11269,
2056,
2062,
9231,
7184,
2577,
9749,
8728,
4633,
4122,
8226,
3119,
2105,
3132,
6717,
8258,
8771,
8262,
1613,
9299,
10841,
3675,
7267,
2660,
8293,
2666,
6772,
2166,
5751,
1147,
7805,
9345,
1159,
9865,
655,
9877,
47... | Test |
5,362 | 0 | Eloquens_(software):eloquens software eloquens™ text-to-speech software whose first version released 1993 cselt first commercial speech synthesis software able speak italian first commercial product research center cselt field voice technology built diphone-technology aimed reach high computational efficiency result produced voice still robotic natural previous generation voice implemented musa cselt past eloquens applied automatically read timetables italian train stations telephone services provided telecom italia e.g automated address book service nowadays released freeware nowadays typically used spoken comments many youtube videos | [
11042,
3533,
6797,
7983
] | Validation |
5,363 | 3 | Kernel_(operating_system):kernel operating system kernel computer program core computer operating system complete control everything system systems one first programs loaded start-up bootloader handles rest start-up well input/output requests software translating data-processing instructions central processing unit handles memory peripherals like keyboards monitors printers speakers critical code kernel usually loaded separate area memory protected access application programs less critical parts operating system kernel performs tasks running processes managing hardware devices hard disk handling interrupts protected kernel space contrast application programs like browsers word processors audio video players use separate area memory user space separation prevents user data kernel data interfering causing instability slowness well preventing malfunctioning application programs crashing entire operating system kernel interface low-level abstraction layer process makes requests kernel called system call kernel designs differ manage system calls resources monolithic kernel runs operating system instructions address space speed microkernel runs processes user space modularity kernel primary function mediate access computer resources including key aspects necessary resource management definition execution domain address space protection mechanism used mediate access resources within domain kernels also provide methods synchronization inter-process communication ipc implementations may within kernel kernel also rely processes running although kernel must provide inter-process communication order provide access facilities provided kernels must also provide running programs method make requests access facilities kernel full access system memory must allow processes safely access memory require often first step virtual addressing usually achieved paging and/or segmentation virtual addressing allows kernel make given physical address appear another address virtual address virtual address spaces may different different processes memory one process accesses particular virtual address may different memory another process accesses address allows every program behave one apart kernel running thus prevents applications crashing many systems program virtual address may refer data currently memory layer indirection provided virtual addressing allows operating system use data stores like hard drive store would otherwise remain main memory ram result operating systems allow programs use memory system physically available program needs data currently ram cpu signals kernel happened kernel responds writing contents inactive memory block disk necessary replacing data requested program program resumed point stopped scheme generally known demand paging virtual addressing also allows creation virtual partitions memory two disjointed areas one reserved kernel kernel space applications user space applications permitted processor address kernel memory thus preventing application damaging running kernel fundamental partition memory space contributed much current designs actual general-purpose kernels almost universal systems although research kernels e.g singularity take approaches perform useful functions processes need access peripherals connected computer controlled kernel device drivers device driver computer program enables operating system interact hardware device provides operating system information control communicate certain piece hardware driver important vital piece program application design goal driver abstraction function driver translate os-mandated abstract function calls programming calls device-specific calls theory device work correctly suitable driver device drivers used things video cards sound cards printers scanners modems lan cards common levels abstraction device drivers 1 hardware side 2 software side example show user something screen application would make request kernel would forward request display driver responsible actually plotting character/pixel kernel must maintain list available devices list may known advance e.g embedded system kernel rewritten available hardware changes configured user typical older pcs systems designed personal use detected operating system run time normally called plug play plug play system device manager first performs scan different hardware buses peripheral component interconnect pci universal serial bus usb detect installed devices searches appropriate drivers device management os-specific topic drivers handled differently kind kernel design every case kernel provide i/o allow drivers physically access devices port memory location important decisions made designing device management system designs accesses may involve context switches making operation cpu-intensive easily causing significant performance overhead computing system call process requests service operating system kernel normally permission run system calls provide interface process operating system operations interacting system require permissions available user level process e.g i/o performed device present system form communication processes requires use system calls system call mechanism used application program request service operating system use machine-code instruction causes processor change mode example would supervisor mode protected mode operating system performs actions like accessing hardware devices memory management unit generally operating system provides library sits operating system normal programs usually c library glibc windows api library handles low-level details passing information kernel switching supervisor mode system calls include close open read wait write actually perform useful work process must able access services provided kernel implemented differently kernel provide c library api turn invokes related kernel functions method invoking kernel function varies kernel kernel memory isolation use impossible user process call kernel directly would violation processor access control rules possibilities important consideration design kernel support provides protection faults fault tolerance malicious behaviours security two aspects usually clearly distinguished adoption distinction kernel design leads rejection hierarchical structure protection mechanisms policies provided kernel classified according several criteria including static enforced compile time dynamic enforced run time pre-emptive post-detection according protection principles satisfy e.g denning whether hardware supported language based whether open mechanism binding policy many support hierarchical protection domains typically implemented using cpu modes many kernels provide implementation capabilities i.e objects provided user code allow limited access underlying object managed kernel common example occurs file handling file representation information stored permanent storage device kernel may able perform many different operations e.g read write delete execute file contents user level application may permitted perform operations e.g may allowed read file common implementation kernel provide object application typically called file handle application may invoke operations validity kernel checks time operation requested system may extended cover objects kernel manages indeed objects provided user applications efficient simple way provide hardware support capabilities delegate mmu responsibility checking access-rights every memory access mechanism called capability-based addressing commercial computer architectures lack mmu support capabilities alternative approach simulate capabilities using commonly supported hierarchical domains approach protected object must reside address space application access kernel also maintains list capabilities memory application needs access object protected capability performs system call kernel checks whether application capability grants permission perform requested action permitted performs access either directly delegating request another user-level process performance cost address space switching limits practicality approach systems complex interactions objects used current operating systems objects accessed frequently expected perform quickly approaches protection mechanism firmware supported instead simulated higher levels e.g simulating capabilities manipulating page tables hardware direct support possible performance implications lack hardware support may issue however systems choose use language-based protection important kernel design decision choice abstraction levels security mechanisms policies implemented kernel security mechanisms play critical role supporting security higher levels one approach use firmware kernel support fault tolerance see build security policy malicious behavior top adding features cryptography mechanisms necessary delegating responsibility compiler approaches delegate enforcement security policy compiler and/or application level often called language-based security lack many critical security mechanisms current mainstream operating systems impedes implementation adequate security policies application abstraction level fact common misconception computer security security policy implemented application regardless kernel support typical computer systems today use hardware-enforced rules programs allowed access data processor monitors execution stops program violates rule e.g. user process read write kernel memory systems lack support capabilities processes isolated using separate address spaces calls user processes kernel regulated requiring use one above-described system call methods alternative approach use language-based protection language-based protection system kernel allow code execute produced trusted language compiler language may designed impossible programmer instruct something violate security requirement advantages approach include disadvantages include examples systems language-based protection include jx microsoft singularity edsger dijkstra proved logical point view atomic lock unlock operations operating binary semaphores sufficient primitives express functionality process cooperation however approach generally held lacking terms safety efficiency whereas message passing approach flexible number approaches either lower- higher-level available well many modern kernels providing support systems shared memory remote procedure calls idea kernel i/o devices handled uniformly processes parallel co-operating processes first proposed implemented brinch hansen although similar ideas suggested 1967 hansen description common processes called internal processes i/o devices called external processes similar physical memory allowing applications direct access controller ports registers cause controller malfunction system crash depending complexity device devices get surprisingly complex program use several different controllers providing abstract interface manage device important interface normally done device driver hardware abstraction layer frequently applications require access devices kernel must maintain list devices querying system way done bios one various system buses pci/pcie usb application requests operation device displaying character kernel needs send request current active video driver video driver turn needs carry request example inter process communication ipc naturally listed tasks features provided many ways differ design implementation principle separation mechanism policy substantial difference philosophy micro monolithic kernels mechanism support allows implementation many different policies policy particular mode operation instance mechanism may provide user log-in attempts call authorization server determine whether access granted policy may authorization server request password check encrypted password stored database mechanism generic policy could easily changed e.g requiring use security token mechanism policy integrated module minimal microkernel basic policies included mechanisms allows running top kernel remaining part operating system applications decide policies adopt memory management high level process scheduling file system management etc. monolithic kernel instead tends include many policies therefore restricting rest system rely per brinch hansen presented arguments favour separation mechanism policy failure properly fulfill separation one major causes lack substantial innovation existing operating systems problem common computer architecture monolithic design induced kernel mode user mode architectural approach protection technically called hierarchical protection domains common conventional commercial systems fact every module needing protection therefore preferably included kernel link monolithic design privileged mode reconducted key issue mechanism-policy separation fact privileged mode architectural approach melds together protection mechanism security policies major alternative architectural approach capability-based addressing clearly distinguishes two leading naturally microkernel design see separation protection security monolithic kernels execute code address space kernel space microkernels try run services user space aiming improve maintainability modularity codebase kernels fit exactly one categories rather found two designs called hybrid kernels exotic designs nanokernels exokernels available seldom used production systems xen hypervisor example exokernel monolithic kernel os services run along main kernel thread thus also residing memory area approach provides rich powerful hardware access developers unix developer ken thompson maintain easier implement monolithic kernel microkernels main disadvantages monolithic kernels dependencies system components bug device driver might crash entire system fact large kernels become difficult maintain monolithic kernels traditionally used unix-like operating systems contain operating system core functions device drivers traditional design unix systems monolithic kernel one single program contains code necessary perform every kernel-related task every part accessed programs put library kernel space device drivers scheduler memory handling file systems network stacks many system calls provided applications allow access services monolithic kernel initially loaded subsystems may needed tuned point fast faster one specifically designed hardware although relevant general sense modern monolithic kernels linux freebsd fall category unix-like operating systems feature ability load modules runtime thereby allowing easy extension kernel capabilities required helping minimize amount code running kernel space monolithic kernel advantages hinge points work monolithic kernel done via system calls interfaces usually kept tabular structure access subsystem within kernel disk operations essentially calls made within programs checked copy request passed system call hence far travel monolithic linux kernel made extremely small ability dynamically load modules also ease customization fact versions small enough fit together large number utilities programs single floppy disk still provide fully functional operating system one popular mulinux ability miniaturize kernel also led rapid growth use linux embedded systems types kernels consist core functions operating system device drivers ability load modules runtime provide rich powerful abstractions underlying hardware provide small set simple hardware abstractions use applications called servers provide functionality particular approach defines high-level virtual interface hardware set system calls implement operating system services process management concurrency memory management several modules run supervisor mode design several flaws limitations microkernel also abbreviated μk uk term describing approach operating system design functionality system moved traditional kernel set servers communicate minimal kernel leaving little possible system space much possible user space microkernel designed specific platform device ever going needs operate microkernel approach consists defining simple abstraction hardware set primitives system calls implement minimal os services memory management multitasking inter-process communication services including normally provided kernel networking implemented user-space programs referred servers microkernels easier maintain monolithic kernels large number system calls context switches might slow system typically generate overhead plain function calls parts really require privileged mode kernel space ipc inter-process communication basic scheduler scheduling primitives basic memory handling basic i/o primitives many critical parts running user space complete scheduler memory handling file systems network stacks micro kernels invented reaction traditional monolithic kernel design whereby system functionality put one static program running special system mode processor microkernel fundamental tasks performed able access necessarily hardware manage memory coordinate message passing processes systems use micro kernels qnx hurd case qnx hurd user sessions entire snapshots system views referred essence microkernel architecture illustrates advantages micro kernels use message passing system sort handle requests one server another message passing system generally operates port basis microkernel example request memory sent port opened microkernel request sent within microkernel steps similar system calls rationale would bring modularity system architecture would entail cleaner system easier debug dynamically modify customizable users needs performing part operating systems like gnu hurd minix mklinux qnx redox os although micro kernels small combination required auxiliary code fact often larger monolithic kernels advocates monolithic kernels also point two-tiered structure microkernel systems operating system interact directly hardware creates not-insignificant cost terms system efficiency types kernels normally provide minimal services defining memory address spaces inter-process communication ipc process management functions running hardware processes handled directly micro kernels proponents micro kernels point monolithic kernels disadvantage error kernel cause entire system crash however microkernel kernel process crashes still possible prevent crash system whole merely restarting service caused error services provided kernel networking implemented user-space programs referred servers servers allow operating system modified simply starting stopping programs machine without networking support instance networking server started task moving kernel move data various applications servers creates overhead detrimental efficiency micro kernels comparison monolithic kernels disadvantages microkernel exist however disadvantages micro kernels extremely context based example work well small single purpose critical systems many processes need run complications process management effectively mitigated microkernel allows implementation remaining part operating system normal application program written high-level language use different operating systems top unchanged kernel also possible dynamically switch among operating systems one active simultaneously computer kernel grows grows size vulnerability trusted computing base besides reducing security problem enlarging memory footprint mitigated degree perfecting virtual memory system computer architectures virtual memory support reduce kernel footprint extensive editing performed carefully remove unneeded code difficult non-obvious interdependencies parts kernel millions lines code early 1990s due various shortcomings monolithic kernels versus microkernels monolithic kernels considered obsolete virtually operating system researchers result design linux monolithic kernel rather microkernel topic famous debate linus torvalds andrew tanenbaum merit sides argument presented tanenbaum–torvalds debate monolithic kernels designed code address space kernel space developers argue necessary increase performance system developers also maintain monolithic systems extremely efficient well written monolithic model tends efficient use shared kernel memory rather slower ipc system microkernel designs typically based message passing performance microkernels poor 1980s early 1990s however studies empirically measured performance microkernels analyze reasons inefficiency explanations data left folklore assumption due increased frequency switches kernel-mode user-mode increased frequency inter-process communication increased frequency context switches fact guessed 1995 reasons poor performance microkernels might well 1 actual inefficiency whole microkernel approach 2 particular concepts implemented microkernels 3 particular implementation concepts therefore remained studied solution build efficient microkernel unlike previous attempts apply correct construction techniques end hierarchical protection domains architecture leads design monolithic kernel significant performance drawback time interaction different levels protection i.e process manipulate data structure 'user mode 'supervisor mode since requires message copying value mid-1990s researchers abandoned belief careful tuning could reduce overhead dramatically recently newer microkernels optimized performance l4 k42 addressed problems hybrid kernels used commercial operating systems microsoft windows nt 3.1 nt 3.5 nt 3.51 nt 4.0 2000 xp vista 7 8 8.1 10 apple inc macos uses hybrid kernel called xnu based upon code osf/1 mach kernel osfmk 7.3 freebsd monolithic kernel similar micro kernels except include additional code kernel-space increase performance kernels represent compromise implemented developers demonstrated pure micro kernels provide high performance types kernels extensions micro kernels properties monolithic kernels unlike monolithic kernels types kernels unable load modules runtime hybrid kernels micro kernels non-essential code kernel-space order code run quickly would user-space hybrid kernels compromise monolithic microkernel designs implies running services network stack filesystem kernel space reduce performance overhead traditional microkernel still running kernel code device drivers servers user space many traditionally monolithic kernels least adding actively exploiting module capability well known kernels linux kernel modular kernel essentially parts built core kernel binary binaries load memory demand important note code tainted module potential destabilize running kernel many people become confused point discussing micro kernels possible write driver microkernel completely separate memory space test going live kernel module loaded accesses monolithic portion memory space adding needs therefore opening doorway possible pollution advantages modular hybrid kernel modules generally communicate kernel using module interface sort interface generalized although particular given operating system always possible use modules often device drivers may need flexibility module interface affords essentially two system calls often safety checks done monolithic kernel may done twice disadvantages modular approach nanokernel delegates virtually services including even basic ones like interrupt controllers timer device drivers make kernel memory requirement even smaller traditional microkernel exokernels still-experimental approach operating system design differ types kernels functionality limited protection multiplexing raw hardware providing hardware abstractions top develop applications separation hardware protection hardware management enables application developers determine make efficient use available hardware specific program exokernels extremely small however accompanied library operating systems see also unikernel providing application developers functionalities conventional operating system major advantage exokernel-based systems incorporate multiple library operating systems exporting different api example one high level ui development one real-time control strictly speaking operating system thus kernel required run computer programs directly loaded executed bare metal machine provided authors programs willing work without hardware abstraction operating system support early computers operated way 1950s early 1960s reset reloaded execution different programs eventually small ancillary programs program loaders debuggers left memory runs loaded rom developed formed basis became early operating system kernels bare metal approach still used today video game consoles embedded systems general newer computers use modern operating systems kernels 1969 rc 4000 multiprogramming system introduced system design philosophy small nucleus upon operating systems different purposes could built orderly manner would called microkernel approach decade preceding unix computers grown enormously power point computer operators looking new ways get people use spare time machines one major developments era time-sharing whereby number users would get small slices computer time rate appeared connected slower machine development time-sharing systems led number problems one users particularly universities systems developed seemed want hack system get cpu time reason security access control became major focus multics project 1965 another ongoing issue properly handling computing resources users spent time staring terminal thinking input instead actually using resources computer time-sharing system give cpu time active user periods finally systems typically offered memory hierarchy several layers deep partitioning expensive resource led major developments virtual memory systems commodore amiga released 1985 among first certainly successful home computers feature advanced kernel architecture amigaos kernel executive component exec.library uses microkernel message-passing design kernel components like graphics.library direct access hardware memory protection kernel almost always running user mode special actions executed kernel mode user-mode applications ask operating system execute code kernel mode design phase unix programmers decided model every high-level device file believed purpose computation data transformation instance printers represented file known location data copied file printed systems provide similar functionality tended virtualize devices lower level devices files would instances lower level concept virtualizing system file level allowed users manipulate entire system using existing file management utilities concepts dramatically simplifying operation extension paradigm unix allows programmers manipulate files using series small programs using concept pipes allowed users complete operations stages feeding file chain single-purpose tools although end result using smaller programs way dramatically increased flexibility well ease development use allowing user modify workflow adding removing program chain unix model operating system consists two parts first huge collection utility programs drive operations second kernel runs programs unix programming standpoint distinction two fairly thin kernel program running supervisor mode acts program loader supervisor small utility programs making rest system provide locking i/o services programs beyond kernel n't intervene user space years computing model changed unix treatment everything file byte stream longer universally applicable although terminal could treated file byte stream printed read seem true graphical user interface networking posed another problem even network communication compared file access low-level packet-oriented architecture dealt discrete chunks data whole files capability computers grew unix became increasingly cluttered code also modularity unix kernel extensively scalable kernels might 100,000 lines code seventies eighties kernels modern unix successors like linux 13 million lines modern unix-derivatives generally based module-loading monolithic kernels examples linux kernel many distributions well berkeley software distribution variant kernels freebsd dragonflybsd openbsd netbsd macos apart alternatives amateur developers maintain active operating system development community populated self-written hobby kernels mostly end sharing many features linux freebsd dragonflybsd openbsd netbsd kernels and/or compatible apple first launched classic mac os 1984 bundled macintosh personal computer apple moved nanokernel design mac os 8.6 modern macos originally named mac os x based darwin uses hybrid kernel called xnu created combining 4.3bsd kernel mach kernel microsoft windows first released 1985 add-on ms-dos dependence another operating system initial releases windows prior windows 95 considered operating environment confused operating system product line continued evolve 1980s 1990s windows 9x series adding 32-bit addressing pre-emptive multitasking ended release windows 2000 microsoft also developed windows nt operating system similar interface intended high-end business users line started release windows nt 3.1 1993 introduced general users release windows xp october 2001—replacing windows 9x completely different much sophisticated operating system line continues windows 10 architecture windows nt kernel considered hybrid kernel kernel contains tasks window manager ipc managers client/server layered subsystem model supervisory program supervisor computer program usually part operating system controls execution routines regulates work scheduling input/output operations error actions similar functions regulates flow work data processing system historically term essentially associated ibm line mainframe operating systems starting os/360 operating systems supervisor generally called kernel 1970s ibm abstracted supervisor state hardware resulting hypervisor enabled full virtualization i.e capacity run multiple operating systems machine totally independently hence first system called virtual machine vm although mach developed carnegie mellon university 1985 1994 best-known general-purpose microkernel microkernels developed specific aims l4 microkernel family mainly l3 l4 kernel created demonstrate microkernels necessarily slow newer implementations fiasco pistachio able run linux next l4 processes separate address spaces additionally qnx microkernel principally used embedded systems open-source software minix originally created educational purposes focussed highly reliable self-healing microkernel os | [
6148,
6155,
6158,
2064,
4113,
2066,
8209,
25,
10273,
6180,
6186,
4151,
8248,
4153,
59,
8259,
69,
8268,
6221,
86,
89,
10333,
4192,
97,
4194,
4201,
8298,
2168,
2178,
2179,
132,
10376,
10382,
144,
2196,
6296,
2201,
10394,
6300,
6301,
10397... | Test |
5,364 | 1 | NuoDB:nuodb nuodb database company based cambridge massachusetts founded 2008 nuodb recognized gartner magic quadrant technology used dassault systèmes kodiak uae exchange alfa systems firm founded 2008 nimbusdb changed name nuodb 2011 company co-founders barry s. morris became company ceo jim starkey nuodb based cambridge massachusetts nuodb patented elastically scalable database patent filed march 8 2011 approved july 17 2012 u.s. patent 8,224,860 states inventor jim starkey 2012 firm received 12 million total venture capital 2013 gartner listed nuodb niche player magic quadrant operational database management systems boston business journal mass high tech named nuodb one 2014 innovation stars february 2014 nuodb announced extension series b funding round led dassault systèmes round added 14.2 million company funding morgenthaler ventures hummer winblad venture partners longworth venture partners participated round 2015 gartner listed nuodb time visionary magic quadrant operational database management systems morris company founding ceo became executive chairman july 2015 bob walmsley previously executive vice president sales services promoted ceo nuodb raised 17 million financing round 2016 existing investors including dassault systèmes hummer winblad venture partners longworth venture partners morgenthaler ventures time company raised total 59.7 million funding causesquare announced partnership nuodb 2017 nuodb became official database social engagement platform connects causes organizations donors volunteers nuodb elastic sql database cloud applications nuodb database sql compliant called newsql distributed object architecture works cloud means new server added order scale-out database database runs faster database scales without sharding database distributes tasks amongst several processors avoid bottlenecks data uses peer-to-peer messaging route tasks nodes acid compliant database uses tiered approach — comprising multiple redundant tiers transaction engines te storage managers sm approach helps scale data predictably cloud nuodb domains consist several redundant tes sms run platform adding database capacity done adding tes sms nuodb 2.6 release added support active-active database deployments across multiple amazon web services aws availability zones unlike database systems nuodb makes possible expand databases adding servers rather simply replacing hardware system designed align – expand upon – ibm computer scientist edgar f. codd ’ 12 rules relational databases adds ability run anywhere elastic scalability nonstop availability single logical database distributed security system process 1 million transactions per second available free developer version community edition professional paid version enterprise version community edition expanded january 31 2017 enable scale-out across multiple hosts | [
8640,
10048,
2980,
6950,
10413,
10286,
10389,
7802,
5403
] | Test |
5,365 | 9 | ATS_(programming_language):ats programming language ats applied type system programming language designed unify programming formal specification ats support combining theorem proving practical programming use advanced type systems past version computer language benchmarks game demonstrated performance ats comparable c c++ programming languages using theorem proving strict type checking compiler detect prove implemented functions susceptible bugs division zero memory leaks buffer overflow forms memory corruption verifying pointer arithmetic reference counting program compiles additionally using integrated theorem-proving system ats ats/lf programmer may make use static constructs intertwined operative code prove function attains specification ats derived mostly ml ocaml programming languages earlier language dependent ml author incorporated language latest version ats1 anairiats released v0.2.12 2015-01-20 first version ats2 postiats released september 2013 primary focus ats support theorem proving combination practical programming theorem proving one prove instance implemented function produce memory leaks also prevents bugs might otherwise found testing incorporates system similar proof assistants usually aim verify mathematical proofs—except ats uses ability prove implementations functions operate correctly produce expected output simple example function using division programmer may prove divisor never equal zero preventing division zero error let say divisor x computed 5 times length list one prove case non-empty list x non-zero since x product two non-zero numbers 5 length practical example would proving reference counting retain count allocated block memory counted correctly pointer one know quite literally prove object deallocated prematurely memory leaks occur benefit ats system since theorem proving occurs strictly within compiler effect speed executable program ats code often harder compile standard c code compiles programmer certain running correctly degree specified proofs assuming compiler runtime system correct ats proofs separate implementation possible implement function without proving programmer desires according author hongwei xi ats efficiency largely due way data represented language tail-call optimizations generally important efficiency functional programming languages data stored flat unboxed representation rather boxed representation codice_1 expresses predicates algebraic types predicates pseudo‑code somewhat similar ats source see valid ats source ats code fact int int proof type non tail-recursive factorial proposition theorem proving construction dataprop evaluation fact1 n-1 returns pair proof_n_minus_1 result_of_n_minus_1 used calculation fact1 n proofs express predicates proposition fact n r implies fact n r remember dataprop fact int int note int x also int x monovalued type int x value fun fact n nat n n int n r int fact n r int r implement main0 argc argv added single file compiled follows compilation work various back end c compilers e.g gcc garbage collection used unless explicitly stated -d_ats_gcats compiles gives expected result val x int char 15 c // x.0 15 x.1 c' '| separator functions return wrapped result value evaluation predicates ... universal quantification sortdef nat int 0 // prelude ∀ ∈ int ... // .. ∀ b ∈ type ... fun ype ptr_get0 l addr pf l p ptr l l case+ val+ type+ viewtype+ ... dataviews often declared encode recursively defined relations linear resources nowiki dataview array_v viewt ype+ int addr /nowiki datatypes lists dataviewtype similar datatype linear dataviewtype programmer allowed explicitly free deallocate safe manner memory used storing constructors associated dataviewtype local variables stack array allocation see val var declarations | [
2304,
9345,
1474,
5796,
7487,
369,
9490,
4791,
9432,
7386,
2045,
6239
] | Test |
5,366 | 4 | Cyber_Security_Agency_(Singapore):cyber security agency singapore cyber security agency singapore csa singaporean government agency prime minister office administratively managed ministry communications information provides centralised oversight national cyber security functions works public private sector leads protect singapore ’ critical services energy banking sectors formed 1 april 2015 agency also engages various industries stakeholders heighten cyber security awareness well ensure development singapore ’ cyber security headed ministry defence deputy secretary technology david koh minister-in-charge s. iswaran ministry communications information cyber security agency took functions previously carried singapore infocomm technology security authority sitsa ministry home affairs sitsa set 2009 national specialist authority overseeing operational security csa also took roles undertaken then-infocomm development authority ida singapore computer emergency response team facilitates detection resolution prevention security-related incidents internet agency builds upon government ’ cyber security capabilities include strategy policy development cyber security operations industry development outreach well public communications engagement organised events singapore international cyber week sicw 2016 5,000 attendees close 50 countries sicw also saw launch singapore ’ cybersecurity strategy second edition sicw held 18 21 september 2017 singapore also host 2nd asean ministerial conference cybersecurity year october 2016 prime minister launched singapore ’ cybersecurity strategy aim create resilient trusted cyber environment singapore four pillars underpin strategy part singapore cybersecurity strategy internet access civil servants work station cut-off david koh chief executive newly formed cyber security agency said officials realised much data secure way secure attack surface like building zillion windows doors fire escapes security experts commented move may raise defense cyber attack slightly risk damaging productivity civil servants working four dozen statutory boards cutting people serve | [
10190
] | Test |
5,367 | 8 | Hierarchical_Cluster_Engine_Project:hierarchical cluster engine project hierarchical cluster engine hce foss complex solution construct custom network mesh distributed network cluster structure several relations types nodes formalize data flow processing goes upper node level central source point nodes backward formalize management requests handling multiple source points support native reducing multiple nodes results aggregation duplicates elimination sorting internally support powerful full-text search engine data storage provide transactions-less transactional requests processing support flexible run-time changes cluster infrastructure many languages bindings client-side integration apis one product build c++ language project became successor associative search machine asm full-text web search engine project developed 2006 2012 ioix ukraine set applications used construct different distributed solutions like remote processes execution management data processing including text mining nlp web sites crawling including incremental periodic flexible adaptive scheduling rss feeds custom structured web sites data scraping include pre-defined custom scrapers xpath templates sequential optimized scraping algorithms web-search engine complete cycle including crawling scraping distributed search index based sphinx indexing engine corporate integrated full-text search based distributed sphinx engine index many another applied solutions similar business logic heart main component hce project hce-node application application integrates complete set base functionality support network infrastructure hierarchical cluster construction full-text search system integration hce application area hierarchical cluster engine hce-node roles cluster structure internally hce-node application contains seven basic handler threads handler acts special black-box messages processor/dispatcher used combination work one five different roles node dtm dc applications provided set functional tests demo operations automation scripts based linux shell bundle distribution provided zip archive needs environmental support get functionality ready linux os daemon application implements business-logic functionality distributed web crawler document data processor based dtm application main functionality hce-node drce functional object functionality uses web crawling processing another related tasks isolated session executable modules common business logic encapsulation also crawler contains raw contents storage subsystem based file system customized support key-value storage sql application uses several drce clusters construct network infrastructure mysql sqlite back-end indexed data sites urls contents configuration properties well key-value data storage processed contents pages documents additionally administrative user interface web-application available manage easy flexible way also ui implements several automation data collect process algorithms using schedules aggregation scraped data several projects creation data archives exporting data external sql database custom schema many statistical reports periodic data crawling scraping activity many linux os multi-thread daemon application implements business-logic functionality tasks management uses drce cluster execution environment manage tasks remote processes implements general management operations distributed tasks scheduling execution state check os resources monitoring application used parallel tasks execution state monitoring hierarchical network cluster infrastructure custom nodes connection schema multipurpose application aimed cover needs projects big data computations distributed data processing multi-host data processing os system resources balancing limitations supports several balancing modes including multicast random round-robin system resource usage algorithms also provides high level state check statistics diagnostic automation based natural hierarchy relations nodes supports messages routing tasks data balancing method tasks management set different role functionality separated console applications united chains get sequential data processing server-side functionality used self-sufficient tools utilities designed get common functional units typical web projects need get huge data web another sources pars convert process supports unified input-output interface json format messages interaction first implementation utilities application highlighter utility get fast parallel multi-algorithmic textual patterns highlighting provides cli ui works filter console tool uses json format protocol messages input output interaction highlight algorithm text processing gets search query string textual context input returns textual content marks entrances patterns search query additional stat information patterns usually lexical words depend stemming tokenizing processes complex constructions several pre-configured vm images vmware virtualbox uploaded get start process faster user name “ root ” password target user dts archive “ hce ” password vm files zipped gnu general public license version 2 | [
8554,
8644,
7983
] | None |
5,368 | 3 | Industry_Standard_Architecture:industry standard architecture industry standard architecture isa 16-bit internal bus ibm pc/at similar computers based intel 80286 immediate successors 1980s bus largely backward compatible 8-bit bus 8088-based ibm pc including ibm pc/xt well ibm pc compatibles originally referred pc/at-bus also termed i/o channel ibm isa term coined retronym competing pc-clone manufacturers late 1980s early 1990s reaction ibm attempts replace at-bus new incompatible micro channel architecture 16-bit isa bus also used 32-bit processors several years attempt extend 32 bits called extended industry standard architecture eisa successful however later buses vesa local bus pci used instead often along isa slots mainboard derivatives bus structure still used ata/ide pcmcia standard compact flash pc/104 bus internally within super i/o chips isa bus developed team led mark dean ibm part ibm pc project 1981 compaq created term industry standard architecture isa replace pc compatible isa originated 8-bit system 16-bit version ibm bus introduced release ibm pc/at 1984 1988 32-bit extended industry standard architecture eisa standard proposed gang nine group pc-compatible manufacturers included compaq process retroactively renamed bus isa avoid infringing ibm trademark pc/at computer ibm designed 8-bit version buffered interface motherboard buses intel 8088 16/8 bit cpu ibm pc pc/xt 16-bit version upgrade motherboard buses intel 80286 cpu used ibm isa bus therefore synchronous cpu clock sophisticated buffering methods implemented chipsets interface isa much faster cpus isa designed connect peripheral cards motherboard allows bus mastering first 16 mb main memory addressable original 8-bit bus ran 4.77 mhz clock 8088 cpu ibm pc pc/xt original 16-bit bus ran cpu clock 80286 ibm pc/at computers 6 mhz first models 8 mhz later models ibm rt pc also used 16-bit bus isa also used non-ibm compatible machines motorola 68k-based apollo 68020 amiga 3000 68030 workstations short-lived hobbit later powerpc-based bebox companies like dell improved bus performance 1987 ibm replaced bus proprietary micro channel architecture mca mca overcame many limitations apparent isa also effort ibm regain control pc architecture pc market mca far advanced isa many features would later appear pci however mca also closed standard whereas ibm released full specifications circuit schematics isa computer manufacturers responded mca developing extended industry standard architecture eisa later vesa local bus vlb vlb used electronic parts originally intended mca component manufacturers already equipped manufacture eisa vlb backwards-compatible expansions isa bus users isa-based machines know special information hardware adding system handful devices essentially plug-n-play rare users frequently configure parameters adding new device irq line i/o address dma channel mca done away complication pci actually incorporated many ideas first explored mca though directly descended eisa trouble configuration eventually led creation isa pnp plug-n-play system used combination modifications hardware system bios operating system software automatically manage resource allocations reality isa pnp could troublesome become well-supported architecture final days pci slots first physically-incompatible expansion ports directly squeeze isa motherboard first motherboards largely isa including pci slots mid-1990s two slot types roughly balanced isa slots soon minority consumer systems microsoft pc 99 specification recommended isa slots removed entirely though system architecture still required isa present vestigial way internally handle floppy drive serial ports etc. software compatible lpc bus created isa slots remained years towards turn century common see systems accelerated graphics port agp sitting near central processing unit array pci slots one two isa slots near end late 2008 even floppy disk drives serial ports disappearing extinction vestigial isa lpc bus chipsets horizon pci slots rotated compared isa counterparts—pci cards essentially inserted upside-down allowing isa pci connectors squeeze together motherboard one two connectors used slot time allowed greater flexibility attachment ata hard disk interface directly descended 16-bit isa pc/at ata origins hardcards integrated hard disk drive hdd hard disk controller hdc onto one card best awkward worst damaging motherboard isa slots designed support heavy devices hdds next generation integrated drive electronics drives moved drive controller drive bay used ribbon cable simple interface board connect isa slot ata basically standardization arrangement plus uniform command structure software interface hdc within drive ata since separated isa bus connected directly local bus usually integration chipset much higher clock rates data throughput isa could support ata clear characteristics 16-bit isa 16-bit transfer size signal timing pio modes interrupt dma mechanisms pc/xt-bus eight-bit isa bus used intel 8086 intel 8088 systems ibm pc ibm pc xt 1980s among 62 pins demultiplexed electrically buffered versions 8 data 20 address lines 8088 processor along power lines clocks read/write strobes interrupt lines etc power lines included −5 v ±12 v order directly support pmos enhancement mode nmos circuits dynamic rams among things xt bus architecture uses single intel 8259 pic giving eight vectorized prioritized interrupt lines four dma channels originally provided intel 8237 3 dma channels brought xt bus expansion slots 2 normally already allocated machine functions diskette drive hard disk controller pc/at-bus 16-bit 80286- version pc/xt bus introduced ibm pc/at bus officially termed i/o channel ibm extends xt-bus adding second shorter edge connector in-line eight-bit xt-bus connector unchanged retaining compatibility 8-bit cards second connector adds four additional address lines total 24 8 additional data lines total 16 also adds new interrupt lines connected second 8259 pic connected one lines first 4 × 16-bit dma channels well control lines select 8- 16-bit transfers 16-bit bus slot originally used two standard edge connector sockets early ibm pc/at machines however popularity at-architecture 16-bit isa bus manufacturers introduced specialized 98-pin connectors integrated two sockets one unit found almost every at-class pc manufactured mid-1980s isa slot connector typically black distinguishing brown eisa connectors white pci connectors motherboard devices dedicated irqs present slots 16-bit devices use either pc-bus pc/at-bus irqs therefore possible connect 6 devices use one 8-bit irq 5 devices use one 16-bit irq time 4 devices may use one 8-bit dma channel 3 devices use one 16-bit dma channel originally bus clock synchronous cpu clock resulting varying bus clock frequencies among many different ibm clones market sometimes high 16 20 mhz leading software electrical timing problems certain isa cards bus speeds designed later motherboards integrated chipsets used separate clock generator clock divider either fixed isa bus frequency 4 6 8 mhz allowed user adjust frequency via bios setup used higher bus frequency isa cards certain hercules-compatible video cards instance could show significant performance improvements memory address decoding selection 8 16-bit transfer mode limited 128 kib sections leading problems mixing 8- 16-bit cards could co-exist 128 kib area memcs16 line required set based value la17-23 isa still used today specialized industrial purposes 2008 iei technologies released modern motherboard intel core 2 duo processors addition special i/o features equipped two isa slots marketed industrial military users invested expensive specialized isa bus adaptors available pci bus versions similarly adek industrial computers releasing motherboard early 2013 intel core i3/i5/i7 processors contains one non-dma isa slot pc/104 bus used industrial embedded applications derivative isa bus utilizing signal lines different connectors lpc bus replaced isa bus connection legacy i/o devices recent motherboards physically quite different lpc looks like isa software peculiarities isa 16 mib dma limit corresponds full address space intel 80286 cpu used original ibm likely stick around explained history section isa basis development ata interface used ata a.k.a ide recently serial ata sata hard disks physically ata essentially simple subset isa 16 data bits support exactly one irq one dma channel 3 address bits isa subset ata adds two ide address select chip select lines unique signal lines specific ata/ide hard disks cable select/spindle sync line addition physical interface channel ata goes beyond far outside scope isa also specifying set physical device registers implemented every ata ide drive full set protocols device commands controlling fixed disk drives using registers ata device registers accessed using address bits address select signals ata physical interface channel operations ata hard disks performed using ata-specified protocols ata command set earliest versions ata standard featured simple protocols basic command set comparable command sets mfm rll controllers preceded ata controllers latest ata standards much complex protocols instruction sets include optional commands protocols providing advanced optional-use features sizable hidden system storage areas password security locking programmable geometry translation deviation isa ata isa bus remained locked single standard clock rate backward hardware compatibility ata interface offered many different speed modes could select among match maximum speed supported attached drives kept adding faster speeds later versions ata standard 133 mb/s ata-6 latest forms ata ran much faster isa provided connected directly local bus faster isa bus 16-bit ata/ide interface 8-bit xt-ide also known xta interface hard disks nearly popular ata become xt-ide hardware fairly hard find xt-ide adapters available 8-bit isa cards xta sockets also present motherboards amstrad later xt clones well short-lived line philips units xta pinout similar ata eight data lines two address lines used physical device registers completely different meanings hard drives seagate st351a/x could support either type interface selected jumper many later successor motherboards integrated hard drive interface relied separate hard drive interface plugged isa/eisa/vlb slot even 80486 based units shipped mfm/rll interfaces drives instead increasingly common at-ide commodore built xt-ide based peripheral hard drive memory expansion unit a590 amiga 500 500+ computers also supported scsi drive at-ide type interfaces entered keyboard-cased amiga line upon introduction a600 a1200 integrated interface 44 pin connector many owners removed 2,5 inch bracket installed 3,5 inch drive adapter cable pcmcia specification seen superset ata standard pcmcia hard disk interfaces included pcmcia flash drives allows mutual configuration port drive ata mode de facto extension pcmcia flash drives additionally allow simple ata mode enabled pulling single pin low pcmcia hardware firmware unnecessary use ata drive connected ata port pcmcia flash drive ata adapters thus simple inexpensive guaranteed work every standard pcmcia flash drive adapters used generic pcmcia ports pcmcia interface much complex ata although modern computers physical isa buses ibm compatible computers — x86 x86-64 non-mainframe non-embedded — isa buses allocated physical address space embedded controller chips southbridge cpus provide services temperature monitoring voltage readings buses isa devices ieee started standardization isa bus 1985 called p996 specification however despite even books published p996 specification never officially progressed past draft status still existing user base old computers isa cards still manufactured e.g usb ports complete single board computers based modern processors usb 3.0 sata | [
5368,
3201,
6913,
8707,
4228,
11627,
6150,
7151,
780,
274,
6419,
4244,
533,
6806,
9723,
408,
8090,
7452,
799,
4641,
2594,
2723,
4642,
5629,
1958,
8487,
11169,
6187,
1324,
7215,
7983,
8625,
2994,
3769,
3272,
8136,
8909,
4047,
5457,
10833,
... | Test |
5,369 | 2 | Ubuntu_Mobile:ubuntu mobile ubuntu mobile internet device edition discontinued ubuntu distribution planned run intel mobile internet device platform x86 mobile computers based intel atom processor planned use gnome framework hildon basis gui equipment producers would able customize distributions including options flash java custom interfaces ubuntu mobile stopped development 2009 successor ubuntu phones announced january 2 2013 according canonical ubuntu mobile would provide uncompromised web 2.0 experience include features web browsing email media camera voip instant messaging gps blogging digital tv games contacts calendars regular software updates designed fully operable using simple touchscreen interface june 2008 ubuntu mobile 8.04 released ubuntu mobile ended active development 2009 9.10 alpha 6 mark shuttleworth announced ubuntu 14.04 ubuntu support smartphones tablets smart tvs smart screens car head units smartwatches resulted successor ubuntu touch project announced january 2 2013 | [
11271,
546,
9253,
11305,
3626,
5677,
7727,
56,
59,
4673,
3654,
1101,
7246,
1107,
7253,
1110,
3162,
607,
4192,
10851,
3685,
9320,
6763,
9324,
10860,
2671,
3189,
8315,
5755,
8316,
8829,
11388,
11391,
8837,
8326,
10394,
6301,
673,
3745,
3245... | None |
5,370 | 2 | Boot_image_control:boot image control boot image control strategy common way reduce total cost ownership organizations large numbers similar computers used users common needs e.g large corporation government agency considered part enterprise application integration larger shops use term since applications part boot image modify boot image desktop os windows vista includes tools boot image control displacing third party tools mac os always flexible handling boot drives simplifying control reducing need move boot images around drives increasingly boot image control network operating system function often large computer vendor required explain bid response rfp intend simplify purchaser boot image control problems attendant service costs total cost ownership correlates strongly total number different images total number computers major cost concern three basic strategies commonly advised organizations closely track control set common standards acquisition new computer hardware typically practice thin client strategy strategy reduce total cost operations depends several factors departmental boot image strategy seems flexible complexity creating managing several large boot images determining department needs upgrade applications easily outweigh especially users object try subvert discipline waiting regular boot turn upgrade machines user allowed discipline soon degrades effectively bunch home computer whose issues really diagnosable comparable situation thin clients may become practical answer many organizations use thin clients applications require high security involve unreliable users repurpose older machines continued use much simplifies boot image control facilitating centralized management computers many advantages control images simpler disadvantages thin clients many organizations try gain advantages thin clients without disadvantages treating many standard machines terminals much greater capabilities buy new computers put demanding applications administrators perform regular often bi-annual boot turn re-images many older off-spec machines new hardware deployed higher-end use procedure called cascading oldest hardware repurposed simpler software let continue use less demanding access-controlled applications subjects much rigorous control minimize number images total cost operations correlates strongly total number different images total number computers minimize number images requires additional discipline desktop computing increasingly relying web services making thin client approach viable departmental boot images may remain simply instantiate part semantic service-oriented architecture especially larger organizations service component architecture would simplify implementation control mechanisms especially single application language like java used custom applications enterprise importantly shift software service large vendors means applications tied machines number variant boot images required applications installed reduced open configuration technologies bitfrost openid even xmpp would also simplify configuration boot images authentication would longer dealt desktop/laptop device large system vendors increasingly provide dvds boot image standard machine shipped customer usually includes tools diagnose changes machine download drivers | [
10020,
11108,
5677,
3086,
7983,
5296,
6514,
467,
10938,
7515
] | None |
5,371 | 7 | Citrix_Systems:citrix systems citrix systems inc. american multinational software company provides server application desktop virtualization networking software service saas cloud computing technologies citrix solutions claimed use 400,000 clients worldwide including 99 fortune 100 98 fortune 500 company founded richardson texas 1989 ed iacobucci served chairman departure 2000 began developing remote access products microsoft operating systems licensing source code microsoft partnership company throughout history 1990s citrix came prominence industry leader thin client technology enabling purpose-built devices access remote servers resources company launched first initial public offering 1995 competitors experienced large revenue increases 1995 1999 citrix acquired sequoia software corp. 2001 expertcity provider remote desktop products 2003 followed dozen acquisitions 2005 2012 allowed citrix expand server desktop virtualization cloud computing infrastructure service software service offerings 2014 citrix acquired framehawk used technology improve delivery virtual desktops applications wireless networks 2016 part us 1.8 billion product deal logmein citrix spun goto product line new business entity entitled getgo 2017 citrix completed merger getgo logmein products citrix corporate headquarters fort lauderdale florida santa clara california subsidiary operations california massachusetts additional development centers australia canada denmark germany india united kingdom citrix january 2018 reported revenue continuing operations 2.82 billion fiscal year 2017 compared 2.74 billion fiscal year 2016 3 increase april 2017 company employed approximately 8,100 employees worldwide citrix founded richardson texas 1989 former ibm developer ed iacobucci 3 million funding following initial setup development iacobucci moved company former home coral springs florida company first employees five engineers ibm iacobucci convinced join team iacobucci served chairman company roger roberts became ceo citrix 1990 citrix originally named citrus changed name existing company claimed trademark rights citrix name portmanteau citrus unix company first product citrix multiuser extension os/2 developed two years citrix licensed os/2 source code microsoft developed independent computing architecture ica protocol citrix multiuser multiuser allowed multiple users working separate computers remote access software server even computers built run os/2 three days product launched 1991 microsoft announced would switching os/2 windows switch made multiuser nearly unusable without significant changes make compatible windows dos company discussed closing 1991 investments intel microsoft kleiner perkins caufield byers among others allowed company work new version multiuser multi-win version 2.0 released 1992 compatible dos applications allowed five users 1993 citrix released new remote applications server winview ability run dos windows applications 1994 company yearly revenue equaled us 10 million company launched winframe multi-user operating system based microsoft windows nt 1995 new product allowed 15 users first thin client windows citrix initial public offering december 1995 company share price doubled 15 30 mid-1990s citrix became leader growing industry competitors company revenues doubled year year 1995 1999 following weeks discussions iacobucci able persuade microsoft agree license citrix technology windows nt server 4.0 resulted windows terminal server edition 1998 agreement allowed citrix keep position marketplace nt 4.0 compatible citrix also earned 75 million agreement along royalty arrangement valued approximately 100 million citrix released metaframe 1.0 conjunction terminal server edition due weaknesses microsoft remote desktop protocol rdp terminal server edition worked best using ica protocol developed citrix found metaframe meant citrix technology purchased installed machines running terminal server edition 1997 company opened new headquarters fort lauderdale florida also opened offices sydney london paris year 1998 mark templeton became ceo citrix serving vice president marketing also 1998 licensed ica protocol ibm key tronics citrix licensed ica protocol motorola use digital wireless handsets 1999 1999 thin-client model citrix used became software trend company customers increased 15 million major clients included sears chevron sudden drop stocks 2000 led iacobucci leaving company ceo mark templeton demoted president senior executive officer templeton later reinstated 2001 2001 citrix acquired sequoia software corp. 185 million year released metaframe xp new platform using metaframe technology later rebranded citrix presentation server 2005 july 9 2002 citrix announced 10 job cut time company employed 1,900 workers announcement stock hit five-year low citrix acquired expertcity provider remote desktop products december 2003 225 million cash stock acquisition largest company date acquisition citrix gained expertcity existing products gotomypc gotoassist expertcity became citrix online division company 2004 company introduced citrix gotomeeting 2005 2012 company acquired dozen companies allowed expand new markets citrix acquired acceleration hardware maker netscaler 2005 allowed company offer optimized application delivery company entered server desktop virtualization market purchase xensource august 2007 citrix expanded cloud infrastructure service iaas offerings august 2010 acquisition vmlogix february 2011 citrix entered european software service saas market acquisition netviewer 2007 company opened headquarters silicon valley 2008 company changed name presentation server product line xenapp also 2008 citrix announced expanded alliance microsoft desktop virtualization solutions january 29 2009 citrix announced 460 employee positions would cut comprising 10 workforce august 2010 citrix announced partnership google bring company products chrome os devices july 14 2015 citrix added full support windows 10 desktop virtualization products company became leader iaas acquisition cloud.com provider cloud infrastructure companies july 2011 citrix began offering vdi-in-a-box small medium businesses acquisition kaviza may 2011 company acquired technology cloud-based file sharing storage purchase sharefile october 2011 may 2012 citrix acquired virtual computer maker intelligent desktop virtualization technology used company xenclient enterprise edition citrix entered mobile video telecom markets june 2012 company acquired bytemobile also 2012 company acquired zenprise zenprise mobile application management mam technology released xenmobile february 2013 citrix acquired framehawk january 2014 order use company technology improve delivery virtual desktops applications wireless networks including cellular speed quality may poor may 2014 citrix acquired scalextreme bolster cloud capabilities core business unit xendesktop xenapp auto scaling patching automation complex deployments cloud january 29 2015 citrix announced 700 full-time 200 contractor positions would eliminated constituted 10 workforce cuts expected save 90 100 million year two hundred layoffs occurred fort lauderdale florida company headquartered company 10,081 employees february 2015 december 2015 citrix employed approximately 9,500 people noted november restructure due eliminate nearly 700 full-time jobs december 31 2018 citrix approximately 8,200 employees citrix reported net income 251.7 million 2014 339.5 million 2013 july 2015 company announced several changes board directors including robert calderoni becoming executive chairman adding jesse cohn senior partner activist hedge fund elliott management month company announced president ceo mark templeton would retire replacement found october 21 company named executive chairman robert calderoni interim president ceo january 2016 kirill tatarinov former microsoft executive named president ceo citrix joined company board calderoni remained executive chairman board july 2016 part deal boston-based saas company logmein citrix announced spun goto product line included gotomeeting gotowebinar gotowebcast gototraining gotoassist gotomypc wholly owned subsidiary called getgo february 2017 citrix completed merger getgo became subsidiary logmein transaction valued approximately 1.8 billion david henshall became company ceo july 2017 also 2017 citrix expanded partnership google may google announced would add support run citrix xenapp chrome web browser including graphics processing unit acceleration july companies announced working allow citrix cloud deploy virtualized apps desktops google cloud october 2017 citrix told regulators plans lay staff across functions consolidate offices fall 2017 2018 company carried layoffs raleigh north carolina office closures santa barbara california tempe arizona citrix unveiled citrix analytics security software 2017 citrix synergy conference orlando florida may 2017 software detects responds security threats relying artificial intelligence 2018 citrix changed names products represent shift cloud operating model company stated made name changes present unified product line end users create manage deploy workspaces apps data single console company dropped xen netscaler brand names xenapp xendesktop became citrix virtual apps desktops xenmobile became citrix endpoint management sharefile integration became citrix content collaboration xenserver became citrix hypervisor cedexis became citrix intelligent traffic management netscaler products kept identities yet netscaler brand name replaced citrix citrix governed ten member board directors citrix headquarters fort lauderdale florida santa clara california united states offices california north carolina citrix research development centers located u.s. australia india japan greece united kingdom citrix organized three units workspace services delivery network mobility apps citrix licenses services products directly clients including professionals smes companies called value-added resellers resell products services adding additional features citrix publicly traded ticker symbol ctxs 2014 company ranked 741 fortune 1000 1,793 forbes global 2000 citrix revenue 2015 equaled us 3.28 billion increase 3.14 billion 2014 2.91 billion 2013 citrix expanded added new technologies services number mergers acquisitions first acquisition datapac 1997 citrix purchased order utilize datapac technology position asia-pacific region major acquisitions include expertcity 2004 netscaler 2005 xensource 2007 sharefile 2011 2015 citrix acquired nearly 50 companies november 2018 citrix paid 200m acquire sapho software startup develops micro apps workers citrix creates software allows individuals enterprise work collaborate remotely regardless device network main areas company works desktop apps desktop service daas networking cloud software service saas citrix offers number products related desktop application virtualization tools allow access windows desktops applications independently machine actually device operating system citrix xenapp provides application virtualization integrated part xendesktop citrix xendesktop citrix vdi-in-a-box xenclient provide desktop virtualization desktopplayer mac allows online offline access windows virtual desktops macs citrix workspace cloud platform building delivering desktops applications cloud sharefile allows companies organizations sync share files xenmobile offers mobile app device management citrix receiver client software allows universal access virtual applications desktops appdna software provides application migration management citrix technology enables service providers provide desktop service daas offerings customers including business apps desktops products include worx mobile apps secure email browser document sharing citrix workspace suite mobile workspaces citrix products related cloud computing networking include citrix xenserver server virtualization netscaler brand network appliances including wan optimization devices software-defined wan delivery equipment application delivery controllers adc gateways appfirewall web application firewall managed cloud management software citrix cloud company also bytemobile adaptive traffic management aims optimize mobile video services traffic management policy control caching bytemobile insight provides mobile data subscriber analytics citrix software service saas products focused collaboration communications offerings include podio cloud-based collaboration service openvoice provides audio conferencing company philanthropic activities include corporate giving—such corporate donations in-kind gifts—and employee match programs addition citrix employees allowed take two paid volunteer days year participate company annual global day impact —an event encourages citrix employees volunteer local communities near fort lauderdale headquarters citrix provided business training non-profit teams particular company helped local non-profit organization launch computer wheels offer training low-income neighborhoods 2007 company connected broward county florida neighborhood agogo ghana donated technology training furthermore company raleigh office began program called project code 2014 leads youth local boys girls clubs coding exercises teaches computer science addition philanthropic activities citrix donated open-source technology non-profit software organizations continue development gain contributors citrix gave cloudstack apache foundation 2012 xen hypervisor linux foundation 2013 | [
9863,
4490,
7563,
7820,
2189,
6797,
5371,
8976,
5394,
8466,
2201,
1948,
10782,
5535,
8865,
2339,
3235,
11301,
4011,
6318,
7983,
10926,
10417,
1970,
6834,
2228,
9655,
10747,
10809,
5178,
5437,
8515,
11333,
1350,
2118,
11463,
9929,
331,
3660,... | Test |
5,372 | 4 | XKMS:xkms xml key management specification xkms uses web services framework make easier developers secure inter-application communication using public key infrastructure pki xml key management specification protocol developed w3c describes distribution registration public keys services access xkms compliant server order receive updated key information encryption authentication xkms consists two parts x-krss defines protocols needed register public key information x-krss generate key material making key recovery easier created manually x-kiss outlines syntax applications use delegate tasks needed process key information element xml signature trust service cases goal xkms allow complexity traditional pki implementations offloaded client external service approach originally suggested diffie hellman new directions paper generally considered impractical time leading commercial development focusing certificate based approach proposed loren kohnfelder team developed original xkms proposal submitted w3c included warwick ford phillip hallam-baker editor brian lamacchia architectural approach closely related mit pgp key server originally created maintained brian lamacchia realization xml closely related saml first edition also edited hallam-baker time xkms proposed security infrastructure defined entirely new soap protocol web services result large part xkms specification concerned definition security 'bindings specific web services protocols | [
10020,
5254,
8459,
3629,
10831,
8468,
10486,
479
] | None |
5,373 | 4 | Information_security:information security information security sometimes shortened infosec practice protecting information mitigating information risks part information risk management typically involves preventing least reducing probability unauthorized/inappropriate access use disclosure disruption deletion/destruction corruption modification inspection recording devaluation although may also involve reducing adverse impacts incidents information may take form e.g electronic physical. tangible e.g paperwork intangible e.g knowledge information security primary focus balanced protection confidentiality integrity availability data also known cia triad maintaining focus efficient policy implementation without hampering organization productivity largely achieved structured risk management process involves standardize discipline academics professionals collaborate offer guidance policies industry standards password antivirus software firewall encryption software legal liability security awareness training forth standardization may driven wide variety laws regulations affect data accessed processed stored transferred destroyed however implementation standards guidance within entity may limited effect culture continual improvement n't adopted core information security information assurance act maintaining confidentiality integrity availability cia information ensuring information compromised way critical issues arise issues include limited natural disasters computer/server malfunction physical theft paper-based business operations still prevalent requiring set information secuy practices enterprise digital initiatives increasingly emphasized information assurance typically dealt information technology security specialists specialists apply information security technology often form computer system worthwhile note computer necessarily mean home desktop computer device processor memory devices range non-networked standalone devices simple calculators networked mobile computing devices smartphones tablet computers security specialists almost always found major enterprise/establishment due nature value data within larger businesses responsible keeping technology within company secure malicious cyber attacks often attempt acquire critical private information gain control internal systems field information security grown evolved significantly recent years offers many areas specialization including securing networks allied infrastructure securing applications databases security testing information systems auditing business continuity planning electronic record discovery digital forensics information security professionals stable employment 80 percent professionals change employer employment period year number professionals projected continuously grow 11 percent annually 2014 2019 information security threats come many different forms common threats today software attacks theft intellectual property identity theft theft equipment information sabotage information extortion people experienced software attacks sort viruses worms phishing attacks trojan horses common examples software attacks theft intellectual property also extensive issue many businesses information technology field identity theft attempt act someone else usually obtain person personal information take advantage access vital information social engineering theft equipment information becoming prevalent today due fact devices today mobile prone theft also become far desirable amount data capacity increases sabotage usually consists destruction organization website attempt cause loss confidence part customers information extortion consists theft company property information attempt receive payment exchange returning information property back owner ransomware many ways help protect attacks one functional precautions conduct periodical user awareness number one threat organisation users internal employees also called insider threats governments military corporations financial institutions hospitals non-profit organisations private businesses amass great deal confidential information employees customers products research financial status confidential information business customers finances new product line fall hands competitor black hat hacker business customers could suffer widespread irreparable financial loss well damage company reputation business perspective information security must balanced cost gordon-loeb model provides mathematical economic approach addressing concern individual information security significant effect privacy viewed differently various cultures possible responses security threat risk since early days communication diplomats military commanders understood necessary provide mechanism protect confidentiality correspondence means detecting tampering julius caesar credited invention caesar cipher c. 50 b.c. created order prevent secret messages read message fall wrong hands however part protection achieved application procedural handling controls sensitive information marked indicate protected transported trusted persons guarded stored secure environment strong box postal services expanded governments created official organizations intercept decipher read reseal letters e.g. u.k. secret office founded 1653 mid-nineteenth century complex classification systems developed allow governments manage information according degree sensitivity example british government codified extent publication official secrets act 1889 time first world war multi-tier classification systems used communicate information various fronts encouraged greater use code making breaking sections diplomatic military headquarters encoding became sophisticated wars machines employed scramble unscramble information volume information shared allied countries second world war necessitated formal alignment classification systems procedural controls arcane range markings evolved indicate could handle documents usually officers rather enlisted troops stored increasingly complex safes storage facilities developed enigma machine employed germans encrypt data warfare successfully decrypted alan turing regarded striking example creating using secured information procedures evolved ensure documents destroyed properly failure follow procedures led greatest intelligence coups war e.g. capture u-570 end twentieth century early years twenty-first century saw rapid advancements telecommunications computing hardware software data encryption availability smaller powerful less expensive computing equipment made electronic data processing within reach small business home user computers quickly became interconnected internet rapid growth widespread use electronic data processing electronic business conducted internet along numerous occurrences international terrorism fueled need better methods protecting computers information store process transmit academic disciplines computer security information assurance emerged along numerous professional organizations sharing common goals ensuring security reliability information systems various definitions information security suggested summarized different sources cia triad confidentiality integrity availability heart information security members classic infosec triad—confidentiality integrity availability—are interchangeably referred literature security attributes properties security goals fundamental aspects information criteria critical information characteristics basic building blocks however debate continues whether cia triad sufficient address rapidly changing technology business requirements recommendations consider expanding intersections availability confidentiality well relationship security privacy principles accountability sometimes proposed pointed issues non-repudiation fit well within three core concepts 1992 revised 2002 oecd guidelines security information systems networks proposed nine generally accepted principles awareness responsibility response ethics democracy risk assessment security design implementation security management reassessment building upon 2004 nist engineering principles information technology security proposed 33 principles derived guidelines practices 1998 donn parker proposed alternative model classic cia triad called six atomic elements information elements confidentiality possession integrity authenticity availability utility merits parkerian hexad subject debate amongst security professionals 2011 open group published information security management standard o-ism3 standard proposed operational definition key concepts security elements called security objectives related access control 9 availability 3 data quality 1 compliance technical 4 2009 dod software protection initiative released three tenets cybersecurity system susceptibility access flaw capability exploit flaw neither models widely adopted information security confidentiality property information made available disclosed unauthorized individuals entities processes similar privacy two words n't interchangeable rather confidentiality component privacy implements protect data unauthorized viewers examples confidentiality electronic data compromised include laptop theft password theft sensitive emails sent incorrect individuals information security data integrity means maintaining assuring accuracy completeness data entire lifecycle means data modified unauthorized undetected manner thing referential integrity databases although viewed special case consistency understood classic acid model transaction processing information security systems typically provide message integrity alongside confidentiality information system serve purpose information must available needed means computing systems used store process information security controls used protect communication channels used access must functioning correctly high availability systems aim remain available times preventing service disruptions due power outages hardware failures system upgrades ensuring availability also involves preventing denial-of-service attacks flood incoming messages target system essentially forcing shut realm information security availability often viewed one important parts successful information security program ultimately end-users need able perform job functions ensuring availability organization able perform standards organization stakeholders expect involve topics proxy configurations outside web access ability access shared drives ability send emails executives oftentimes understand technical side information security look availability easy fix often requires collaboration many different organizational teams network operations development operations incident response policy/change management successful information security team involves many different key roles mesh align cia triad provided effectively law non-repudiation implies one intention fulfill obligations contract also implies one party transaction deny received transaction party deny sent transaction important note technology cryptographic systems assist non-repudiation efforts concept core legal concept transcending realm technology instance sufficient show message matches digital signature signed sender private key thus sender could sent message nobody else could altered transit data integrity alleged sender could return demonstrate digital signature algorithm vulnerable flawed allege prove signing key compromised fault violations may may lie sender assertions may may relieve sender liability assertion would invalidate claim signature necessarily proves authenticity integrity sender may repudiate message authenticity integrity pre-requisites non-repudiation certified information systems auditor cisa review manual 2006 provides following definition risk management risk management process identifying vulnerabilities threats information resources used organization achieving business objectives deciding countermeasures take reducing risk acceptable level based value information resource organization two things definition may need clarification first process risk management ongoing iterative process must repeated indefinitely business environment constantly changing new threats vulnerabilities emerge every day second choice countermeasures controls used manage risks must strike balance productivity cost effectiveness countermeasure value informational asset protected risk analysis risk evaluation processes limitations since security incidents occur emerge context rarity uniqueness give rise unpredictable threats analysis phenomena characterized breakdowns surprises side-effects requires theoretical approach able examine interpret subjectively detail incident risk likelihood something bad happen causes harm informational asset loss asset vulnerability weakness could used endanger cause harm informational asset threat anything man-made act nature potential cause harm likelihood threat use vulnerability cause harm creates risk threat use vulnerability inflict harm impact context information security impact loss availability integrity confidentiality possibly losses lost income loss life loss real property pointed possible identify risks possible eliminate risk remaining risk called residual risk risk assessment carried team people knowledge specific areas business membership team may vary time different parts business assessed assessment may use subjective qualitative analysis based informed opinion reliable dollar figures historical information available analysis may use quantitative analysis research shown vulnerable point information systems human user operator designer human iso/iec 27002:2005 code practice information security management recommends following examined risk assessment broad terms risk management process consists given risk management choose accept risk based upon relative low value asset relative low frequency occurrence relative low impact business leadership may choose mitigate risk selecting implementing appropriate control measures reduce risk cases risk transferred another business buying insurance outsourcing another business reality risks may disputed cases leadership may choose deny risk selecting implementing proper security controls initially help organization bring risk acceptable levels control selection follow based risk assessment controls vary nature fundamentally ways protecting confidentiality integrity availability information iso/iec 27001 defined controls different areas organizations implement additional controls according requirement organization iso/iec 27002 offers guideline organizational information security standards administrative controls consist approved written policies procedures standards guidelines administrative controls form framework running business managing people inform people business run day-to-day operations conducted laws regulations created government bodies also type administrative control inform business industry sectors policies procedures standards guidelines must followed – payment card industry data security standard pci dss required visa mastercard example examples administrative controls include corporate security policy password policy hiring policies disciplinary policies administrative controls form basis selection implementation logical physical controls logical physical controls manifestations administrative controls paramount importance logical controls also called technical controls use software data monitor control access information computing systems passwords network host-based firewalls network intrusion detection systems access control lists data encryption examples logical controls important logical control frequently overlooked principle least privilege requires individual program system process granted access privileges necessary perform task blatant example failure adhere principle least privilege logging windows user administrator read email surf web violations principle also occur individual collects additional access privileges time happens employees job duties change employees promoted new position employees transferred another department access privileges required new duties frequently added onto already existing access privileges may longer necessary appropriate physical controls monitor control environment work place computing facilities also monitor control access facilities include doors locks heating air conditioning smoke fire alarms fire suppression systems cameras barricades fencing security guards cable locks etc separating network workplace functional areas also physical controls important physical control frequently overlooked separation duties ensures individual complete critical task example employee submits request reimbursement also able authorize payment print check applications programmer also server administrator database administrator roles responsibilities must separated one another information security must protect information throughout lifespan initial creation information final disposal information information must protected motion rest lifetime information may pass many different information processing systems many different parts information processing systems many different ways information information systems threatened fully protect information lifetime component information processing system must protection mechanisms building layering overlapping security measures called defense depth contrast metal chain famously strong weakest link defense depth strategy aims structure one defensive measure fail measures continue provide protection recall earlier discussion administrative controls logical controls physical controls three types controls used form basis upon build defense depth strategy approach defense depth conceptualized three distinct layers planes laid one top additional insight defense depth gained thinking forming layers onion data core onion people next outer layer onion network security host-based security application security forming outermost layers onion perspectives equally valid provides valuable insight implementation good defense depth strategy important aspect information security risk management recognizing value information defining appropriate procedures protection requirements information information equal information requires degree protection requires information assigned security classification first step information classification identify member senior management owner particular information classified next develop classification policy policy describe different classification labels define criteria information assigned particular label list required security controls classification factors influence classification information assigned include much value information organization old information whether information become obsolete laws regulatory requirements also important considerations classifying information information systems audit control association isaca business model information security also serves tool security professionals examine security systems perspective creating environment security managed holistically allowing actual risks addressed type information security classification labels selected used depend nature organization examples employees organization well business partners must trained classification schema understand required security controls handling procedures classification classification particular information asset assigned reviewed periodically ensure classification still appropriate information ensure security controls required classification place followed right procedures access protected information must restricted people authorized access information computer programs many cases computers process information must also authorized requires mechanisms place control access protected information sophistication access control mechanisms parity value information protected sensitive valuable information stronger control mechanisms need foundation access control mechanisms built start identification authentication access control generally considered three steps identification authentication authorization identification assertion someone something person makes statement hello name john doe making claim however claim may may true john doe granted access protected information necessary verify person claiming john doe really john doe typically claim form username entering username claiming person username belongs authentication act verifying claim identity john doe goes bank make withdrawal tells bank teller john doe claim identity bank teller asks see photo id hands teller driver license bank teller checks license make sure john doe printed compares photograph license person claiming john doe photo name match person teller authenticated john doe claimed similarly entering correct password user providing evidence he/she person username belongs three different types information used authentication strong authentication requires providing one type authentication information two-factor authentication username common form identification computer systems today password common form authentication usernames passwords served purpose increasingly inadequate usernames passwords slowly replaced supplemented sophisticated authentication mechanisms time-based one-time password algorithms person program computer successfully identified authenticated must determined informational resources permitted access actions allowed perform run view create delete change called authorization authorization access information computing services begins administrative policies procedures policies prescribe information computing services accessed conditions access control mechanisms configured enforce policies different computing systems equipped different kinds access control mechanisms may even offer choice different access control mechanisms access control mechanism system offers based upon one three approaches access control may derived combination three approaches non-discretionary approach consolidates access control centralized administration access information resources usually based individuals function role organization tasks individual must perform discretionary approach gives creator owner information resource ability control access resources mandatory access control approach access granted denied basing upon security classification assigned information resource examples common access control mechanisms use today include role-based access control available many advanced database management systems simple file permissions provided unix windows operating systems group policy objects provided windows network systems kerberos radius tacacs simple access lists used many firewalls routers effective policies security controls must enforceable upheld effective policies ensure people held accountable actions u.s. treasury guidelines systems processing sensitive proprietary information example states failed successful authentication access attempts must logged access information must leave type audit trail also need-to-know principle needs effect talking access control principle gives access rights person perform job functions principle used government dealing difference clearances even though two employees different departments top-secret clearance must need-to-know order information exchanged within need-to-know principle network administrators grant employee least amount privileges prevent employees accessing supposed need-to-know helps enforce confidentiality-integrity-availability triad need-to-know directly impacts confidential area triad information security uses cryptography transform usable information form renders unusable anyone authorized user process called encryption information encrypted rendered unusable transformed back original usable form authorized user possesses cryptographic key process decryption cryptography used information security protect information unauthorized accidental disclosure information transit either electronically physically information storage cryptography provides information security useful applications well including improved authentication methods message digests digital signatures non-repudiation encrypted network communications older less secure applications telnet file transfer protocol ftp slowly replaced secure applications secure shell ssh use encrypted network communications wireless communications encrypted using protocols wpa/wpa2 older less secure wep wired communications itu‑t g.hn secured using aes encryption x.1035 authentication key exchange software applications gnupg pgp used encrypt data files email cryptography introduce security problems implemented correctly cryptographic solutions need implemented using industry-accepted solutions undergone rigorous peer review independent experts cryptography length strength encryption key also important consideration key weak short produce weak encryption keys used encryption decryption must protected degree rigor confidential information must protected unauthorized disclosure destruction must available needed public key infrastructure pki solutions address many problems surround key management terms reasonable prudent person due care due diligence used fields finance securities law many years recent years terms found way fields computing information security u.s. federal sentencing guidelines make possible hold corporate officers liable failing exercise due care due diligence management information systems business world stockholders customers business partners governments expectation corporate officers run business accordance accepted business practices compliance laws regulatory requirements often described reasonable prudent person rule prudent person takes due care ensure everything necessary done operate business sound business principles legal ethical manner prudent person also diligent mindful attentive ongoing due care business field information security harris offers following definitions due care due diligence due care steps taken show company taken responsibility activities take place within corporation taken necessary steps help protect company resources employees nowiki due diligence /nowiki continual activities make sure protection mechanisms continually maintained operational attention made two important points definitions first due care steps taken show means steps verified measured even produce tangible artifacts second due diligence continual activities means people actually things monitor maintain protection mechanisms activities ongoing organizations responsibility practicing duty care applying information security duty care risk analysis standard docra provides principles practices evaluating risk considers parties could affected risks docra helps evaluate safeguards appropriate protecting others harm presenting reasonable burden increased data breach litigation companies must balance security controls compliance mission software engineering institute carnegie mellon university publication titled governing enterprise security ges implementation guide defines characteristics effective security governance include incident response plan group policies dictate organizations reaction cyber attack security breach identified plan initiated important note legal implications data breach knowing local federal laws critical every plan unique needs organization involve skill set part team example lawyer may included response plan help navigate legal implications data breach mentioned every plan unique plans include following good preparation includes development incident response team skills need used team would penetration testing computer forensics network security etc team also keep track trends cybersecurity modern attack strategies training program end users important well modern attack strategies target users network part incident response plan identifies security event end user reports information admin notices irregularities investigation launched incident log crucial part step members team updating log ensure information flows fast possible identified security breach occurred next step activated phase irt works isolate areas breach took place limit scope security event phase important preserve information forensically analyzed later process containment could simple physically containing server room complex segmenting network allow spread virus threat identified removed affected systems could include using deleting malicious files terminating compromised accounts deleting components events require step however important fully understand event moving step help ensure threat completely removed stage systems restored back original operation stage could include recovery data changing user access information updating firewall rules policies prevent breach future executing step system could still vulnerable future security threats step information gathered process used make future decisions security step crucial ensure future events prevented using information train admins critical process step also used process information distributed entities experienced security event change management formal process directing controlling alterations information processing environment includes alterations desktop computers network servers software objectives change management reduce risks posed changes information processing environment improve stability reliability processing environment changes made objective change management prevent hinder necessary changes implemented change information processing environment introduces element risk even apparently simple changes unexpected effects one management many responsibilities management risk change management tool managing risks introduced changes information processing environment part change management process ensures changes implemented inopportune times may disrupt critical business processes interfere changes implemented every change needs managed kinds changes part everyday routine information processing adhere predefined procedure reduces overall level risk processing environment creating new user account deploying new desktop computer examples changes generally require change management however relocating user file shares upgrading email server pose much higher level risk processing environment normal everyday activity critical first steps change management defining change communicating definition b defining scope change system change management usually overseen change review board composed representatives key business areas security networking systems administrators database administration application developers desktop support help desk tasks change review board facilitated use automated work flow application responsibility change review board ensure organization documented change management procedures followed change management process follows change management procedures simple follow easy use greatly reduce overall risks created changes made information processing environment good change management procedures improve overall quality success changes implemented accomplished planning peer review documentation communication iso/iec 20000 visible ops handbook implementing itil 4 practical auditable steps full book summary information technology infrastructure library provide valuable guidance implementing efficient effective change management program information security business continuity management bcm concerns arrangements aiming protect organization critical business functions interruption due incidents least minimize effects bcm essential organization keep technology business line current threats continuation business usual bcm included organizations risk analysis plan ensure necessary business functions need keep going event type threat business function encompasses whereas bcm takes broad approach minimizing disaster-related risks reducing probability severity incidents disaster recovery plan drp focuses specifically resuming business operations quickly possible disaster disaster recovery plan invoked soon disaster occurs lays steps necessary recover critical information communications technology ict infrastructure disaster recovery planning includes establishing planning group performing risk assessment establishing priorities developing recovery strategies preparing inventories documentation plan developing verification criteria procedure lastly implementing plan partial listing governmental laws regulations various parts world significant effect data processing information security important industry sector regulations also included significant impact information security describing simply security aware employees information security culture ideas customs social behaviors organization impact information security positive negative ways cultural concepts help different segments organization work effectively work effectiveness towards information security within organization way employees think feel security actions take big impact information security organizations roer petric 2017 identify seven core dimensions information security culture organizations andersson reimers 2014 found employees often see part organization information security effort often take actions ignore organizational information security best interests research shows information security culture needs improved continuously information security culture analysis change authors commented never ending process cycle evaluation change maintenance manage information security culture five steps taken pre-evaluation strategic planning operative planning implementation post-evaluation international organization standardization iso consortium national standards institutes 157 countries coordinated secretariat geneva switzerland iso world largest developer standards iso 15443 information technology – security techniques – framework security assurance iso/iec 27002 information technology – security techniques – code practice information security management iso-20000 information technology – service management iso/iec 27001 information technology – security techniques – information security management systems – requirements particular interest information security professionals us national institute standards technology nist non-regulatory federal agency within u.s. department commerce nist computer security division develops standards metrics tests validation programs well publishes standards guidelines increase secure planning implementation management operation nist also custodian u.s. federal information processing standard publications fips internet society professional membership society 100 organizations 20,000 individual members 180 countries provides leadership addressing issues confront future internet organizational home groups responsible internet infrastructure standards including internet engineering task force ietf internet architecture board iab isoc hosts requests comments rfcs includes official internet protocol standards rfc-2196 site security handbook information security forum isf global nonprofit organization several hundred leading organizations financial services manufacturing telecommunications consumer goods government areas undertakes research information security practices offers advice biannual standard good practice detailed advisories members institute information security professionals iisp independent non-profit body governed members principal objective advancing professionalism information security practitioners thereby professionalism industry whole institute developed iisp skills framework framework describes range competencies expected information security information assurance professionals effective performance roles developed collaboration private public sector organizations world-renowned academics security leaders german federal office information security german bundesamt für sicherheit der informationstechnik bsi bsi-standards 100-1 100-4 set recommendations including methods processes procedures approaches measures relating information security bsi-standard 100-2 it-grundschutz methodology describes information security management implemented operated standard includes specific guide baseline protection catalogs also known it-grundschutz catalogs 2005 catalogs formerly known baseline protection manual catalogs collection documents useful detecting combating security-relevant weak points environment cluster collection encompasses september 2013 4,400 pages introduction catalogs it-grundschutz approach aligned iso/iec 2700x family european telecommunications standards institute standardized catalog information security indicators headed industrial specification group isg isi | [
2050,
5636,
10245,
7174,
10756,
9224,
7692,
9745,
4626,
10772,
4119,
7703,
5658,
3612,
1567,
34,
2084,
6698,
3629,
7725,
5169,
7739,
8764,
4159,
9791,
9281,
3139,
4163,
1093,
2118,
8262,
8264,
7753,
10307,
5195,
589,
10831,
5200,
4689,
46... | None |
5,374 | 9 | Clip_(compiler):clip compiler clip compiler compiler clipper programming language additional features libraries gtk fivewin netto mysql odbc cti tcp gzip interbase oracle postgres quite fast support hyper-six foxpro rdd compile existing clipper source code minor changes support features original compiler access multiple types databases oracle informix interbase mysql postgres xbase dialects tables foxpro visual foxpro comix indexes ndx ntx cdx supports object-oriented programming preprocessor dynamic static libraries several functions math string management arrays vectors clip licensed gpl type license uses gnu cc compiler | [
1952,
6112,
6850,
4614,
6631,
8262,
3435,
7022,
7983,
2929,
5397,
2903
] | Test |
5,375 | 3 | Network_Computer:network computer network computer nc diskless desktop computer device made oracle corporation 1996 2000 devices designed manufactured alliance included sun microsystems ibm others devices designed minimum specifications based network computer reference profile brand also employed marketing term try popularize design computer within enterprise among consumers nc brand mainly intended inspire range desktop computers various suppliers virtue diskless design use inexpensive components software cheaper easier manage standard fat client desktops however due commoditization standard desktop components due increasing availability popularity various software options using full desktops diskless nodes thin clients hybrid clients network computer brand never achieved popularity hoped oracle eventually mothballed term network computer used diskless desktop computer thin client failure nc impact scale predicted larry ellison may caused number factors firstly prices pcs quickly fell 1000 making competition hard secondly software available ncs neither mature open thirdly idea could simply ahead time nc launch 1996 typical home internet connection 28.8 kbit/s modem dialup simply insufficient delivery executable content world wide web considered mainstream breakout year 1998 prior internet service providers advertised mainstream press least outside us knowledge internet limited could held back uptake would seen niche device obvious appeal ncs ended used 'dumb terminals intended replace proprietary backend infrastructure readily available 1990s era ncs often network-booted minimal unix x serve x terminals nc purists may consider suboptimal use nc hardware ncs work well terminals considerably cheaper purpose-built terminal hardware initial network computing standard network computer reference profile ncref required 'nc appliances supported html java http jpeg key standards many ncs use intel cpus microsoft software microsoft intel developed competing standard called netpc alternatives ncref webref motorola hds network systems odin national semiconductor hds workstation stated ship end june 1996 acorn network computer oracle initial reference implementation nc development subcontracted british company acorn computers adapted create ncos acorn made use local partner companies ant icon technology design edge fulfil contract 1997 apple announced mac nc attempt develop pippin network computer platform end 1997 steve jobs discontinued macintosh clone efforts effectively killing pippin although key components mac nc technology inherited original imac first generation netstation design netstation trademark licensed nchannel provided consumer equipment internet service associated infrastructure uk market months nchannel split two entities netchannel provided internet service netproducts provided consumer hardware netproducts started working acorn develop next-generation product netstation ii started developing email-only set-top-box tvemail netproducts went voluntary liquidation 1998 either project completed sun microsystems developed javastation javaos-based nc based sparc hardware initially similar sun range unix workstations ibm launched network station september 1996 later reference design network station used netbsd-based ncos booted lan as/400 ibm pc server network station supported local execution basic applications web browser console addition x capability also implemented allow locally remotely run applications used machine practice lack real applications meant little hardware x terminal ibm network station originally based powerpc architecture final models used intel pentium processors see idea behind nc existing contemporary times system cloud computing particular google chrome os wired magazine daniel roth claims failure network computer eventually led development cloud computing large contribution transition attributed eric schmidt cto sun microsystems proponent network computer eventually became ceo google google large purveyor cloud technology notably google docs spreadsheets | [
9665,
4194,
4679,
4235,
7822,
10926,
1776,
5872,
6322,
10481,
5492,
8700,
10325,
1399,
3323,
1788,
3166
] | Test |
5,376 | 4 | PrivacyStar:privacystar privacystar service identifies calling provides call complaint filing reports federal trade commission privacystar service available web mobile applications android ios several applications powered privacystar call text blocking available applications along privacystar ’ iphone lookup+ application enable users file potential debt collector telemarketer violations directly ftc application captures detailed information possible fair debt collection practices act violations including date time number identity allows users easily provide information regulatory agencies may take action privacystar 1.2 million users blocked 120 million calls filed 300,000 complaints directly federal trade commission september 2012 fact privacystar leading source call complaint data reported ftc 2015 users filed 31 call complaints february 13 2013 privacystar launched free sms spam complaint filing feature android smartphones application allows users file text message spam complaints addition existing ability file call complaints directly federal trade commission android phones founded 2008 jeff stalnaker josh smith privacystar based little rock arkansas jeff stalnaker president ceo company prior privacystar stalnaker held position division president financial services division acxiom marketing company josh smith coo privacystar charles morgan executive chairman board first orion corp. private company developed markets privacystar | [
9732,
1949
] | Test |
5,377 | 3 | Multimedia_PC:multimedia pc multimedia pc mpc recommended configuration personal computer pc cd-rom drive standard set named multimedia pc marketing council working group software publishers association spa software information industry association mpmc comprised companies including microsoft creative labs dell gateway fujitsu pc required standards could called mpc licensing use logo spa cd-rom drives coming market 1990 difficult concisely communicate consumer hardware requirements using multimedia software mostly meant displaying video synced audio pc via cd-rom drive mpc standard supposed communicate concisely consumer buying hardware software could simply look mpc logo assured compatibility mpc program mixed results primarily vast number pcs sold different brands windows became ubiquitous pcs specifying minimum recommended windows versions features often clearer consumers mpc nomenclature standardized term failed catch software publishers association turned away consumer software late 1990s interest mpc standard vanished problem software labeling continues especially field computer games multitude 3d video cards manufactured extremely wide range capabilities common industry labeling standard let consumers know whether card powerful enough let play particular game first mpc minimum standard set 1991 1993 mpc level 2 minimum standard announced 1996 mpc level 3 announced | [
6797,
8301,
6129,
8561,
9137,
9363,
533,
1400,
4699
] | Test |
5,378 | 2 | System_virtual_machine:system virtual machine computing system virtual machine virtual machine provides complete system platform supports execution complete operating system os usually emulate existing architecture built purpose either providing platform run programs real hardware available use example executing otherwise obsolete platforms multiple instances virtual machines leading efficient use computing resources terms energy consumption cost effectiveness known hardware virtualization key cloud computing environment vm originally defined popek goldberg efficient isolated duplicate real machine system virtual machine advantages main disadvantages vms multiple vms running guest operating system frequently engaged server consolidation order avoid interference separate vms actual machine platform desire run multiple operating systems initial motivation virtual machines allow time-sharing among several single-tasking operating systems respects system virtual machine considered generalization concept virtual memory historically preceded ibm cp/cms first systems allow full virtualization implemented time sharing providing user single-user operating system cms unlike virtual memory system virtual machine entitled user write privileged instructions code approach certain advantages adding input/output devices allowed standard system technology evolves virtual memory purposes virtualization new systems memory overcommitment may applied manage memory sharing among multiple virtual machines one actual computer operating system may possible share memory pages identical contents among multiple virtual machines run physical machine may result mapping physical page technique known kernel samepage merging particularly useful read-only pages contain code segments particular would case multiple virtual machines running similar software software libraries web servers middleware components etc guest operating systems need compliant host hardware thereby making possible run different operating systems computer e.g. microsoft windows linux previous versions operating system support future software use virtual machines support separate guest operating systems popular regard embedded systems typical use would run real-time operating system simultaneously preferred complex operating system linux windows another use would novel unproven software still developmental stage runs inside sandbox virtual machines advantages operating system development may include improved debugging access faster reboots different virtualization techniques used based desired usage native execution based direct virtualization underlying raw hardware thus provides multiple instances architecture real machine based capable running complete operating systems virtual machines also emulate different architectures allow execution software applications operating systems written another cpu architecture operating-system-level virtualization allows resources computer partitioned via kernel support multiple isolated user space instances usually called containers may look feel like real machines end users computer architectures capable hardware-assisted virtualization enables efficient full virtualization using virtualization-specific hardware capabilities primarily host cpus approach described full virtualization hardware implemented using type 1 type 2 hypervisor type 1 hypervisor runs directly hardware type 2 hypervisor runs another operating system linux windows virtual machine run operating system supported underlying hardware users thus run two different guest operating systems simultaneously separate private virtual computers pioneer system using concept ibm cp-40 first 1967 version ibm cp/cms 1967–1972 precursor ibm vm family 1972–present vm architecture users run relatively simple interactive computing single-user operating system cms guest top vm control program vm-cp approach kept cms design simple running alone control program quietly provides multitasking resource management services behind scenes addition cms communication system tasks performed multitasking vms rscs gcs tcp/ip unix users run ibm operating systems mvs even new cp z/os even simple cms could run threaded environment listserv trickle z/vm current version vm used support hundreds thousands virtual machines given mainframe installations use linux z systems run web servers linux runs operating system within many virtual machines full virtualization particularly helpful operating system development experimental new code run time older stable versions separate virtual machine process even recursive ibm debugged new versions virtual machine operating system vm virtual machine running older version vm even used technique simulate new hardware standard x86 instruction set architecture used modern pcs actually meet popek goldberg virtualization requirements notably execution mode sensitive machine instructions always trap would allow per-instruction virtualization despite limitations several software packages managed provide virtualization x86 architecture even though dynamic recompilation privileged code first implemented vmware incurs performance overhead compared vm running natively virtualizable architecture ibm system/370 motorola mc68020 several software packages virtual pc virtualbox parallels workstation virtual iron manage implement virtualization x86 hardware intel amd introduced features x86 processors enable virtualization hardware well virtualization resources single machine multiple independent nodes cluster combined accessed single virtual numa machine virtual machines also perform role emulator allowing software applications operating systems written another computer processor architecture run operating-system-level virtualization server virtualization technology virtualizes servers operating system kernel layer thought partitioning single physical server sliced multiple small partitions otherwise called virtual environments virtual private servers vps guests zones etc partition looks feels like real server point view users example solaris zones supports multiple guest operating systems running operating system solaris 10 guest operating systems use kernel level operating system version separate copy operating system different kernel version using solaris kernel zones solaris native zones also requires host operating system version solaris operating systems manufacturers supported however solaris branded zones would need used operating systems zones another example system workload partitions wpars introduced version 6.1 ibm aix operating system system wpars software partitions running one instance global aix os environment operating system level architecture low overhead helps maximize efficient use server resources virtualization introduces negligible overhead allows running hundreds virtual private servers single physical server contrast approaches full virtualization like vmware paravirtualization like xen uml achieve level density due overhead running multiple kernels side operating system-level virtualization allow running different operating systems i.e. different kernels although different libraries distributions etc possible.different virtualization techniques used based desired usage native execution based direct virtualization underlying raw hardware thus provides multiple instances architecture real machine based capable running complete operating systems virtual machines also emulate different architectures allow execution software applications operating systems written another cpu architecture operating-system-level virtualization allows resources computer partitioned via kernel support multiple isolated user space instances usually called containers may look feel like real machines end users computer architectures capable hardware-assisted virtualization enables efficient full virtualization using virtualization-specific hardware capabilities primarily host cpus examples virtualization-enabled hardware include following | [
9090,
6150,
5384,
6153,
2058,
6797,
4238,
7053,
4112,
8466,
11539,
789,
9366,
9371,
6557,
2334,
8863,
10016,
8609,
2212,
6438,
295,
10537,
2731,
7983,
7217,
7349,
5174,
823,
4664,
5049,
7733,
9525,
9655,
8509,
318,
5697,
9665,
5702,
9932,... | Test |
5,379 | 1 | Datavail:datavail datavail remote database administration provider based broomfield colorado company provides services db2 oracle sql mysql databases according inc. company largest provider remote database administration services north america mark perlstein serves company president ceo datavail founded result spin-off stratavia 2008 november datavail moved headquarters downtown denver colorado broomfield colorado company managed 7000 databases 47 corporate clients year november 2010 datavail appointed mark perlstein ceo company acquired blue gecko seattle-based managed service provider july 2012 blue gecko began operating subsidiary datavail acquisition company 283 percent three-year growth rate 900 employees 3 branches india | [
10413,
7022,
4255
] | None |
5,380 | 3 | IA-32:ia-32 ia-32 short intel architecture 32-bit sometimes also called i386 32-bit version x86 instruction set architecture designed intel first implemented 80386 microprocessor 1985 ia-32 first incarnation x86 supports 32-bit computing result ia-32 term may used metonym refer x86 versions support 32-bit computing within various programming language directives ia-32 still sometimes referred i386 architecture contexts certain iterations ia-32 isa sometimes labelled i486 i586 i686 referring instruction supersets offered 80486 p5 p6 microarchitectures respectively updates offered numerous additions alongside base ia-32 set i.e floating-point capabilities mmx extensions intel historically largest manufacturer ia-32 processors second biggest supplier amd 1990s via transmeta chip manufacturers also produced ia-32 compatible processors e.g winchip modern era intel still produces ia-32 processors intel quark microcontroller platform however since 2000s majority manufacturers intel included moved almost exclusively implementing cpus based 64-bit variant x86 x86-64 x86-64 specification offers legacy operating modes operate ia-32 isa backwards compatibility even given contemporary prevalence x86-64 2018 ia-32 protected mode versions many modern operating systems still maintained e.g microsoft windows ubuntu linux distribution spite ia-32 name causing potential confusion 64-bit evolution x86 originated amd would known ia-64 name instead belonging intel itanium architecture primary defining characteristic ia-32 availability 32-bit general-purpose processor registers example eax ebx 32-bit integer arithmetic logical operations 32-bit offsets within segment protected mode translation segmented addresses 32-bit linear addresses designers took opportunity make improvements well significant changes described | [
10752,
3586,
11269,
6151,
4108,
5645,
9741,
5649,
19,
8725,
4630,
2584,
8728,
6171,
5148,
6683,
543,
7713,
8226,
7717,
550,
11301,
5673,
3114,
11305,
44,
10284,
2094,
7728,
2105,
2107,
6717,
6718,
2623,
9280,
2625,
8771,
582,
3654,
8262,
... | None |
5,381 | 3 | ARMulator:armulator arm instruction set simulator armulator one software development tools provided development systems business unit arm limited users arm-based chips owes heritage early development instruction set sophie wilson part heritage still visible provision tube bbc micro model armulator armulator written c provides instruction set simulator provides virtual platform system emulation comes ready emulate arm processor certain arm coprocessors processor part embedded system licensees may extend armulator add implementations additional hardware armulator model armulator provides number services help time-based behaviour event scheduling ships examples memory mapped co-processor expansions way use armulator emulate entire embedded system key limitation armulator simulate single arm cpu one time although almost arm cores arm11 available performance armulator good technology employed 1000 host pc instructions per arm instruction means emulated speeds 1 mhz normal pcs mid late 90s accuracy good although classed cycle count accurate rather cycle accurate arm pipeline n't fully modeled although register interlocks resolution instruction consequence single stepping register interlocks ignored different cycle counts returned program simply run unavoidable testing armulator always time consuming challenge full arm architecture validation suites employed 1 million lines c code fairly hefty product armulator allows runtime debugging using either armsd arm symbolic debugger either graphical debuggers shipped sdt later ads products armulator suffered invisible tool text file configuration armul.conf many found complex configure armulator ii formed basis high accuracy cycle callable co-verification models arm processors covs models see cycle accurate simulator basis many coverification systems arm processors armulator available broad range platforms life including mac risc os platforms dec alpha hp-ux solaris sunos windows linux mid-90s reluctance support windows platforms pre-windows 95 relatively challenging platform late 90 early 00 support removed solaris windows linux although undoubtedly code base remains littered pragmas ifdef riscos armulator ii shipped early arm toolkits well later sdt 2.5 sdt 2.5.1 ads 1.0 ads 1.1 ads 1.2 rcvt 1.0 also separately rviss special models produced development cpus notably arm9e arm10 arm11 models helped architectural decisions thumb-2 trustzone armulator gradually phased replaced just-in-time compilation-based high performance cpu system models see fastsim link armulator made open source basis gnu version armulator key differences memory interface services also instruction decode done differently gnu armulator available part gdb debugger arm gnu tools armulator ii formed basis high accuracy cycle callable co-verification models arm processors covs models see cycle accurate simulator basis many coverification systems arm processors mentor graphic seamless market leading covs system supports many arm cores many cpus armulator ii shipped early arm toolkits well later sdt 2.5 sdt 2.5.1 ads 1.0 ads 1.1 ads 1.2 rvct 1.0 also separately rviss key contributors armulator ii mike williams louise jameson charles lavender donald sinclair chris lamb rebecca bryan worked armulator engineer later product manager significant input also made allan skillman working arm coverification models time key contributor armulator dave jaggar special models produced development cpus notably arm9e arm10 arm11 models helped architectural decisions thumb-2 trustzone | [
8609,
2435,
10436,
3142,
9964,
6797,
6415,
659,
823,
1304,
2045
] | None |
5,382 | 7 | FireChat:firechat firechat proprietary mobile app developed open garden uses wireless mesh networking enable smartphones connect via bluetooth wi-fi apple ’ multipeer connectivity framework without internet connection connecting peer-to-peer though designed purpose mind firechat used communication tool civil protests app first introduced march 2014 iphones followed april 3 version android devices july 2015 firechat introduced private messaging possible post messages public chatrooms may 2016 firechat introduced firechat alerts allow users send push alerts specific time place feature aimed aid workers disaster relief developed partnership marikina city philippines firechat first became popular 2014 iraq following government restrictions internet use thereafter hong kong protests 2015 firechat also promoted protesters 2015 ecuadorian protests september 11 2015 pro-independence demonstration called free way catalan republic firechat used 131,000 times january 2016 students protested university hyderabad india following suicide phd student named rohith vemula students reported used firechat university shut wi-fi current version oct 2018 seems fork riot.im june 2014 firechat developers told wired p eople need understand tool communicate anything would put harmful situation discovered somebody hostile ... meant secure private communications july 2015 firechat claims use end-to-end encryption protect one-to-one private messages | [
10242,
3460,
11399,
9098,
1036,
2829,
11408,
3610,
3228,
10271,
3105,
10021,
1959,
9511,
9519,
8758,
1467,
1083,
8640,
6982,
6855,
2760,
1738,
2892,
3284,
4952,
4318,
610,
3812,
4068,
6628,
9572,
3959,
7928,
10748
] | Test |
5,383 | 9 | Leaning_toothpick_syndrome:leaning toothpick syndrome computer programming leaning toothpick syndrome lts situation quoted expression becomes unreadable contains large number escape characters usually backslashes avoid delimiter collision official perl documentation introduced term wider usage phrase used describe regular expressions match unix-style paths elements separated slashes codice_1 slash also used default regular expression delimiter must escaped back slash codice_2 leading frequent escaped slashes represented codice_3 doubled urls yields codice_4 escaped codice_5 similar phenomenon occurs dos/windows paths backslash used path separator requiring doubled backslash codice_6 – -escaped regular expression inside escaped string requiring codice_7 match single backslash extreme cases regular expression escaped string matching uniform naming convention path begins codice_6 requires 8 backslashes codice_9 due 2 backslashes double-escaped lts appears many programming languages many situations including patterns match uniform resource identifiers uris programs output quoted text many quines fall latter category consider following perl regular expression intended match uris identify files codice_10 directory ftp site perl like sed solves problem allowing many characters delimiters regular expression example following three examples equivalent expression given -- use wikipedia syntax highlighter handle perl color misleadingly -- pre /pre common translation convert backslashes forward slashes pre /pre may easier understand written like pre /pre perl program print html link tag url link text stored variables codice_11 codice_12 respectively might look like notice use backslashes escape quoted double-quote characters syntaxhighlight lang= html using single quotes delimit string feasible perl expand variables inside single-quoted strings code example would work intended using codice_13 function viable solution many languages perl c php codice_14 operator perl allows delimiter documents especially well suited multi-line strings however documents n't allowed proper indentation 5.26 example shows perl syntax print « here_it_ends href= url text /a here_it_ends c programming language handles lts use codice_15 symbol start string literals initial quotation marks e.g rather otherwise requiring c++11 standard adds raw strings string contains characters codice_16 optional delimiter used codice_17 following example go indicates string raw using backtick delimiter c \foo\bar.txt raw strings may contain character except backticks escape code backtick raw string raw strings may also span multiple lines example strings codice_18 codice_19 equivalent string spans multiple lines. string that\nspans multiple\nlines python similar construct using codice_20 one also use together triple quotes ruby uses single quote indicate raw string filepath c \foo\bar.txt' also allows change delimiter like perl r ftp // ^/ */pub/ r ftp // ^/ */pub/ scala allows usage triple quotes order prevent escaping confusion triple quotes also allow multiline strings shown sed regular expressions particularly using operator much similar perl sed predecessor perl default delimiter delimiter used default s/regexp/replacement/ regexp replacement also valid form example match pub directory perl example replace foo default escaping slashes using exclamation point delimiter instead yields | [
7364,
8644,
8582,
9735,
8554,
9245,
3571,
5492,
3705,
1435,
2045
] | Test |
5,384 | 7 | Hewlett-Packard:hewlett-packard hewlett-packard company commonly referred hp stylized hp hewlett-packard american multinational information technology company headquartered palo alto california developed provided wide variety hardware components well software related services consumers small- medium-sized businesses smbs large enterprises including customers government health education sectors company founded one-car garage palo alto bill hewlett david packard initially produced line electronic test equipment hp world leading pc manufacturer 2007 q2 2013 time lenovo ranked ahead hp hp specialized developing manufacturing computing data storage networking hardware designing software delivering services major product lines included personal computing devices enterprise industry standard servers related storage devices networking products software diverse range printers imaging products hp directly marketed products households small- medium-sized businesses enterprises well via online distribution consumer-electronics office-supply retailers software partners major technology vendors hp also services consulting business around products partner products hewlett-packard company events included spin-off electronic bio-analytical measurement instruments part business agilent technologies 1999 merger compaq 2002 acquisition eds 2008 led combined revenues 118.4 billion 2008 fortune 500 ranking 9 2009 november 2009 hp announced acquisition 3com deal closing april 12 2010 april 28 2010 hp announced buyout palm inc. 1.2 billion september 2 2010 hp bidding war 3par 33 share offer 2.07 billion dell declined match hewlett-packard spun enterprise products services business hewlett packard enterprise november 1 2015 hewlett-packard held onto pc printer businesses renamed hp inc. bill hewlett david packard graduated degrees electrical engineering stanford university 1935 company originated garage nearby palo alto fellowship past professor frederick terman stanford great depression considered terman mentor forming hewlett-packard 1938 packard hewlett began part-time work rented garage initial capital investment us 538 1939 hewlett packard decided formalize partnership tossed coin decide whether company founded would called hewlett-packard hp packard-hewlett hp incorporated august 18 1947 went public november 6 1957 many projects worked first financially successful product precision audio oscillator model hp200a innovation use small incandescent light bulb known pilot light temperature dependent resistor critical portion circuit negative feedback loop stabilized amplitude output sinusoidal waveform allowed sell model 200a 89.40 competitors selling less stable oscillators 200 model 200 series generators continued production least 1972 200ab still tube-based improved design years one company earliest customers walt disney productions bought eight model 200b oscillators 71.50 use certifying fantasound surround sound systems installed theaters movie fantasia worked counter-radar technology artillery shell fuses world war ii allowed packard hewlett exempt draft hp recognized symbolic founder silicon valley although actively investigate semiconductor devices years traitorous eight abandoned william shockley create fairchild semiconductor 1957 hewlett-packard hp associates division established around 1960 developed semiconductor devices primarily internal use hp associates co-founded another former bell labs researcher mosfet mos transistor inventor mohamed atalla served director semiconductor research instruments calculators products using semiconductor devices hp associates 1960s hp partnered sony yokogawa electric companies japan develop several high-quality products products huge success high costs building hp-looking products japan hp yokogawa formed joint venture yokogawa-hewlett-packard 1963 market hp products japan hp bought yokogawa electric share hewlett-packard japan 1999 hp spun small company dynac specialize digital equipment name picked hp logo hp could turned upside reverse reflect image logo dy new company eventually dynac changed dymec folded back hp 1959 hp experimented using digital equipment corporation dec minicomputers instruments deciding would easier build another small design team deal dec hp entered computer market 1966 hp 2100 hp 1000 series minicomputers simple accumulator-based design two accumulator registers hp 1000 models two index registers series produced 20 years spite several attempts replace forerunner hp 9800 hp 250 series desktop business computers hp 3000 advanced stack-based design business computing server later redesigned risc technology hp 2640 series smart intelligent terminals introduced forms-based interfaces ascii terminals also introduced screen labeled function keys commonly used gas pumps bank atms hp 2640 series included one first bit mapped graphics displays combined hp 2100 21mx f-series microcoded scientific instruction set enabled first commercial wysiwyg presentation program bruno later became program hp-draw hp 3000 although scoffed formative days computing hp would eventually surpass even ibm world largest technology vendor terms sales although programma 101 first commercial desktop computer hp identified wired magazine producer world first device called personal computer hewlett-packard 9100a introduced 1968 programma 101 called computer personale italian fiera di milano 1966 hp called desktop calculator bill hewlett said called computer would rejected customers computer gurus n't look like ibm therefore decided call calculator nonsense disappeared engineering triumph time logic circuit produced without integrated circuits assembly cpu entirely executed discrete components crt display magnetic-card storage printer price around 5,000 machine keyboard cross scientific calculator adding machine alphabetic keyboard steve wozniak co-founder apple originally designed apple computer working hp offered right first refusal work take company wanted stay scientific business industrial markets wozniak said hp turned 5 times loyalty hp made hesitant start apple steve jobs company earned global respect variety products introduced world first handheld scientific electronic calculator 1972 hp-35 first handheld programmable 1974 hp-65 first alphanumeric programmable expandable 1979 hp-41c first symbolic graphing calculator hp-28c like scientific business calculators oscilloscopes logic analyzers measurement instruments reputation sturdiness usability latter products part spin-off agilent product line later spun agilent keysight technologies company design philosophy period summarized design guy next bench 98x5 series technical desktop computers started 1975 9815 cheaper 80 series technical computers started 1979 85 machines used version basic programming language available immediately switched used proprietary magnetic tape storage hp computers similar capabilities much later ibm personal computer although limitations available technology forced prices high 1984 hp introduced inkjet laser printers desktop along scanner product line later developed successful multifunction products significant single-unit printer/scanner/copier/fax machines print mechanisms hp tremendously popular laserjet line laser printers depend almost entirely canon inc. components print engines turn use technology developed xerox hp develops hardware firmware software convert data dots printing march 3 1986 hp registered hp.com domain name making ninth internet .com domain ever registered 1987 palo alto garage hewlett packard started business designated california state historical landmark 1990s hp expanded computer product line initially targeted university research business users reach consumers hp also grew acquisitions bought apollo computer 1989 convex computer 1995 later decade hp opened hpshopping.com independent subsidiary sell online direct consumers 2005 store renamed hp home home office store 1995 1998 hewlett-packard sponsors english football team tottenham hotspur 1999 businesses related computers storage imaging spun hp form agilent technologies agilent spin-off largest initial public offering history silicon valley spin-off created 8 billion company 30,000 employees manufacturing scientific instruments semiconductors optical networking devices electronic test equipment telecom wireless r production july 1999 hp appointed carly fiorina formerly lucent first female ceo fortune-20 company dow jones industrial average fiorina received larger signing offer predecessors fiorina served ceo technology downturn early 2000s led merger compaq disastrous according cnn led firing 30,000 u.s. employees leadership company doubled size tenure ceo beset damaging leaks hp board directors asked fiorina step 2005 following boardroom disagreement resigned february 9 2005 1997 hp sold 120 million worth printers computer products iran european subsidiary dubai-based east distributor despite u.s. export sanctions prohibiting deals imposed bill clinton executive orders issued 1995 story initially reported boston globe triggered inquiry sec hp responded products worth 120 million sold fiscal year 2008 distribution way redington gulf company based netherlands sales took place foreign subsidiary hp violated sanctions hp named redington gulf wholesaler year 2003 turn published press release stating seeds redington-hewlett-packard relationship sowed six years ago one market — iran time redington gulf three employees whose sole purpose sell hp products iran market according former officials worked sanctions hp using loophole routing sales foreign subsidiary hp ended relationship redington gulf sec inquiry september 3 2001 hp announced agreement reached compaq merge two companies may 2002 passing shareholder vote hp officially merged compaq prior plans place consolidate companies product teams product lines compaq already taken digital equipment corporation 1998 hp therefore still offers support former digital equipment products pdp-11 vax alphaserver merger occurred proxy fight bill hewlett son walter objected merger compaq bought tandem computers 1997 started ex-hp employees digital equipment corporation 1998 following strategy hp became major player desktops laptops servers many different markets merger compaq new ticker symbol became hpq combination two previous symbols hwp cpq show significance alliance also key letters two companies hewlett-packard compaq latter company famous q logo products 2004 hp released dv 1000 series including hp pavilion dv 1658 1040 two years later may 2006 hp began campaign computer personal campaign designed bring back fact pc personal product campaign utilized viral marketing sophisticated visuals website www.hp.com/personal ads featured pharrell petra nemcova mark burnett mark cuban alicia keys jay-z gwen stefani shaun white january 2005 following years performance included hp compaq merger fell short disappointing earning reports board asked fiorina resign chair chief executive officer company following news fiorina departure hp stock jumped 6.9 percent robert wayman chief financial officer hp served interim ceo board undertook formal search replacement mark hurd ncr corporation hired take ceo president effective 1 april 2005 hurd board top choice given revival ncr took place leadership 2006 hp unveiled several new products including desktops enhanced notebooks workstation software manage openview client configuration manager 2.0 year hp share price skyrocketed due consistent results last couple quarters year hurd plan cutback hp workforce lower costs july 2007 hp signed definitive agreement acquire opsware cash tender deal values company 14.25 per share combined opsware software oracle enterprise management software first years hurd new role hp stock price doubled end fiscal 2007 hp hit 100 billion mark first time company annual revenue reached 104 billion allowing hp overtake competitor ibm may 13 2008 hp electronic data systems eds announced signed definitive agreement hp would purchase eds june 30 hp announced waiting period hart-scott-rodino antitrust improvements act 1976 expired transaction still requires eds stockholder approval regulatory clearance european commission non-u.s. jurisdictions subject satisfaction waiver closing conditions specified merger agreement agreement finalized august 26 2008 13 billion publicly announced eds would re-branded eds hp company first targeted layoff 24,600 former eds workers announced september 15 2008 company 2008 annual report gave number 24,700 completed end 2009 round factored purchase price 19.5 billion liability goodwill september 23 2009 eds known hp enterprise services november 11 2009 3com hewlett-packard announced hewlett-packard would acquiring 3com 2.7 billion cash acquisition one biggest size among series takeovers acquisitions technology giants push way become one-stop shops since beginning financial crisis 2007 tech giants constantly felt pressure expand beyond current market niches dell purchased perot systems recently invade technology consulting business area previously dominated ibm hewlett-packard latest move marked incursion enterprise networking gear market dominated cisco april 28 2010 palm inc. hewlett-packard announced hp would buy palm 1.2 billion cash debt announcement rumored either htc dell research motion hp would buy palm adding palm handsets hp product line created overlap ipaq series mobile devices thought significantly improve hp mobile presence ipaqdevices selling well buying palm gave hp library valuable patents well mobile operating platform known webos july 1 2010 acquisition palm final purchase palm webos began big gamble – build hp ecosystem july 1 2011 hp launched first tablet named hp touchpad bringing webos tablet devices september 2 2010 hp bidding war 3par 33 share offer 2.07 billion dell declined match hp acquisition palm phased compaq brand august 6 2010 ceo mark hurd resigned amid controversy cfo cathie lesjak assumed role interim ceo hurd turned hp around widely regarded one silicon valley star ceos leadership hp became largest computer company world measured total revenue accused sexual harassment colleague allegations deemed baseless investigation led questions concerning 1000 20000 private expenses lack disclosure related friendship observers argued hurd innocent board asked resignation avoid negative pr public analysis divided saw commendable tough action hp handling expenses irregularities saw ill-advised hasty expensive reaction ousting remarkably capable leader turned business around hp hurd oversaw series acquisitions worth 20 billion allowed company expand services networking equipment smartphones shares hp dropped 8.4 after-hours trading hitting 52-week low 9 billion market capitalization shaved larry ellison publicly attacked hp board ousting stating hp board made worst personnel decision since idiots apple board fired steve jobs many years ago september 30 2010 léo apotheker named hp new ceo president apotheker appointment sparked strong reaction oracle chief executive larry ellison complained apotheker charge sap one subsidiaries systematically stealing software oracle sap accepted subsidiary closed illegally accessed oracle intellectual property following hurd departure hp seen market problematic margins falling failed redirect establish major new markets cloud mobile services apotheker strategy broadly aim disposing hardware moving profitable software services sector august 18 2011 hp announced would strategically exit smartphone tablet computer business focusing higher-margin strategic priorities cloud solutions software emphasis enterprise commercial government markets also contemplated selling personal computer division spinning separate company quitting 'pc business continuing sell servers equipment business customers strategy already undertaken ibm 2005 hp stock continued drop 40 including 25 one day august 19 2011 company abruptly announced number decisions discontinue webos device business mobile phones tablet computers intent sell personal computer division time hp largest personal computer manufacturer world acquire british big data software firm autonomy 79 premium seen externally absurdly high price business known concerns accounts media analysts described hp actions botched strategy shift chaotic attempt rapidly reposition hp enhance earnings ultimately cost apotheker job autonomy acquisition objected even hp cfo september 22 2011 hp board directors fired apotheker chief executive effective immediately replaced fellow board member former ebay chief meg whitman raymond j lane executive chairman though apotheker served barely ten months received 13 million compensation hp lost 30 billion market capitalization tenure weeks later hp announced review concluded pc division integrated critical business operations company reaffirmed commitment personal systems group year later november 2012 wrote-down almost 9 billion related autonomy acquisition see takeover autonomy became subject intense litigation hp accused autonomy previous management fraudulently exaggerating autonomy financial position called law enforcement regulators countries autonomy previous management accused hp textbook obfuscation finger pointing protect hp executives criticism conceal hp culpability prior knowledge autonomy financial position gross mismanagement autonomy acquisition march 21 2012 hp said printing pc divisions would become one unit headed todd bradley pc division printing chief vyomesh joshi leaving company may 23 2012 hp announced plans lay approximately 27,000 employees posting profit decline 31 second quarter 2012 profit decline account growing popularity smart phones tablets mobile devices slowed sale personal computers may 30 2012 hp unveiled first net zero energy data center hp data center plans use solar energy renewable sources instead traditional power grids july 10 2012 hp server monitoring software discovered previously unknown security vulnerability security warning given customers two vulnerabilities patch released one month later hp official site training center hacked defaced pakistani hacker known 'hitcher demonstrate web vulnerability september 10 2012 hp revised restructuring figures cutting 29,000 jobs hp already cut 3,800 jobs – around 7 percent revised 29,000 figure – july 2012 december 31 2013 hp revised number jobs cut 29,000 34,000 october 2014 current number jobs cut end 2013 24,600 end 2013 company 317,500 employees may 22 2014 hp announced would cut 11,000 16,000 jobs addition 34,000 announced 2013 gradually shaping hp nimble lower-cost customer partner-centric company successfully compete across rapidly changing landscape ceo meg whitman said time june 2014 hp discover customer event las vegas meg whitman martin fink announced project radically new computer architecture called machine based memristors silicon photonics machine supposed come commercialization end decade meanwhile representing 75 research activity hp labs october 6 2014 hewlett-packard announced planning split two separate companies separating personal computer printer businesses technology services split first reported wall street journal confirmed media would result two publicly traded companies hewlett packard enterprise hp inc. meg whitman would serve chairman hp inc. ceo hewlett packard enterprise patricia russo would chairman enterprise business dion weisler would ceo hp inc. october 29 2014 hewlett-packard announced new sprout personal computer may 2015 company announced would selling controlling 51 percent stake chinese data-networking business tsinghua unigroup fee least 2.4 billion november 1 2015 previously announced hewlett-packard changed name hp inc. spun hewlett packard enterprise new publicly traded company hp inc. retains hewlett-packard stock price history stock ticker symbol hewlett packard enterprise trades symbol hp global operations directed headquarters palo alto california usa u.s. operations directed facility unincorporated harris county texas near houston latin america offices unincorporated miami-dade county florida u.s. near miami europe offices meyrin switzerland near geneva also research center paris-saclay cluster 20 km south paris france asia-pacific offices singapore also large operations leixlip ireland austin texas boise idaho corvallis oregon fort collins colorado roseville california saint petersburg florida san diego california tulsa oklahoma vancouver washington conway arkansas plano texas former headquarters eds hp acquired uk hp based large site bracknell berkshire offices various uk locations including landmark office tower london 88 wood street recent acquisition 3com expand employee base marlborough massachusetts company also large workforce numerous offices bucharest romania bangalore india address back end operations mphasis headquartered bangalore also enabled hp increase footprint city subsidiary eds company acquired hp produces lines printers scanners digital cameras calculators pdas servers workstation computers computers home small-business use many computers came 2002 merger compaq hp promotes supplying hardware software also full range services design implement support infrastructure hp imaging printing group ipg described company 2005 leading imaging printing systems provider world printer hardware printing supplies scanning devices providing solutions across customer segments individual consumers small medium businesses large enterprises products technology associated ipg include december 23 2008 hp released iprint photo iphone free downloadable software application allows printing 4 x 6 photos hp personal systems group psg claims one leading vendors personal computers pcs world based unit volume shipped annual revenue psg deals hp resold apple ipod november 2005 hp enterprise business eb incorporates hp technology services enterprise services amalgamation former eds known hp services hp enterprise security services oversees professional services network security information security information assurance/ compliancy hp software division enterprise servers storage networking group essn enterprise servers storage networking group essn oversees back end products like storage servers hp networking former procurve responsible nw family products business unit essn hp software division company enterprise software unit years hp produced marketed brand enterprise-management software hp openview september 2005 hp purchased several software companies part publicized deliberate strategy augment software offerings large business customers hp software sells several categories software including hp software also provides software service saas cloud computing solutions software services including consulting education professional services support hp office strategy technology four main functions office strategy technology comes hp labs research arm hp founded 1966 hp labs aims deliver new technologies create business opportunities go beyond hp current strategies examples recent hp labs technology includes memory spot chip 2006 hp idealab provides web forum early-state innovations encourage open feedback consumers development community hp also offers managed services provide complete it-support solutions companies organizations examples include founders developed management style came known hp way hewlett words hp way core ideology ... includes deep respect individual dedication affordable quality reliability commitment community responsibility view company exists make technical contributions advancement welfare humanity following tenets hp way july 2007 company announced met target set 2004 recycle one billion pounds electronics toner ink cartridges set new goal recycling two billion pounds hardware end 2010 2006 company recovered 187 million pounds electronics 73 percent closest competitor 2008 hp released supply chain emissions data — industry first september 2009 newsweek ranked hp 1 2009 green rankings america 500 largest corporations according environmentalleader.com hewlett-packard earned number one position due greenhouse gas ghg emission reduction programs first major company report ghg emissions associated supply chain according ranking addition hp made effort remove toxic substances products though greenpeace targeted company better hp took top spot corporate responsibility magazine 100 best corporate citizens list 2010 list cited pr week one america important business rankings hp beat russell 1000 index companies leadership seven categories including environment climate changes corporate philanthropy 2009 hp ranked fifth fortune magazine named hp one world admired companies 2010 placing 2 computer industry 32 overall list top 50 year computer industry hp ranked 1 social responsibility long-term investment global competitiveness use corporate assets may 2011 hp released global responsibility report covering accomplishments 2010 report company tenth provides comprehensive view hp global citizenship programs performance goals describes hp uses technology influence expertise make positive impact world company 2009 report best corporate responsibility report year 2009 reports claims hp decreased total energy use 9 percent compared 2008 hp recovered total 118,000 tonnes electronic products supplies recycling 2009 including 61 million print cartridges april 2010 san francisco chronicle article hp one 12 companies commended designing products safe start following principles green chemistry commendations came environment california environmental advocacy group praised select companies golden state bay area efforts keep planet clean green may 2010 hp named one world ethical companies ethisphere institute second year row hp made list ethisphere reviewed researched analyzed thousands nominations 100 countries 35 industries create 2010 list hp one 100 companies earn distinction top winner computer hardware vendor recognized ethisphere honors firms promote ethical business standards practices going beyond legal minimums introducing innovative ideas benefit public hp listed greenpeace guide greener electronics ranks electronics manufacturers according policies sustainability energy climate green products november 2011 hp secured 1st place 15 ranking climbing 3 places increased score 5.9 5.5 scored points new sustainable operations criteria best program measuring reducing emissions greenhouse gases suppliers scoring maximum points thorough paper procurement policy november 2012 report hp ranked second score 5.7 hp especially well disclosure externally verified greenhouse gas emissions setting targets reducing however greenpeace reports hp risks penalty point future editions due fact member trade associations commented energy efficiency standards hp earned recognition work area data privacy security 2010 company ranked 4 ponemon institute annual study trusted companies privacy since 2006 hp worked directly u.s. congress federal trade commission ftc department commerce establish new strategy federal legislation hp played key role work toward december 2010 ftc report protecting consumer privacy era rapid change winning nine straight annual respected company china awards economic observer peking university hp china added 10 year contribution award list accolades award aims identify companies business china outstanding sustained performance business operations development corporate social responsibility 2012 rankings consumer electronics companies progress relating conflict minerals enough project rated hp second 24 companies calling pioneer progress according businessweek study hp world 11th valuable brand 2009 hp many sponsorships one well known sponsorship epcot walt disney world resort 1995 1999 2013 hp shirt sponsor premier league club tottenham hotspur f.c 1997 1999 sponsors australian football league club north melbourne football club also sponsored bmw williams formula 1 team 2005 sponsorship formerly held compaq 2010 sponsor renault f1 hewlett-packard also naming rights arrangement hp pavilion san jose home san jose sharks nhl hockey team 2013 arena naming rights acquired sap ag renaming arena sap center san jose company also maintains number corporate sponsorships business sector including sponsorships trade organisations including fespa print trade exhibitions o'reilly media velocity web development conference acquisition compaq 2002 hp maintained compaq presario brand low-end home desktops laptops hp compaq brand business desktops laptops hp proliant brand intel-architecture servers hp pavilion brand used home entertainment laptops home desktops tandem nonstop servers branded hp integrity nonstop march 2003 hp restated first-quarter cash flow operations reducing 18 percent accounting error actual cash flow operations 647 million 791 million reported earlier hp shifted 144 million net cash used investing activities september 5 2006 shawn cabalfin david o'neil newsweek wrote hp general counsel behest chairwoman patricia dunn contracted team independent security experts investigate board members several journalists order identify source information leak turn security experts recruited private investigators used spying technique known pretexting pretexting involved investigators impersonating hp board members nine journalists including reporters cnet new york times wall street journal order obtain phone records information leaked related hp long-term strategy published part cnet article january 2006 hp employees accused criminal acts since acquitted november 2007 hewlett-packard released bios update covering wide range laptops intent speed computer fan well run constantly whether computer reason prevent overheating defective nvidia graphics processing units gpus shipped many original equipment manufacturers including hewlett-packard dell apple defect concerned new packaging material used nvidia 2007 onwards joining graphics chip onto motherboard perform well thermal cycling prone develop stress cracks – effectively severing connection gpu motherboard leading blank screen july 2008 hp issued extension initial one-year warranty replace motherboards selected models however option extended models defective nvidia chipsets despite research showing computers also affected fault furthermore replacement motherboard temporary fix since fault inherent units affected models point manufacture including replacement motherboards offered hp free 'repair since point several websites documenting issue notably www.hplies.com forum dedicated refer hewlett-packard multi-million dollar cover issue www.nvidiadefect.com details specifics fault offers advice owners affected computers several small-claims lawsuits filed several states well suits filed countries hewlett-packard also faced class-action lawsuit 2009 i7 processor computers complainants stated systems locked within 30 minutes powering consistently even replaced newer i7 systems lockups continued june 15 2011 hp filed lawsuit california superior court santa clara claiming oracle corporation breached agreement support itanium microprocessor used hp high-end enterprise servers june 15 2011 hp sent formal legal demand letter oracle attempt force world 3 software maker reverse decision discontinue software development intel itanium microprocessor build servers hp lawsuit 2012 requiring oracle continue produce software compatible itanium processor hp awarded 3 billion damages oracle june 30 2016 hp argued oracle canceling support damaged hp itanium server brand oracle announced appeal decision damages november 2012 hp recorded writedown around 8.8 billion related acquisition year earlier uk based autonomy corporation plc hp accused autonomy deliberately inflating value company prior takeover former management team autonomy flatly rejected charge autonomy specialized analysis large scale unstructured big data 2010 uk largest successful software business maintained aggressively entrepreneurial marketing approach controls described rod iron said include zero tolerance firing weakest 5 sales force quarter compensating best sales staff like rock stars time hp fired previous ceo expenses irregularities year appointed léo apotheker ceo president hp seen problematic market margins falling failed redirect establish major new markets cloud mobile services apotheker strategy aim disposing hardware moving profitable software services sector part strategy autonomy acquired hp october 2011 hp paid 10.3 billion 87.3 shares valuing autonomy around 11.7 billion £7.4 billion overall premium around 79 market price deal widely criticized absurdly high botched strategy shift chaotic attempt rapidly reposition hp enhance earnings objected even hp cfo within year apotheker fired major culture clashes became apparent hp written 8.8 billion autonomy value hp claim resulted accounting improprieties misrepresentations disclosure failures previous management turn accuse hp textbook example defensive stalling conceal evidence prior knowledge gross mismanagement undermining company noting public awareness since 2009 financial reporting issues even hp cfo disagreed price paid external observers generally state small part write-off appears due accounting mis-statements hp overpaid businesses previously serious fraud office united kingdom u.s. securities exchange commission joined fbi investigating potential anomalies hp incurred much damage stock falling decades low three lawsuits brought shareholders hp fall value hp shares august 2014 united states district court judge threw proposed settlement autonomy previous management argued would collusive intended divert scrutiny hp responsibility knowledge essentially engaging plaintiff attorneys existing cases redirecting previous autonomy vendors management fee 48 million plaintiffs agreeing end claims hp management similarly redirect claims previous autonomy vendors management january 2015 sfo closed investigation likelihood successful prosecution low dispute still litigated us investigated uk ireland financial reporting council june 9 2015 hp agreed pay 100 million investors bought hp shares august 19 2011 november 20 2012 settle suite autonomy purchase october 25 2012 richard falk human rights council special rapporteur situation human rights palestinian territories occupied since 1967 called boycotting hp together businesses profiting israeli settlements occupied palestinian lands brought operations line international human rights humanitarian law 2014 presbyterian church voted move forward divestment hp protest israeli policies toward palestinians 2015 city portland human rights commission requested place caterpillar g4s hewlett-packard motorola solutions city buy list april 9 2014 administrative proceeding securities exchange commission settled hp consenting order acknowledging hp violated foreign corrupt practices act fcpa hp subsidiaries russia poland mexico made improper payments government officials obtain retain lucrative public contracts sec order finds hp subsidiary russia paid 2 million agents various shell companies russian government official retain multimillion-dollar contract federal prosecutor office poland hp subsidiary provided gifts cash bribes worth 600,000 polish government official obtain contracts national police agency part bid win software sale mexico state-owned petroleum company hp subsidiary mexico paid 1 million inflated commissions consultant close ties company officials money funneled one officials hp agreed pay 108 million settle sec charges parallel criminal case | [
9732,
1029,
6661,
1032,
4622,
9742,
7698,
1555,
3603,
3605,
4628,
2071,
5144,
5145,
7188,
8212,
8725,
8733,
2078,
7199,
1056,
9756,
6178,
10272,
1572,
1061,
7204,
8229,
10277,
9258,
10797,
9774,
5681,
7218,
7729,
8756,
5689,
58,
1083,
876... | Test |
5,385 | 4 | Lauri_Love:lauri love lauri love born 14 december 1984 united kingdom british activist charged stealing data united states government computers including united states army missile defense agency nasa via computer intrusion love stradishall suffolk parents alexander love prison chaplain hm prison highpoint north sirkka-liisa love finnish citizen also works prison live stradishall dual citizenship united kingdom finland dropping sixth form college working turkey plant love applied finnish passport served finnish army six months became conscientious objector finished another six months obligation alternative civilian service applied university nottingham england dropped second term physical mental collapse university glasgow scotland dropped second year health reasons part 2011 hetherington house occupation student protest glasgow university love indictment united states 2013 district new jersey 2014 southern district new york eastern district virginia allegedly breaching thousands computer systems united states elsewhere – including computer networks federal agencies – steal massive quantities confidential data united states attempted extradite face charges love american attorney tor ekeland love two day extradition hearing 28 29 june 2016 westminster magistrates court london father testified lauri love asperger syndrome extradited also hearing simon baron-cohen psychologist testified love extradited diagnosed disorders also include eczema psychosis depression love lives home parents baron-cohen stated love told would commit suicide extradited love father testified son diagnosed autism adult serving finnish army baron-cohen diagnosed love asperger syndrome 2012 love end 20s love testified extradition hearing 29 june 2016 suggested court love family crafted media strategy garner public support extradition love supported courage foundation love barrister extradition hearing ben cooper doughty street chambers case adjourned 16 september 2016 westminster magistrates court judge ruled love could extradited united states love solicitor karen todner said would appeal 5 february 2018 lord chief justice lord burnett mr justice ouseley high court upheld appeal extradition ruling would oppressive prosecute mr love england offences national crime agency nca arrested love 2013 february 2015 bbc news revealed love taking legal action return computers seized nca arrested may 2016 judge nina tempia westminster magistrates court ruled love tell nca passwords encryption keys january 2018 announced novelist frederick forsyth would publish novel inspired lauri love gary mckinnon stories | [
9240,
5426
] | Validation |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.