node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
5,486
5
Proxy_ARP:proxy arp proxy arp technique proxy device given network answers arp queries ip address network proxy aware location traffic destination offers mac address ostensibly final destination traffic directed proxy address typically routed proxy intended destination via another interface via tunnel process results node responding mac address arp request different ip address proxying purposes sometimes referred publishing typical uses proxy arp arp manipulation techniques basis protocols providing redundancy broadcast networks e.g. ethernet notably common address redundancy protocol virtual router redundancy protocol disadvantage proxy arp include scalability arp resolution proxy required every device routed manner reliability fallback mechanism present masquerading confusing environments proxy arp create dos attacks networks misconfigured example misconfigured router proxy arp ability receive packets destined hosts gives mac address response arp requests hosts/routers may ability correctly forward packets final destination thus blackholing traffic proxy arp hide device misconfigurations missing incorrect default gateway openbsd implements proxy arp
[ 7240, 649, 6153, 8073, 9868, 6013, 4238, 592, 10640, 10833, 7411, 5749, 5437, 4734 ]
Test
5,487
4
Kasiski_examination:kasiski examination cryptanalysis kasiski examination also referred kasiski test kasiski method method attacking polyalphabetic substitution ciphers vigenère cipher first published friedrich kasiski 1863 seems independently discovered charles babbage early 1846 polyalphabetic substitution ciphers substitution alphabets chosen use keyword kasiski examination allows cryptanalyst deduce length keyword length keyword discovered cryptanalyst lines ciphertext n columns n length keyword column treated ciphertext monoalphabetic substitution cipher column attacked frequency analysis similarly rotor stream cipher machine used method may allow deduction length individual rotors kasiski examination involves looking strings characters repeated ciphertext strings three characters long examination successful distances consecutive occurrences strings likely multiples length keyword thus finding repeated strings narrows possible lengths keyword since take greatest common divisor distances reason test works repeated string occurs plaintext distance corresponding characters multiple keyword length keyword letters line way occurrences string example consider plaintext crypto repeated string distance occurrences 20 characters line plaintext 6-character keyword abcdef 6 divide 20 first instance crypto lines abcdef second instance lines cdefab two instances encrypt different ciphertexts kasiski examination reveal nothing however 5-character keyword abcde 5 divides 20 occurrences crypto line abcdea two instances encrypt ciphertext kasiski examination effective difficulty using kasiski examination lies finding repeated strings hard task perform manually computers make much easier however care still required since repeated strings may coincidence repeat distances misleading cryptanalyst rule coincidences find correct length course monoalphabetic ciphertexts result must cryptanalyzed kasiski actually used superimposition solve vigenère cipher started finding key length took multiple copies message laid one-above-another one shifted left length key kasiski observed column made letters encrypted single alphabet method equivalent one described perhaps easier picture modern attacks polyalphabetic ciphers essentially identical described one improvement coincidence counting instead looking repeating groups modern analyst would take two copies message lay one another modern analysts use computers description illustrates principle computer algorithms implement generalized method br br
[ 8674, 9615, 1105, 9617, 1941 ]
Test
5,488
8
Cozi:cozi cozi website mobile app intended help families stay organized features include allowing multiple family members manage schedules one account well organize update shopping to-do lists website founded robbie cape jan miksovsky two left microsoft company first product cozi central released september 25 2006 included family calendar shopping lists family messaging photo collage screensaver company based seattle washington cozi freemium version paid version called cozi gold cozi gold additional features include cozi contacts birthday tracker reminders mobile month view change notifications cozi acquired time inc. 2014 meredith corporation acquired time 2018 cozi moved parents network division june 5 2011 cozi set guinness world record longest line ducks row line stretched one mile made 17,782 rubber ducks
[]
Test
5,489
2
Simplenote:simplenote simplenote note-taking application markdown support addition cross-platform apps accessed via web browsers simplenote externally accessible api allowing clients written macos dashboard widget dashnote nvpy cross-platform simplenote client amongst others addition macos program notational velocity windows utility resophnotes also sync simplenote simplenote originally developed simperium 2008 simplenote premium introduced november 23 2009 removed ads added extra features syncing simplenote dropbox automattic acquired simperium simplenote january 24 2013 september automattic released android version later relaunched simplenote suspending premium service removing ads users may 2016 official client linux simplenote released automattic open sourced code ios android macos simplenote apps august 2016 making client apps open source application reviewed mac life reviewed book lifehacker guide working smarter faster better covered book business iphone ipad app development
[ 7459, 6797, 4623, 3632, 7983, 119, 11221, 823 ]
Test
5,490
4
Network_Access_Control:network access control network access control nac approach computer security attempts unify endpoint security technology antivirus host intrusion prevention vulnerability assessment user system authentication t. network access control nac computer computer network|networking solution uses set protocol computing |protocols define implement policy describes secure access network node networking |nodes devices initially attempt access network nac might integrate automatic remediation process fixing non-compliant nodes allowing access network systems allowing network infrastructure routers switches firewalls work together back office servers end user computing equipment ensure information system operating securely interoperability allowed basic form nac 802.1x standard network access control aims exactly name implies—control access computer networking|network policies including pre-admission endpoint security policy checks post-admission controls users devices go network computer connects computer network permitted access anything unless complies business defined policy including anti-virus protection level system update level configuration computer checked pre-installed software agent access resources remediate resolve update issues policy met computer able access network resources internet within policies defined nac system nac mainly used endpoint health checks often tied role-based access access network given according profile person results posture/health check example enterprise hr department could access hr department files role endpoint meets anti-virus minimums nac represents emerging category security products definition evolving controversial overarching goals concept distilled two prevailing designs nac based whether policies enforced end-stations gain access network former case called pre-admission nac end-stations inspected prior allowed network typical use case pre-admission nac would prevent clients out-of-date antivirus signatures talking sensitive servers alternatively post-admission nac makes enforcement decisions based user actions users provided access network fundamental idea behind nac allow network make access control decisions based intelligence end-systems manner network informed end-systems key design decision key difference among nac systems whether require software agent distributed agents|agent software report end-system characteristics whether use scanning network inventory techniques discern characteristics remotely nac matured software developers microsoft adopted approach providing network access protection|network access protection nap agent part windows 7 vista xp releases also nap compatible agents linux mac os x provide equal intelligence operating systems out-of-band systems agents distributed end-stations report information central console turn control switches enforce policy contrast inline solutions single-box solutions act internal firewalls hierarchical internetworking model|access-layer networks enforce policy out-of-band solutions advantage reusing existing infrastructure inline products easier deploy new networks may provide advanced network enforcement capabilities directly control individual packets wire however products agentless inherent advantages easier less risky out-of-band deployment use techniques provide inline effectiveness non-compliant devices enforcement required network operators deploy nac products expectation legitimate clients denied access network users never out-of-date patch levels nac would unnecessary nac solutions require mechanism remediate end-user problems deny access two common strategies remediation quarantine networks captive portal using nac mobile device|mobile deployment workers connect various wireless network throughout workday involves challenges present wired local area network|lan environment user denied access computer security|security concern productive use device lost impact ability complete job serve customer addition automated remediation takes seconds wired connection may take minutes slower wireless data connection bogging device mobile nac solution gives system administrators greater control whether remediate security concern lower-grade concern out-of-date antivirus software|antivirus signatures may result simple warning user serious issues may result quarantining device policies may set automated remediation pushing applying security patch computing |patches updates withheld device connected wi-fi faster connection working hours allows administrators appropriately balance need security goal keeping workers productive category computer network security
[ 7809, 9603, 1284, 649, 6282, 2189, 1303, 2213, 2985, 11434, 5433, 6586, 9146, 5437, 10175, 7752, 3796, 4053, 1242, 9055, 9442, 5860, 3944, 4471, 6904, 2041, 3580, 2558 ]
None
5,491
4
Barracuda_Networks:barracuda networks barracuda networks inc. company providing security networking storage products based network appliances cloud services company security products include products protection email web surfing web hackers instant messaging threats spam spyware trojans viruses company networking storage products include web filtering load balancing application delivery controllers message archiving ng firewalls backup services data protection barracuda networks founded 2003 dean drako founding ceo michael perone zach levow company introduced barracuda spam virus firewall year 2007 company moved headquarters campbell california opened office ann arbor michigan january 2006 closed first outside investment 40 million sequoia capital francisco partners january 29 2008 barracuda networks sued trend micro use open source anti-virus software clam antivirus trend micro claimed violation patent 'anti-virus detection smtp ftp gateway addition providing samples prior art effort render trend micro patent invalid july 2008 barracuda launched countersuit trend micro claiming trend micro violated several antivirus patents barracuda networks acquired ibm december 2008 company launched brbl barracuda reputation block list proprietary dynamic list known spam servers free public use blocking spam gateway soon opening brbl many ip addresses got blacklisted without apparent reason without technical explanation october 2009 barracuda 85,000 customers november 2011 barracuda 130,000 customers january 2014 barracuda 150,000 customers worldwide 2012 company became co-sponsor garmin-barracuda uci protour cycling team entitlement sponsor 2011 indianapolis 500 champion bryan herta autosport indycar series 98 lotus driven alex tagliani defend team championship barracuda networks expanded research development facility ann arbor 12,500 square foot office building depot street 2008 2012 michigan-based research division grown 180 employees outgrowing space june 2012 barracuda signed lease occupy 45,000 square foot office complex previously used borders headquarters maynard st downtown ann arbor july 2012 dean drako barracuda networks co-founder president ceo since founded 2003 resigned operating position remaining company board directors time drako departure company stated achieved profitability nearly ongoing 30 annual percent growth rate since inception 150,000 customers worldwide nearly 1,000 employees 10 offices business 80 countries company created office ceo started ceo search november 2012 long-time emc executive william bj jenkins joined company president ceo jenkins worked emc since 1998 recently served president emc backup recovery systems brs division november 2013 barracuda networks went public new york stock exchange ticker symbol cuda march 2015 barracuda networks expanded business north asia distributed tritech distribution limited hong kong november 2015 barracuda added new next generation firewall firewall family barracuda announced future discontinuation copy cudadrive services may 2016 november 2017 thoma bravo llc private equity firm announced taking barracuda networks private 1.6 billion buyout expected go feb 2018 february 2018 thoma bravo announced completed acquisition may 23 2019 barracuda forays next generation security tackle latest cyber security threats introducing advanced bot protection capabilities september 2007 barracuda networks acquired netcontinuum company providing application controllers secure manage enterprise web applications november 2008 barracuda networks expanded cloud-based backup services acquiring bitleap november 2008 barracuda networks acquired 3sp allowing company introduce secure sockets layer ssl virtual private network vpn products allow secure remote access network file shares internal web sites remote control capabilities desktops servers january 2009 barracuda networks acquired yosemite technologies add software agents incremental backups applications microsoft exchange server sql server windows system states september 2009 barracuda networks acquired controlling interest phion ag austria-based public company delivering enterprise-class firewalls october 2009 barracuda networks acquired purewire inc software service saas company offering cloud based web filtering security april 2013 barracuda networks acquired signnow 2014 barracuda networks purchased c2c systems uk october 2015 barracuda networks acquired intronis november 2017 barracuda purchased sonian november 2017 barracuda announced acquired private equity investment firm thoma bravo llc january 2018 barracuda acquired phishline january 2013 backdoor discovered variety firewall vpn spam filtering gear sold barracuda networks contains undocumented backdoor accounts allow people remotely log access sensitive information researchers austrian security firm warned backdoor secured shortly announcement
[ 899, 10756, 1801, 11030, 10392, 3619, 6565, 3366, 8998, 3885, 1970, 6579, 9530, 7739, 64, 9025, 2118, 331, 467, 2395, 4956, 11104, 6514, 5749, 3323, 8446, 2558, 127 ]
None
5,492
2
Unix:unix unix trademarked unix family multitasking multiuser computer operating systems derive original unix development starting 1970s bell labs research center ken thompson dennis ritchie others initially intended use inside bell system licensed unix outside parties late 1970s leading variety academic commercial unix variants vendors including university california berkeley bsd microsoft xenix ibm aix sun microsystems solaris early 1990s sold rights unix novell sold unix business santa cruz operation sco 1995 unix trademark passed open group neutral industry consortium allows use mark certified operating systems comply single unix specification sus 2014 unix version largest installed base apple macos unix systems characterized modular design sometimes called unix philosophy concept entails operating system provides set simple tools performs limited well-defined function unified filesystem unix filesystem main means communication shell scripting command language unix shell combine tools perform complex workflows unix distinguishes predecessors first portable operating system almost entire operating system written c programming language thus allowing unix reach numerous platforms unix originally meant convenient platform programmers developing software run systems rather non-programmers system grew larger operating system started spreading academic circles users added tools system shared colleagues first unix designed portable multi-tasking later unix gradually gained portability multi-tasking multi-user capabilities time-sharing configuration unix systems characterized various concepts use plain text storing data hierarchical file system treating devices certain types inter-process communication ipc files use large number software tools small programs strung together command-line interpreter using pipes opposed using single monolithic program includes functionality concepts collectively known unix philosophy brian kernighan rob pike summarize unix programming environment idea power system comes relationships among programs programs era standard computer consisted hard disk storage data terminal input output i/o unix file model worked quite well i/o generally linear 1980s non-blocking i/o set inter-process communication mechanisms augmented unix domain sockets shared memory message queues semaphores well network sockets support communication hosts graphical user interfaces developed file model proved inadequate task handling asynchronous events generated mouse early 1980s users began seeing unix potential universal operating system suitable computers sizes unix environment client–server program model essential elements development internet reshaping computing centered networks rather individual computers unix c programming language developed distributed government academic institutions led ported wider variety machine families operating system unix operating system consists many libraries utilities along master control program kernel kernel provides services start stop programs handles file system common low-level tasks programs share schedules access avoid conflicts programs try access resource device simultaneously mediate access kernel special rights reflected division user space kernel space — although microkernel implementations like minix redox functions network protocols may also run user space origins unix date back mid-1960s massachusetts institute technology bell labs general electric developing multics time-sharing operating system ge-645 mainframe computer multics featured several innovations also presented severe problems frustrated size complexity multics goals individual researchers bell labs started withdrawing project last leave ken thompson dennis ritchie douglas mcilroy joe ossanna decided reimplement experiences new project smaller scale new operating system initially without organizational backing also without name new operating system single-tasking system 1970 group coined name unics uniplexed information computing service pronounced eunuchs pun multics stood multiplexed information computer services brian kernighan takes credit idea adds one remember origin final spelling unix dennis ritchie doug mcilroy peter g. neumann also credit kernighan operating system originally written assembly language 1973 version 4 unix rewritten c. version 4 unix however still many pdp-11 dependent codes suitable porting first port platform made five years later 1978 interdata 8/32 bell labs produced several versions unix collectively referred research unix 1975 first source license unix sold donald b. gillies university illinois department computer science uiuc graduate student greg chesson worked unix kernel bell labs instrumental negotiating terms license late 1970s early 1980s influence unix academic circles led large-scale adoption unix bsd system v commercial startups including sequent hp-ux solaris aix xenix late 1980s unix system laboratories sun microsystems developed system v release 4 svr4 subsequently adopted many commercial unix vendors 1990s unix unix-like systems grew popularity bsd linux distributions developed collaboration worldwide network programmers 2000 apple released darwin also unix system became core mac os x operating system later renamed macos unix operating systems widely used modern servers workstations mobile devices late 1980s open operating system standardization effort known posix provided common baseline operating systems ieee based posix around common structure major competing variants unix system publishing first posix standard 1988 early 1990s separate similar effort started industry consortium common open software environment cose initiative eventually became single unix specification sus administered open group starting 1998 open group ieee started austin group provide common definition posix single unix specification 2008 become open group base specification 1999 effort towards compatibility several unix system vendors agreed svr4 executable linkable format elf standard binary object code files common format allows substantial binary compatibility among different unix systems operating cpu architecture filesystem hierarchy standard created provide reference directory layout unix-like operating systems mainly used linux unix system composed several components originally packaged together including development environment libraries documents portable modifiable source code components addition kernel operating system unix self-contained software system one key reasons emerged important teaching learning tool broad influence inclusion components make system large original v7 unix distribution consisting copies compiled binaries plus source code documentation occupied less 10 mb arrived single nine-track magnetic tape printed documentation typeset online sources contained two volumes names filesystem locations unix components changed substantially across history system nonetheless v7 implementation considered many canonical early structure unix system significant impact operating systems achieved reputation interactivity providing software nominal fee educational use running inexpensive hardware easy adapt move different machines unix originally written assembly language soon rewritten c high-level programming language although followed lead multics burroughs unix popularized idea unix drastically simplified file model compared many contemporary operating systems treating kinds files simple byte arrays file system hierarchy contained machine services devices printers terminals disk drives providing uniform interface expense occasionally requiring additional mechanisms ioctl mode flags access features hardware fit simple stream bytes model plan 9 operating system pushed model even eliminated need additional mechanisms unix also popularized hierarchical file system arbitrarily nested subdirectories originally introduced multics common operating systems era ways divide storage device multiple directories sections fixed number levels often one level several major proprietary operating systems eventually added recursive subdirectory capabilities also patterned multics dec rsx-11m group user hierarchy evolved vms directories cp/m volumes evolved ms-dos 2.0+ subdirectories hp mpe group.account hierarchy ibm ssp os/400 library systems folded broader posix file systems making command interpreter ordinary user-level program additional commands provided separate programs another multics innovation popularized unix unix shell used language interactive commands scripting shell scripts – separate job control language like ibm jcl since shell os commands another program user could choose even write shell new commands could added without changing shell unix innovative command-line syntax creating modular chains producer-consumer processes pipelines made powerful programming paradigm coroutines widely available many later command-line interpreters inspired unix shell fundamental simplifying assumption unix focus newline-delimited text nearly file formats binary editors original version unix – entire system configured using textual shell command scripts common denominator i/o system byte – unlike record-based file systems focus text representing nearly everything made unix pipes especially useful encouraged development simple general tools could easily combined perform complicated ad hoc tasks focus text bytes made system far scalable portable systems time text-based applications also proven popular application areas printing languages postscript odf application layer internet protocols e.g. ftp smtp http soap sip unix popularized syntax regular expressions found widespread use unix programming interface became basis widely implemented operating system interface standard posix see c programming language soon spread beyond unix ubiquitous systems applications programming early unix developers important bringing concepts modularity reusability software engineering practice spawning software tools movement time leading developers unix programs ran established set cultural norms developing software norms became important influential technology unix termed unix philosophy tcp/ip networking protocols quickly implemented unix versions widely used relatively inexpensive computers contributed internet explosion worldwide real-time connectivity formed basis implementations many platforms unix policy extensive on-line documentation many years ready access system source code raised programmer expectations contributed launch free software movement 1983 1983 richard stallman announced gnu short gnu unix project ambitious effort create free software unix-like system free sense everyone received copy would free use study modify redistribute gnu project kernel development project gnu hurd yet produced working kernel 1991 linus torvalds released linux kernel free software gnu general public license addition use linux operating system many gnu packages – gnu compiler collection rest gnu toolchain gnu c library gnu core utilities – gone play central roles free unix systems well linux distributions consisting linux kernel large collections compatible software become popular individual users business popular distributions include red hat enterprise linux fedora suse linux enterprise opensuse debian gnu/linux ubuntu linux mint mandriva linux slackware linux arch linux gentoo free derivative bsd unix 386bsd released 1992 led netbsd freebsd projects 1994 settlement lawsuit brought university california berkeley software design inc. usl v. bsdi unix systems laboratories clarified berkeley right distribute bsd unix free desired since bsd unix developed several different product branches including openbsd dragonfly bsd linux bsd increasingly filling market needs traditionally served proprietary unix operating systems well expanding new markets consumer desktop mobile embedded devices modular design unix model sharing components relatively common consequently unix unix-like systems include least bsd code systems also include gnu utilities distributions 1999 interview dennis ritchie voiced opinion linux bsd operating systems continuation basis unix design derivatives unix interview states views unix linux continuation ideas started ken many others many years ago opensolaris open-source counterpart solaris developed sun microsystems included cddl-licensed kernel primarily gnu userland however oracle discontinued project upon acquisition sun prompted group former sun employees members opensolaris community fork opensolaris illumos kernel 2014 illumos remains active open-source system v derivative may 1975 rfc 681 described development network unix center advanced computation university illinois system said present several interesting capabilities arpanet mini-host time unix required license bell laboratories 20,000 us expensive non-university users educational license cost 150 noted bell open suggestions arpanet-wide license specific features found beneficial local processing facilities compilers editors document preparation system efficient file system access control mountable unmountable volumes unified treatment peripherals special files integration network control program ncp within unix file system treatment network connections special files accessed standard unix i/o calls closing files program exit decision desirable minimize amount code added basic unix kernel october 1993 novell company owned rights unix system v source time transferred trademarks unix x/open company open group 1995 sold related business operations santa cruz operation sco whether novell also sold copyrights actual software subject federal lawsuit 2006 sco v. novell novell case appealed august 30 2011 united states court appeals tenth circuit affirmed trial decisions closing case unix vendor sco group inc. accused novell slander title present owner trademark unix open group industry standards consortium systems fully compliant certified single unix specification qualify unix others called unix-like decree open group term unix refers class operating systems specific implementation operating system operating systems meet open group single unix specification able bear unix 98 unix 03 trademarks today operating system vendor pays substantial certification fee annual trademark royalties open group systems licensed use unix trademark include aix hp-ux inspur k-ux irix solaris tru64 unix formerly digital unix osf/1 macos part z/os notably inspur k-ux linux distribution certified unix 03 compliant sometimes representation like un*x *nix *n x used indicate operating systems similar unix comes use asterisk question mark characters wildcard indicators many utilities notation also used describe unix-like systems met requirements unix branding open group open group requests unix always used adjective followed generic term system help avoid creation genericized trademark unix original formatting usage unix remains widespread typeset small caps unix according dennis ritchie presenting original unix paper third operating systems symposium american association computing machinery acm new typesetter troff invented intoxicated able produce small caps many operating system predecessors contemporaries used all-uppercase lettering many people wrote name upper case due force habit acronym trademark names registered different entities different countries trademark laws countries allow trademark name controlled two different entities entity uses trademark easily distinguishable categories result unix used brand name various products including book shelves ink pens bottled glue diapers hair driers food containers several plural forms unix used casually refer multiple brands unix unix-like systems common conventional unixes unices treating unix latin noun third declension also popular pseudo-anglo-saxon plural form unixen common although occasionally seen sun microsystems developer solaris variant asserted term unix plural referencing many implementations
[ 2050, 2051, 6148, 4106, 6155, 8204, 13, 2062, 8207, 10259, 8213, 25, 2073, 10271, 8225, 6180, 8236, 4144, 10289, 8243, 4151, 6201, 10298, 10304, 8258, 8260, 2118, 8262, 2120, 4170, 6218, 8266, 6221, 10318, 8273, 10322, 2132, 93, 10333, 96...
None
5,493
4
IBM_4768:ibm 4768 ibm 4768 pcie cryptographic coprocessor hardware security module hsm includes secure cryptoprocessor implemented high-security tamper resistant programmable pcie board specialized cryptographic electronics microprocessor memory random number generator housed within tamper-responding environment provide highly secure subsystem data processing cryptography performed sensitive key material never exposed outside physical secure boundary clear format ibm 4768 designed meet fips pub 140-2 level 4 highest level certification achievable commercial cryptographic devices achieved pci-hsm certification ibm 4768 data sheet describes coprocessor detail ibm supplies two cryptographic-system implementations applications may include financial pin transactions bank-to-clearing-house transactions emv transactions integrated circuit chip based credit cards general-purpose cryptographic applications using symmetric key algorithms hashing algorithms public key algorithms operational keys symmetric rsa private generated coprocessor saved either keystore file application memory encrypted master key coprocessor coprocessor identical master key use keys performance benefits include incorporation elliptic curve cryptography ecc format preserving encryption fpe hardware ibm supports 4768 certain ibm z mainframes crypto express6s cex6s feature code 0893 4768 cex6s part ibm support pervasive encryption drive encrypt data links point various relevant cryptographic standards iso 13491 secure cryptographic devices https //www.iso.org/standard/61137.html iso 9564 pin security https //www.iso.org/standard/68669.html ansi x9.24 part 1 key management using symmetric techniques https //webstore.ansi.org/recorddetail.aspx sku=ansi+x9.24-1-2017 ansi x9.24 part 2 key management using asymmetric techniques https //webstore.ansi.org/recorddetail.aspx sku=ansi+x9.24-2-2016 fips 140-2 https //nvlpubs.nist.gov/nistpubs/fips/nist.fips.140-2.pdf payment card industry pci pin transaction security pts hardware security module hsm modular security requirements search site https //www.pcisecuritystandards.org/document_library
[ 2383 ]
None
5,494
9
OBJ_(programming_language):obj programming language obj programming language family introduced joseph goguen 1976 family declarative ultra high-level languages features abstract types generic modules subsorts subtypes multiple inheritance pattern-matching modulo equations e-strategies user control laziness module expressions combining modules theories views describing module interfaces massively parallel rrm rewrite rule machine members obj family languages include cafeobj eqlog foops kumo maude obj3 obj3 version obj based order-sorted rewriting obj3 agent-oriented runs kyoto common lisp akcl
[ 6536, 6201, 8628, 8262 ]
Validation
5,495
4
Open_Threat_Exchange:open threat exchange open threat exchange otx world largest crowd-sourced computer-security platform 80,000 participants 140 countries share 19 million potential threats daily free use founded 2012 otx created run alienvault cybersecurity developer commercial open source solutions manage cyber attacks collaborative threat exchange created partly counterweight criminal hackers successfully working together sharing information viruses malware cyber attacks otx cloud-hosted information sharing covers wide range issues related security including viruses malware intrusion detection firewalls automated tools cleanse aggregate validate publish data shared participants data validated otx platform stripped information identifying participating contributor 2015 otx 2.0 added social network enables members share discuss research security threats including via real-time threat feed users share ip addresses websites attacks originated look specific threats see anyone already left information users subscribe “ pulse ” analysis specific threat including data ioc impact targeted software pulses exported stix json openloc maec csv used automatically update local security products users up-vote comment specific pulses assist others identifying important threats otx combines social contributions automated machine-to-machine tools integrates major security products firewalls perimeter security hardware platform read security report .pdf .csv .json open formats relevant information extracted automatically assisting professionals readily analyze data specific otx components include dashboard details top malicious ips around world check status specific ips notifications organization ip domain found hacker forum blacklist listed otx feature review log files determine communication known malicious ips 2016 alienvault released new version otx allowing participants create private communities discussions groups share information threats within group feature intended facilitate in-depth discussions specific threats particular industries different regions world threat data groups also distributed subscribers managed service providers using otx otx big data platform integrates natural language processing machine learning facilitate collection correlation data many sources including third-party threat feeds websites external api local agents 2015 alienvault partnered intel coordinate real-time threat information otx similar deal hewlett packard announced year facebook ibm threat exchange platforms facebook threatexchange beta requires application invitation join ibm launched ibm-force exchange april 2015
[ 10858, 3323, 2558 ]
Test
5,496
9
Friedrich_L._Bauer:friedrich l. bauer friedrich ludwig fritz bauer 10 june 1924 – 26 march 2015 german computer scientist professor technical university munich bauer earned abitur 1942 served wehrmacht world war ii 1943 1945 1946 1950 studied mathematics theoretical physics ludwig-maximilians-universität munich bauer received doctorate supervision fritz bopp thesis gruppentheoretische untersuchungen zur theorie der spinwellengleichungen group-theoretic investigations theory spin wave equations 1952 completed habilitation über quadratisch konvergente iterationsverfahren zur lösung von algebraischen gleichungen und eigenwertproblemen quadratically convergent iteration methods solving algebraic equations eigenvalue problems 1954 technical university munich teaching privatdozent ludwig-maximilians-universität 1954 1958 became extraordinary professor applied mathematics university mainz since 1963 worked professor mathematics since 1972 computer science technical university munich retired 1989 bauer early work involved construction computing machinery e.g logical relay computer stanislaus 1951-1955 context first propose widely used stack method expression evaluation bauer also worked committees developed imperative computer programming languages algol 58 successor algol 60 important predecessors modern imperative programming languages 1968 bauer coined term software engineering widespread use since bauer influential figure establishing computer science independent subject german universities scientific contributions spread numerical analysis bauer–fike theorem fundamentals interpretation translation programming languages later works systematics program development especially program transformation methods systems cip-s associated wide-spectrum language system cip-l also wrote well-respected book cryptology decrypted secrets fourth edition doctoral advisor 39 students including manfred broy david gries manfred paul gerhard seegmüller josef stoer peter wynn christoph zenger friedrich bauer married hildegard bauer-vogg father three sons two daughters bauer colleague german representative nato science committee 1967 nato discussing 'the software crisis bauer suggested term 'software engineering way conceive problem solution 1972 bauer published following definition software engineering br establishment use sound engineering principles economically obtain software reliable works real machines efficiently 2014 tu munich renamed largest lecture hall department informatics computer science friedrich bauer
[ 512, 4608, 11014, 1180, 4395, 5946, 8262, 1610, 1611, 9804, 10983, 1641, 5097, 8813, 1392, 4980, 1783, 5496, 8057 ]
None
5,497
5
Guard_interval:guard interval telecommunications guard intervals used ensure distinct transmissions interfere one another otherwise cause overlapping transmissions transmissions may belong different users tdma user ofdm purpose guard interval introduce immunity propagation delays echoes reflections digital data normally sensitive ofdm beginning symbol preceded guard interval long echoes fall within interval affect receiver ability safely decode actual data data interpreted outside guard interval tdma user timeslot ends guard period avoid data loss reduce interference following user caused propagation delay thus user timeslot protected interference preceding user guard interval guard period end preceding user timeslot common misconception tdma timeslot begins guard interval however itu technical specifications gsm 05.05 clearly define guard period end timeslot thus providing protection data loss within timeslot protection interference following timeslot longer guard periods allow distant echoes tolerated however longer guard intervals reduce channel efficiency example dvb-t four guard intervals available given fractions symbol period hence 1/32 gives lowest protection highest data rate 1/4 results best protection lowest data rate radio waves propagate speed light per 1000 meter 5 μs/mile ideally guard interval longer delay spread channel standard symbol guard interval used 802.11 ofdm increase data rate 802.11n added optional support guard interval provides 11 increase data rate shorter guard interval results higher packet error rate delay spread channel exceed guard interval and/or timing synchronization transmitter receiver precise scheme could developed work whether short guard interval would benefit particular link reduce complexity manufacturers typically implement short guard interval final rate adaptation step device running highest data rate
[ 2912, 8160, 11181 ]
Test
5,498
3
SPARCstation_2:sparcstation 2 sparcstation 2 ss2 code named calvin sun 4/75 sparc workstation computer sold sun microsystems based sun4c architecture implemented pizza box form factor 40mhz cypress cy7c601 cpu 28.5 mips ti tms390c601a fpu 4.2 mflops known cpu upgrade option weitek 80mhz sparc power µp power-up sparcstation 2 configured 128 mb memory total 64 mb motherboard additional 64 mb using special 32 mb sbus memory card another 32 mb piggy-backed daughterboard 16 ram slots motherboard populated either 1 mb simms total 16 mb 4 mb simms total 64 mb standard 30 pin simms used long use parity error detection rated 80 ns faster sparcstation 2 uses standard 50 pin scsi interface house two 3 1/2 full height disk drives ss2 also comes special auto-ejecting 1.44 mb floppy disk drive modern 80-pin single connector attachment sca scsi drives used internally adapter plastic drive sled used 50-pin drives must cut allow clearance adapter board sca drives may run hotter original scsi drives cause heating issues especially two drives installed ethernet aui port board supplemented add-on sbus cards onboard ethernet provided amd lance am7990 ethernet controller external aui transceivers required connection 10base5 10base2 10baset ethernet physical layer media openboot rom able boot network using rarp tftp sparcstation 2 uses m48t02 battery-backed rtc ram chip handles real time clock boot parameter storage problem chip battery internal means entire chip must replaced battery runs sun4c machines older battery life chip substantial number systems refuse boot additionally sun4c design used reserved bits m48t02 nvram non-standard way since later revisions m48t02 chip exert stricter control bits current m48t02 store nvram data rtc function correctly system may fail auto-boot due incompatibilities modern m48t02s common modify failed nvrams cutting encapsulation patching new battery also possible replace entire encapsulation also contains 32.768 khz clock crystal following operating systems run sparcstation 2
[ 9665, 11553, 9955, 10436, 3241, 823, 9422, 11501, 6006, 1399 ]
None
5,499
7
SoftLayer:softlayer softlayer technologies inc. dedicated server managed hosting cloud computing provider founded 2005 acquired ibm 2013 softlayer established 2005 lance crosby several ex-coworkers gi partners acquired majority equity stake softlayer august 2010 november year merged company planet internet services softlayers ’ biggest competitor consolidated customer base softlayer brand q1 2011 company reported hosting 81,000 servers 26,000 customers locations throughout united states july 2011 company announced plans international expansion amsterdam singapore add existing network us-based data centers dallas texas san jose california seattle washington santiago de querétaro mexico houston texas washington d.c.. data centers leased via digital realty trust may 2015 company 23 data centers 11 different countries june 4 2013 ibm announced acquisition softlayer disclosed financial terms according reuters deal could fetch 2 billion form ibm cloud services division time acquisition softlayer described biggest privately held cloud infrastructure provider iaas world 2018 softlayer renamed ibm cloud
[ 6018, 1539, 8451, 6027, 4236, 10893, 526, 911, 272, 1935, 8592, 405, 2328, 4377, 8986, 10265, 5662, 11038, 5666, 6307, 9766, 39, 2217, 6444, 8495, 3121, 5681, 9906, 7352, 10681, 11070, 448, 4289, 11201, 8515, 10820, 3269, 4683, 4429, 590,...
None
5,500
2
Safe_mode:safe mode safe mode diagnostic mode computer operating system os also refer mode operation application software windows safe mode allows essential system programs services start boot safe mode intended help fix problems within operating system also widely used removing rogue security software microsoft windows macos android linux distributions ubuntu linux mint examples contemporary operating systems implement safe mode called safe boot macos well complex electronic devices safe mode operating system reduced functionality task isolating problems easier since many non-core components disabled sound installation boot safe mode typically major problem disk corruption installation poorly-configured software prevents operating system successfully booting normal operating mode though varies operating system safe mode typically loads essential executable modules disables devices except necessary display information accept input also take form parallel miniature operating system configuration information shared normal operating system example microsoft windows user also choose boot recovery console small text-based troubleshooting mode kept separate main operating system also accessed booting install cd various safe mode options run dysfunctional os features video drivers audio networking disabled safe mode typically provides access utility diagnostic programs user troubleshoot preventing operating system working normally safe mode intended maintenance functionality provides minimal access features microsoft windows safe mode 7/vista /xp /2000/me/98/95 accessed pressing f8 key operating system boots also multi-boot environment multiple versions windows installed side side f8 key pressed os selector prompt get safe mode however windows 8 released 2012 traditional press-f8-for-safe-mode-options ui convention longer works either shift-f8 special gui-based workaround necessary equivalently minimal setting unix-like operating systems single-user mode daemons x window system started root user log emergency repairs maintenance including resetting users passwords machine without need know old one macos holding shift key powering activates safe boot background maintenance features besides mode selection runs file system repair mac os 10.4 disables fonts /system/library/fonts moves trash font caches normally stored /library/caches/com.apple.ats/ uid uid user id number 501 disables startup items login items reset administrative account password unlike windows safe mode networking disabled default requires using safe mode networking enabled macos safe boot always includes networking classic mac os versions 6 7 8 9 similar mode unix root achieved holding shift key booting starts system without extensions application software sometimes offers safe mode well php interpreter prior version 5.4 safe mode offers stricter security measures glasgow haskell compiler version 7.2 offers safe haskell mode restricting usage functions unsafeperformio mozilla firefox safe mode allows user remove extensions may preventing browser loading internet explorer run add-ons mode protected mode cydia mobilesubstrate also safe mode allows user uninstall tweaks extensions may crash springboard
[ 6797, 4111, 5397, 10392, 7983, 823, 7739, 11197, 576, 8644, 4165, 200, 10839, 7515, 4957, 5985, 2027, 9709, 9714, 2811, 8829 ]
Test
5,501
3
Tagged_architecture:tagged architecture computer science tagged architecture particular type computer architecture every word memory constitutes tagged union divided number bits data tag section describes type data interpreted reference type object points notable examples american tagged architectures lisp machines tagged pointer support hardware opcode level burroughs large systems data-driven tagged descriptor-based architecture non-commercial rice computer burroughs lisp machine examples high-level language computer architectures tagging used support types high-level language hardware level addition original xerox smalltalk implementation used least-significant bit 16-bit word tag bit clear hardware would accept aligned memory address set treated shifted 15-bit integer current intel documentation mentions lower bits memory address might similarly used interpreter-based systems soviet union elbrus series supercomputers pioneered use tagged architectures 1973
[ 6754, 10403, 1702, 9932, 11218, 372, 1399, 1820, 7071 ]
Test
5,502
3
HB-F9P:hb-f9p hb-f9p sony msx2-computer launched 1985 abbreviation hb stands hit bit hb-f9p unusual sense come built floppy disk drive instead built software suite memovision would run automatically unless program cartridge inserted cartridge slot graph key pressed booting memovision could store data special hbi-55 battery backed ram data cartridge sony originally developed hb-55 hb-75 msx1 computers systems contained simple built program called personal databank memovision continuation idea much extended contained stuff like birthday calendar alarm system family databank combination text editor database built calculator timer time calculator rendered pseudo 3d style hb-f9 many different localized variants produced
[ 5128, 11462, 9006 ]
None
5,503
3
Intel_iAPX_432:intel iapx 432 iapx 432 intel advanced performance architecture computer architecture introduced 1981 intel first 32-bit processor design main processor architecture general data processor implemented set two separate integrated circuits due technical limitations time project started 1975 8800 8008 8080 intended intel major design 1980s unlike 8086 designed following year successor 8080 iapx 432 radical departure intel previous designs meant different market niche completely unrelated 8080 x86 product lines iapx 432 project considered commercial failure intel discontinued 1986 iapx 432 referred micromainframe designed programmed entirely high-level languages instruction set architecture also entirely new significant departure intel previous 8008 8080 processors iapx 432 programming model stack machine visible general-purpose registers supported object-oriented programming garbage collection multitasking well conventional memory management directly hardware microcode direct support various data structures also intended allow modern operating systems implemented using far less program code ordinary processors intel imax 432 operating system 432 written entirely ada ada also intended primary language application programming aspects may seen high-level language computer architecture properties features resulted hardware microcode design complex processors era especially microprocessors however internal external buses mostly wider 16-bit like 32-bit microprocessors era 68000 32016 32-bit arithmetical instructions implemented 16-bit alu via random logic microcode kinds sequential logic iapx 432 enlarged address space 8080 also limited fact linear addressing data could still use 16-bit offsets somewhat akin intel first 8086-based designs including contemporary 80286 new 32-bit segment offsets 80386 architecture described publicly detail 1984 using semiconductor technology day intel engineers n't able translate design efficient first implementation along lack optimization premature ada compiler contributed rather slow expensive computer systems performing typical benchmarks roughly 1/4 speed new 80286 chip clock frequency early 1982 initial performance gap rather low-profile low-priced 8086 line probably main reason intel plan replace latter later known x86 iapx 432 failed although engineers saw ways improve next generation design iapx 432 capability architecture started regarded implementation overhead rather simplifying support intended originally designed clock frequencies 10 mhz actual devices sold specified maximum clock speeds 4 mhz 5 mhz 7 mhz 8 mhz peak performance 2 million instructions per second 8 mhz intel 432 project started 1975 year 8-bit intel 8080 completed year 16-bit 8086 project began 432 project initially named 8800 next step beyond existing intel 8008 8080 microprocessors became big step instruction sets 8-bit processors well fitted typical algol-like compiled languages however major problem small native addressing ranges 16k 8008 64k 8080 far small many complex software systems without using kind bank switching memory segmentation similar mechanism built 8086 years later intel aimed build sophisticated complete system lsi chips functionally equal better best 32-bit minicomputers mainframes requiring entire cabinets older chips system would support multiprocessors modular expansion fault tolerance advanced operating systems advanced programming languages large applications ultra reliability ultra security architecture would address needs intel customers decade iapx 432 development team managed bill lattin justin rattner lead engineer rattner would later become cto intel initially team worked santa clara march 1977 lattin team 17 engineers moved intel new site portland lead engineer iapx 432 fred pollack specialized superscalarity later became lead architect i686 chip intel pentium pro soon became clear would take several years many engineers design would similarly take several years progress moore law improved chip manufacturing could fit dense chips meanwhile intel urgently needed simpler interim product meet immediate competition motorola zilog national semiconductor intel began rushed project design 8086 low-risk incremental evolution 8080 using separate design team mass-market 8086 shipped 1978 8086 designed backward-compatible 8080 sense 8080 assembly language could mapped 8086 architecture using special assembler existing 8080 assembly source code albeit executable code thereby made upward compatible new 8086 degree contrast 432 software compatibility migration requirements architects total freedom novel design scratch using whatever techniques guessed would best large-scale systems software applied fashionable computer science concepts universities particularly capability machines object-oriented programming high-level cisc machines ada densely encoded instructions ambitious mix novel features made chip larger complex chip complexity limited clock speed lengthened design schedule core design — main processor — termed general data processor gdp built two integrated circuits one 43201 fetch decode instructions 43202 execute systems would also include 43203 interface processor ip operated channel controller i/o attached processor ap conventional intel 8086 provided processing power i/o subsystem largest designs era two-chip gdp combined count approximately 97,000 transistors single chip ip approximately 49,000 comparison motorola 68000 introduced 1979 approximately 40,000 transistors 1983 intel released two additional integrated circuits iapx 432 interconnect architecture 43204 bus interface unit biu 43205 memory control unit mcu chips allowed nearly glueless multiprocessor systems 63 nodes innovative features iapx 432 detrimental good performance many cases iapx 432 significantly slower instruction throughput conventional microprocessors era national semiconductor 32016 motorola 68010 intel 80286 one problem two-chip implementation gdp limited speed motherboard electrical wiring larger issue capability architecture needed large associative caches run efficiently chips room left instruction set also used bit-aligned variable-length instructions instead usual semi-fixed byte word-aligned formats used majority computer designs instruction decoding therefore complex designs although hamper performance used additional transistors mainly large barrel shifter design already lacking space transistors caches wider buses performance oriented features addition biu designed support fault-tolerant systems 40 bus time held wait states another major problem immature untuned ada compiler used high-cost object-oriented instructions every case instead faster scalar instructions would made sense instance iapx 432 included expensive inter-module procedure call instruction compiler used calls despite existence much faster branch link instructions another slow call enter_environment set memory protection compiler ran every single variable system even variables used inside existing environment checked make matters worse data passed procedures always passed value-return rather reference running dhrystone benchmark parameter passing took ten times longer computations combined according new york times i432 ran 5 10 times slowly competitor motorola 68000 iapx 432 one first systems implement new ieee-754 standard floating-point arithmetic outcome failure 432 microprocessor designers concluded object support chip leads complex design invariably run slowly 432 often cited counter-example proponents risc designs however hold oo support primary problem 432 implementation shortcomings especially compiler mentioned would made cpu design slow since iapx 432 one attempt similar design rekursiv processor although inmos transputer process support similar — fast intel spent considerable time money mindshare 432 skilled team devoted unwilling abandon entirely failure marketplace new architect—glenford myers—was brought produce entirely new architecture implementation core processor would built joint intel/siemens project later biin resulting i960-series processors i960 risc subset became popular time embedded processor market high-end 960mc tagged-memory 960mx marketed military applications according new york times intel collaboration hp merced processor later known itanium company comeback attempt high-end market iapx 432 instruction variable length peculiarly bit rather byte aligned instruction taking 6 321 bits iapx 432 hardware microcode support object-oriented programming capability-based addressing system uses segmented memory 2 segments 64 kb providing total virtual address space 2 bytes physical address space 2 bytes 16 mb programs able reference data instructions address instead must specify segment offset within segment segments referenced access descriptors ads provide index system object table set rights capabilities governing accesses segment segments may access segments contain access descriptors data segments contain ads hardware microcode rigidly enforce distinction data access segments allow software treat data access descriptors vice versa system-defined objects consist either single access segment access segment data segment system-defined segments contain data access descriptors system-defined data designated offsets though operating system user software may extend additional data system object type field checked microcode port object used carrier object needed user program define new object types get full benefit hardware type checking use type control objects tco release 1 iapx 432 architecture system-defined object typically consisted access segment optionally depending object type data segment specified access descriptor fixed offset within access segment release 3 architecture order improve performance access segments data segments combined single segments 128 kb split access part data part 0–64 kb reduced number object table lookups dramatically doubled maximum virtual address space iapx432 recognizes fourteen types predefined system objects software running 432 need explicitly deallocate objects longer needed instead microcode implements part marking portion edsger dijkstra on-the-fly parallel garbage collection algorithm mark-and-sweep style collector entries system object table contain bits used mark object white black grey needed collector imax 432 operating system includes software portion garbage collector executable instructions contained within system instruction object since instructions bit-aligned 16-bit bit displacement instruction object allows object contain 8192 bytes instructions 65,536 bits instructions consist operator consisting class opcode zero three operand references fields organized present information processor sequence required decoding frequently used operators encoded using fewer bits instruction begins 4 6 bit class field indicates number operands called order instruction length operand optionally followed 0 4 bit format field describes operands operands format present come zero three operands described format instruction terminated 0 5 bit opcode classes contain one instruction therefore opcode format field permits gdp appear programmer zero- one- two- three-address architecture format field indicates operand data reference top next-to-top element operand stack
[ 512, 7173, 4108, 9741, 5649, 6675, 2073, 3613, 10813, 2638, 10835, 1119, 7269, 4204, 8301, 3700, 8820, 4217, 8325, 8851, 6804, 6813, 6815, 1702, 9391, 4276, 2745, 2237, 5309, 6339, 7884, 9932, 728, 10469, 5356, 5358, 5871, 1776, 3317, 588...
None
5,504
4
CloudBerry_Lab:cloudberry lab cloudberry lab software company develops online backup file management solutions integrated 20 cloud storage providers cloudberry backup cloudberry explorer offered personal use “ freemium ” model products including advanced cloudberry backup solutions sold per license free trials available cloudberry managed backup backup-as-a-service solution managed service providers businesses provides centralized management monitoring backup restore desktops servers cloudberry managed backup cloudberry backup support windows windows server macos linux operating systems work microsoft sql server exchange applications vmware microsoft hyper-v virtualization solutions cloudberry lab incorporated 2011 initially releasing cloudberry explorer amazon s3 followed versions microsoft azure google cloud openstack swift 2011 company released cloudberry backup followed releases support windows server imaging microsoft sql server exchange applications bare metal restore windows server desktop operating systems cloudberry backup added support linux mac operating systems 2015 followed editions synology qnap 2012 company introduced cloudberry managed backup saas backup disaster recovery solution managed service providers businesses require centralized administration management larger environments 2018 company introduced cloudberry remote assistant free remote control desktop sharing solution designed secure access control remote desktops servers internet cloudberry lab develops software help managed service providers businesses consumers manage backup disaster recovery perform cloud file management synchronization company main products include cloudberry managed backup cloudberry backup cloudberry explorer cloudberry drive cloudberry backup managed backup solutions automate backup recovery files folders system images cloudberry backup standalone solution managed backup subscription saas offering managed service providers businesses adds centralized administration management reporting products designed backup cloud support backups local disk network shares latest product versions back data 20 different cloud storage providers including amazon s3 amazon glacier azure blob storage google cloud storage backblaze b2 wasabi openstack s3 compatible others cloudberry backup managed backup employ storage-agnostic model customers license software cloudberry contract directly cloud providers choice backup storage customers get choose cloud storage provider offers features pricing best suits needs customers change storage vendors time without change backup vendors way cloudberry lab support customers varying size need products provide end-to-end encryption data cloudberry explorer windows solution free paid licensing options managing files local storage remote online storage versions available amazon s3 microsoft azure google cloud openstack cloudberry drive solution mounts cloud storage windows desktop server product allows customers work cloud storage though local storage cloudberry remote assistant solution remote control desktop sharing software currently beta available microsoft windows free remote assistant encrypts connections includes text voice chat cloudberry lab amazon advanced technology partner company also established partnerships microsoft azure google cloud platform backblaze b2 wasabi autotask connectwise others
[ 7905, 4194, 9655, 11201, 6565, 3366, 6153, 11178, 3629, 1358, 1935, 6797, 467, 11030, 823, 3800 ]
Test
5,505
5
DS4/NA:ds4/na digital signal 4/na ds4/na 139.264-mbit/s aggregate-multiplexed signal equivalent 3 digital signal 3s 2,016 digital signal 0s link commonly used long distance fiber carriage broadcast radio television platform 270mb/sec mpeg-2/asi transport stream circuits common use daily digital transmission broadcast television radio interconnecting sport arenas convention centers television stations broadcasters connections become part long-haul serial data transmission fiber sent purely serial data packetizing bandwidth sharing takes place tcp/ip carriers usually supplying circuits specialized often supplied us vyvx switch remote broadcast sports event example typically carried ds4 venue television network full unshared serial data circuit 270 megabits per second historically used appropriate gear circuit used emulate analog standard definition circuit using sampling rate 12-15 mhz carrying samples pcm format replaced dedicated coaxial cable circuits managed digital circuits use became rare early 21st century
[ 8192, 2994, 10100 ]
None
5,506
2
BSD/OS:bsd/os bsd/os originally called bsd/386 sometimes known bsdi discontinued proprietary version bsd operating system developed berkeley software design inc. bsdi bsd/os reputation reliability server roles renowned unix programmer author w. richard stevens used personal web server reason bsdi formed 1991 members computer systems research group csrg uc berkeley develop sell proprietary version bsd unix pc compatible systems intel 386 later processors made use work previously done bill jolitz port bsd pc platform bsd/386 1.0 released march 1993 company sold licenses support taking advantage terms bsd license permitted use bsd software proprietary systems long credit given author company turn contributed code resources development non-proprietary bsd operating systems meantime jolitz left bsdi independently released open source bsd pcs called 386bsd one advantages bsdi system complete thorough manpage documentation entire system including complete syntax argument explanations examples file usage authors cross-references commands manpage documentation far poorer modern linux systems bsd/386 licenses including source code priced 995 much less unix system v source licenses fact highlighted advertisements part settlement usl v. bsdi bsdi substituted code written university 4.4 bsd-lite release disputed code os effective release 2.0 time release 386 designation become dated bsd/386 renamed bsd/os later releases bsd/os also supported sun sparc-based systems marketing bsd/os became increasingly focused internet server applications however increasingly tight market unix-compatible software late 1990s early 2000s hurt sales bsd/os one end market lacked certification open group bear unix trademark sales force hardware support larger unix vendors simultaneously lacked negligible acquisition cost open source bsds linux bsd/os acquired wind river systems april 2001 wind river discontinued sales bsd/os end 2003 support terminated end 2004
[ 7552, 6787, 1927, 4745, 10761, 6412, 2061, 4989, 8975, 9743, 6675, 5397, 8469, 8725, 1304, 2584, 5534, 3487, 3872, 1316, 3241, 684, 4908, 1839, 3248, 7983, 2995, 9141, 1718, 823, 1080, 953, 9784, 9151, 9153, 9665, 3651, 7748, 8901, 8262, ...
Validation
5,507
1
National_Location_Code:national location code national location code nlc four-digit number allocated every railway station ticket issuing point great britain use ticketing system british railway network used issue tickets accounting purposes subset nlcs created british rail based four main digits plus two supplementary digits nlcs introduced method accounting attributing costs revenue railway assets quotation taken 14th edition january 1987 national location code listing book published british railways board widespread use computers within british railways advent national computer systems dealing payroll compilation stores recording accounting wagon control traffic data revenue expenditure accounting market traffic surveys etc. need standard location code became increasingly important order meet need asked november 1966 revise update publication known terminals mileage gazetteer code time opportunity taken include sidings yards depots offices administrative centres etc. 'railway activity ... file developed based six-digit code known british railways national location code first published 1 january 1968 six-digit code split two parts first four digits identify location asset cost centre final two give information specific asset base location including stations ticket-issuing locations 00 first four digits two-digit combinations signify types asset first four digits indicating base location relate ticket issuing first four digits used examples 1960s 1970s various ticket issuing systems use quite localised simple numerical code structures covering limited number stations relevant area universal coding system identify stations nlc introduced nlcs began appear certain types ticket southern region mainstay ncr21 almost immediately introduction fully computerised intis intermediate ticket issuing system early 1980s four-digit version nlc became fully established intis tickets partly pre-printed station name printed ticket nlc next machine printed codes origin destination stations top line ticket intis superseded aptis 1986 latter became universal ticket office system next 15–20 years last aptis machines removed march 2007 aptis tickets nlc station issue printed second line irrespective whether journey started example ticket issued brighton nlc 5268 journey gatwick airport london victoria 5268 nlc covered station associated accounting activities everything tickets issued self-service ticket machines ticket office staff wage slips stations site needed treated separate entities allocated different codes london waterloo east serving south eastern division destinations began late 1980s considered separate station main london waterloo nlc 5598 self-service machines got code 5158 revenue could apportioned correctly relevant division privatisation correct train operating company toc railway network privatised mid-1990s need additional nlcs created 1998 brighton supplied two wall-mounted touch-screen machines cubic transportation systems inc. issuing limited range tickets credit card code 8882 given subsequently erstwhile quickfare machines replaced six fastticket touch-screen machines manufactured shere ltd. bore nlc 8882 well whereas ticket office machines smart terminal supplied shere used station original code 5268 location railway revenue expenditure attributed coded 1960s later came existence subsequently codes allocated location fixed mobile issue tickets location ticket issued journey national rail station examples british railways created 1948 split six operating regions became five 1960s eastern london midland western southern scottish distribution nlcs broadly followed pattern southern region divided three divisions south eastern central south western based three pre-grouping companies nlcs allocated approximately following boundaries follows since privatisation need new codes grown much largely stopped allocated geographical basis especially additional codes given station new station given geographically correct code usually station planned time gap left appropriate section codes example lea green nlc 2339 proposed many years name marshalls cross opened 2000 sometimes chandler ford station reopened original code closed coleshill parkway birmingham nuneaton opened 2007 allocated 9882 relates geographically scotland quirks always existed however
[ 5507 ]
Test
5,508
0
Realization_(linguistics):realization linguistics linguistics realization process kind surface representation derived underlying representation way abstract object linguistic analysis comes produced actual language phonemes often said realized speech sounds different sounds realize particular phoneme called allophones realization also subtask natural language generation involves creating actual text human language english french etc syntactic representation number software packages available realization developed academic research groups nlg remainder article concerns realization kind example following java code causes simplenlg system print text women smoke example computer program specified linguistic constituents sentence verb subject also linguistic features plural subject negated information realiser constructed actual sentence realisation involves three kinds processing syntactic realisation using grammatical knowledge choose inflections add function words also decide order components example english subject usually precedes verb negated form smoke smoke morphological realisation computing inflected forms example plural form woman women womans orthographic realisation dealing casing punctuation formatting example capitalising first word sentence examples basic realisers capable considerably complex processing number realisers developed past 20 years systems differ terms complexity sophistication processing robustness dealing unusual cases whether accessed programmatically via api whether take textual representation syntactic structure input also major differences pragmatic factors documentation support licensing terms speed memory usage etc possible describe realisers emerging areas
[ 2440, 3316, 5677 ]
None
5,509
1
Object_Data_Management_Group:object data management group object data management group odmg conceived summer 1991 breakfast object database vendors organized rick cattell sun microsystems 1998 odmg changed name object database management group reflect expansion efforts include specifications object database object-relational mapping products primary goal odmg put forward set specifications allowed developer write portable applications object database object-relational mapping products order data schema programming language bindings data manipulation query languages needed portable 1993 2001 odmg published five revisions specification last revision odmg version 3.0 group disbanded odmg 3.0 published book form 2000 2001 major object database object-relational mapping vendors claimed conformance odmg java language binding compliance components specification mixed 2001 odmg java language binding submitted java community process basis java data objects specification odmg member companies decided concentrate efforts java data objects specification result odmg disbanded 2001 2004 object management group omg granted right revise odmg 3.0 specification omg specification copyright holder morgan kaufmann publishers february 2006 omg announced formation object database technology working group odbt wg plans work 4th generation object database standard
[ 4960, 9665, 679, 8201, 5677, 10413, 9467, 2901, 987 ]
Test
5,510
9
General-purpose_macro_processor:general-purpose macro processor general-purpose macro processor general purpose preprocessor macro processor tied integrated particular language piece software macro processor program copies stream text one place another making systematic set replacements macro processors often embedded programs assemblers compilers sometimes standalone programs used process kind text macro processors used language expansion defining new language constructs expressed terms existing language components systematic text replacements require decision making text reformatting e.g conditional extraction material html file
[ 3904, 3876, 8421, 3462, 5896, 10569, 8554, 10953, 3856, 5456, 5492 ]
None
5,511
9
Benoît_Minisini:benoît minisini benoît minisini french programmer best known programming gambas graphical development environment starting programming twelve became interested writing languages compilers assemblers interpreters interest respect basic programming language caused create gambas inspired visual basic benoît said intended gambas best features visual basic without numerous bugs flaws sees program language benoît part-time software job studied école pour l'informatique et les techniques avancées currently lives paris france
[ 6910, 847 ]
Test
5,512
4
@stake:stake atstake inc. computer security professional services company cambridge massachusetts united states founded 1999 battery ventures tom crotty sunil dhaliwal scott tobin ted julian initial core team technologists included dan geer chief technical officer east coast security team cambridge technology partners including dave goldsmith january 2000 stake acquired l0pht heavy industries known many hacker employees bringing mudge vice president research development domain name atstake.com july 2000 stake acquired cerberus information security limited london england david mark litchfield robert stein-rostaing launchpad europe middle east africa stake subsequently acquired symantec 2004 addition dan geer mudge stake employed many famous security experts including dildog window snyder dave aitel katie moussouris david litchfield mark kriegsman mike schiffman chris wysopal cris thomas joe grand september 2000 stake recruiter contacted mark abene recruit security consultant position recruiter apparently unaware past felony conviction since stake policy hiring convicted hackers mark informed company representative stake could hire saying ran background check caused debate regarding role convicted hackers working security business stake primarily consulting company also offered information security training stake academy created number software security tools symantec later stopped selling lc5 new customers citing us government export regulations discontinued support december 2006 january 2009 l0phtcrack acquired original authors symantec l0phtcrack 6 announced source boston conference march 11 2009 technology underlying smartrisk analyzer extended eventually brought market symantec spinoff veracode symantec announced acquisition stake september 16 2004 completed transaction october 9 2004 several members stake left form computer security company isec partners 2004 former stake academy instructors rob cheyne paul hinkle later formed information security training company safelight security advisors 2007 remaining portion stake consulting group continues operate security advisory services team within symantec security business practice
[ 9217, 6665, 268, 7955, 9214, 10903, 6297, 5282, 6051, 5924, 1573, 1708, 10872, 11065, 2494, 3520, 1861, 4549, 8135, 584, 2378, 8398, 2261, 4956, 9569, 6643, 5111, 1912, 8827, 8572, 2558, 9983 ]
Test
5,513
8
JICWEBS:jicwebs jicwebs joint industry committee web standards created uk ireland media industry ensure independence comparability measurement web effect jicwebs works partnership abce jicwebs deciding whether metrics desirable abce deciding whether practical web metrics intended measure activity web sites site centric fashion include measurements audience reach frequency activity levels including use effectiveness advertising web electronic media
[ 6576, 119 ]
None
5,514
3
Close_(system_call):close system call close system call system call used close file descriptor kernel file systems program terminates access file filesystem using close system call flushes file buffers updates file metadata may include end-of-file indicator data de-allocates resources associated file including file descriptor updates system wide table files use programming languages maintain data structure files opened runtime library may close program terminates practice known resource acquisition initialization raii operating systems invoke codice_1 files held program terminates operating systems invoke codice_1 syscall part operating system recovery result system failure close call standardized posix specification function returns zero indicate file closed successfully error occurs value -1 returned errno appropriately set errors occur include
[ 4616, 3082, 10785, 5154, 9762, 6180, 5158, 8242, 52, 4161, 8772, 6213, 8268, 589, 593, 6244, 5222, 10856, 7274, 4207, 9840, 5244, 4734, 11391, 7821, 4238, 10382, 2711, 6808, 9882, 6813, 1694, 2723, 10407, 1193, 8364, 10933, 5822, 5824, 17...
Test
5,515
9
HTML_scripting:html scripting w3c html standard includes support client-side scripting defines locally executable scripts may used web page particular client-side application web browser may support several script languages script code may executed document loads later time script code written directly html document inside events occur different elements web-page script code may associated event element writing code html attribute name attribute must supported intrinsic event element example onload script executed whenever event occurs element scripts mostly javascript html intrinsic event model consist following events browsers support additional event attributes outside standard netscape navigator supported feature called javascript entities script macros script code could included html attribute values using syntax similar character entity references example code codice_1 calls javascript prompt function ask user wide image html 4.01 specification reserves syntax future support script macros html attributes incorporated later standards supported current browser polyfill entities.js created order allow script macros browsers natively support feature
[ 3462, 9780, 119, 8923, 124, 4893 ]
Validation
5,516
4
Distributed_firewall:distributed firewall firewall system group systems router proxy gateway implements set security rules enforce access control two networks protect inside network outside network may hardware device software program running secure host computer either case must least two network interfaces one network intended protect one network exposed firewall sits junction point gateway two networks usually private network public network internet conventional firewalls rely notions restricted topology control entry points function precisely rely assumption everyone one side entry point—the firewall—is trusted anyone side least potentially enemy distributed firewalls host-resident security software applications protect enterprise network servers end-user machines unwanted intrusion offer advantage filtering traffic internet internal network enables prevent hacking attacks originate internet internal network important costly destructive attacks still originate within organization like personal firewalls except offer several important advantages like central management logging cases access-control granularity features necessary implement corporate security policies larger enterprises policies defined pushed enterprise-wide basis feature distributed firewalls centralized management ability populate servers end-users machines configure push consistent security policies helps maximize limited resources ability gather reports maintain updates centrally makes distributed security practical distributed firewalls help two ways remote end-user machines secured secondly secure critical servers network preventing intrusion malicious code jailing code letting protected server used launch pad expanded attacks usually deployed behind traditional firewall provide second layer defense work enabling essential traffic machine protect prohibiting types traffic prevent unwanted intrusions whereas perimeter firewall must take generalist common denominator approach protecting servers network distributed firewalls act specialists problems conventional firewalls lead distributed firewalls follows due increasing line speeds computation intensive protocols firewall must support firewalls tend become congestion points gap processing networking speeds likely increase least foreseeable future computers hence firewalls getting faster combination complex protocols tremendous increase amount data must passed firewall likely continue pace moore law exist protocols new protocols designed difficult process firewall latter lacks certain knowledge readily available endpoints ftp realaudio two protocols although exist application-level proxies handle protocols solutions viewed architecturally “ unclean ” cases invasive likewise dependence network topology pf enforce policy traffic traverses thus traffic exchanged among nodes protected network controlled gives attacker already insider somehow bypass firewall complete freedom act worse yet become trivial anyone establish new unauthorized entry point network without administrator knowledge consent various forms tunnels wireless dial-up access methods allow individuals establish backdoor access bypasses security mechanisms provided traditional firewalls firewalls general intended guard misbehavior insiders tension internal needs connectivity difficulty satisfying needs centralized firewall ipsec protocol suite recently standardized ietf provides network-layer security services packet confidentiality authentication data integrity replay protection automated key management artifact firewall deployment internal traffic seen firewall filtered result internal users mount attacks users networks without firewall able intervene large networks today tend large number entry points performance failover reasons furthermore many sites employ internal firewalls provide form compartmentalization makes administration particularly difficult practical point view regard policy consistency since unified comprehensive management mechanism exists end-to-end encryption also threat firewalls prevents looking packet fields necessary filtering allowing end-to-end encryption firewall implies considerable trust users behalf administrators finally increasing need finer-grained access control standard firewalls readily accommodate without greatly increasing complexity processing requirements distributed firewalls host-resident security software applications protect enterprise network critical endpoints unwanted intrusion servers end-user machines concept security policy defined centrally enforcement policy takes place endpoint hosts routers etc. usually deployed behind traditional firewall provide second layer protection since hosts inside trusted equally machines subverted used launch attacks hosts especially trusted hosts protocols like rlogin thus faithful effort industry security organizations move towards system aspects desktop firewall centralized management like distributed firewalls distributed host-resident firewalls prevent hacking pc use entry point enterprise network compromised pc make whole network vulnerable attacks hacker penetrate enterprise network uncontested steal corrupt corporate assets distributed firewalls often kernel-mode applications sit bottom osi stack operating system filter traffic regardless origin—the internet internal network treat internet internal network unfriendly guard individual machine way perimeter firewall guards overall network distributed firewalls rest three notions basic idea simple compiler translates policy language internal format system management software distributes policy file hosts protected firewall incoming packets accepted rejected inside host according policy cryptographically-verified identity sender one often used term case network security particular distributed firewall policy essential know policies “ security policy ” defines security rules system without defined security policy way know access allowed disallowed simple example firewall distribution policy different varies implementation either directly pushed end systems pulled necessary hosts booting pings central management server check whether central management server active registers central management server requests policies implement central management server provides host security policies example license server security clearance server asked certain communication permitted conventional firewall could lacks important knowledge context request end systems may know things like files involved security levels might information could carried network protocol adding complexity push technique employed policies updated central management side network administrator hosts updated immediately push technology ensures hosts always updated policies time policy language defines inbound outbound connections component network policy domain allowed affect policy decisions layer network rejecting passing certain packets enforcing policies application layer central management component distributed firewalls makes practical secure enterprise-wide servers desktops laptops workstations central management provides greater control efficiency decreases maintenance costs managing global security installations feature addresses need maximize network security resources enabling policies centrally configured deployed monitored updated single workstation distributed firewalls scanned understand current operating policy determine updating required policy distribution scheme guarantee integrity policy transfer distribution policy different varies implementation either directly pushed end systems pulled necessary security policies transmitted central management server implemented host host end part distributed firewall provide administrative control network administrator control implementation policies host allows traffic based security rules implemented distributed firewalls strengths weaknesses compared conventional firewalls far biggest difference course reliance topology network topology permit reliance traditional firewall techniques little choice interesting question two types compare closed single-entry network either work reason choose one types firewalls excellent rejecting connection requests inappropriate services conventional firewalls drop requests border distributed firewalls host interesting question noticed host attempting connect today packets typically discarded notification distributed firewall may choose discard packet assumption legal peers know use ipsec alternatively may instead send back response requesting connection authenticated turn gives notice existence host firewalls built pure packet filters reject stealth scans well one technique example uses fragmented packets pass unexamined port numbers n't present first fragment distributed firewall reassemble packet reject balance sort threat two firewall types least comparable network addresses favored concept using cryptographic mechanisms likely prevents attacks based forged source addresses assumption trusted repository containing necessary credentials subject compromise problems solved conventional firewalls corresponding rules discarding packets network perimeter prevent attacks originating inside network policy domain spread use distributed object-oriented systems like corba client-side use java weaknesses mail readers like wide variety threats residing application intermediate level communication traffic firewall mechanisms perimeter come useful inspecting incoming e-mails known malicious code fingerprints confronted complex thus resource-consuming situations making decisions code like java using framework distributed firewall especially considering policy language allows policy decision application level circumvent problems condition contents communication packets interpreted semantically policy verifying mechanisms stateful inspection packets shows easily adapted requirements allows finer granularity decision making furthermore malicious code contents may completely disguised screening unit network perimeter given use virtual private networks enciphered communication traffic general completely disable policy enforcement conventional firewalls many firewalls detect attempted intrusions functionality provided distributed firewall individual host notice probes forward central location processing correlation former problem hard many hosts already log attempts one make good case detection done event collection problematic especially times poor connectivity central site also risk coordinated attacks effect causing denial-of-service attack central machine given natural view conventional firewall network topology consisting inside outside problems arise one members policy network domain compromised perimeter firewalls enforce policies distinct networks show option circumvent problems arise situation discussed given distributed firewalls independence topological constraints supports enforcement policies whether hosts members outsiders overall policy domain base decisions authenticating mechanisms inherent characteristics networks layout moreover compromise endpoint either legitimate user intruder weaken overall network way leads directly compromise machines given fact deployment virtual private networks prevents sniffing communication traffic attacked machine involved side end-point nearly problems arise conventional firewalls assuming machine taken adversary must lead conclusion policy enforcement mechanisms self may broken installation backdoors machine done quite easily security mechanisms flawed lack perimeter firewall trusted entity anymore might prevent arbitrary traffic entering leaving compromised host additionally use tools like ssh like allow tunneling applications communication prevented without proper knowledge decrypting credentials moreover given fact case attack shown successfully verifying mechanisms self may trusted anymore first glance biggest weakness distributed firewalls greater susceptibility lack cooperation users happens someone changes policy files distributed firewalls reduce threat actual attacks insiders simply making easier set smaller groups users thus one restrict access file server users need rather letting anyone inside company pound also worth expending effort prevent casual subversion policies policies stored simple ascii file user wishing example play game could easily turn protection requiring would-be uncooperative user go trouble probably worthwhile even mechanism theoretically insufficient example policies could digitally signed verified frequently-changing key awkward-to-replace location stringent protections policy enforcement incorporated tamper-resistant network card
[ 225, 2273, 7364, 8998, 2409, 107, 939, 9868, 4725, 5749, 8504, 4956, 3742 ]
Test
5,517
4
Paramount_Defenses:paramount defenses paramount defenses privately held american cyber security company develops cyber security solutions help organizations secure foundational microsoft active directory deployments company founded 2006 sanjay tandon former microsoft program manager active directory security company headquartered newport beach california led founder operates guidance advisory board amongst others includes karen worstell former microsoft chief information security officer ciso donald codling former unit chief liaison federal bureau investigation fbi cyber division department homeland security national cyber security division company also known paramount brief executive summary declassified 2016 describes serious cyber security risk potentially impacts foundational cyber security 85 organizations worldwide paramount defenses founded 2006 2013 united states patent office awarded founder cyber security patent governing accurate determination effective access information systems
[ 929 ]
Test
5,518
7
Fabric_computing:fabric computing fabric computing unified computing involves constructing computing fabric consisting interconnected nodes look like weave fabric viewed/envisaged collectively distance usually phrase refers consolidated high-performance computing system consisting loosely coupled storage networking parallel processing functions linked high bandwidth interconnects 10 gigabit ethernet infiniband term also used describe platforms azure services platform grid computing general common theme interconnected nodes appear single logical unit fundamental components fabrics nodes processor memory and/or peripherals links functional connections nodes term fabric also used association storage area networks switched fabric networking introduction compute resources provides complete unified computing system terms used describe fabrics include unified fabric data center fabric unified data center fabric ian foster director computation institute argonne national laboratory university chicago suggested 2007 grid computing 'fabrics poised become underpinning next-generation enterprise architectures used much greater part many organizations term use since mid late 1990s growth cloud computing cisco evangelism unified data center fabrics followed unified computing evolutionary data center architecture whereby blade servers integrated unified supporting network storage infrastructure starting march 2009 renewed interest technology companies offering unified fabric computing systems include liquid computing corporation egenera mixed reactions cisco architecture particularly rivals claim proprietary systems lock vendors analysts claim ambitious new direction big risk companies ibm hp previously partnered cisco data center projects accounting 2–3bn cisco annual revenue competing 2007 wombat financial software launched wombat data fabric first commercial off-the-shelf software platform providing high performance low-latency rdma-based messaging across infiniband switch main advantages fabrics massive concurrent processing combined huge tightly coupled address space makes possible solve huge computing problems presented delivery cloud computing services scalable able dynamically reconfigured challenges include non-linearly degrading performance curve whereby adding resources linearly increase performance common problem parallel computing maintaining security
[ 7173, 9739, 7699, 5655, 10781, 8231, 7218, 2623, 2113, 7234, 3142, 2638, 1122, 4194, 3175, 8815, 630, 8822, 7802, 7313, 6815, 8352, 5793, 6818, 6821, 7852, 9391, 7858, 9911, 8890, 4286, 2241, 2243, 5329, 10966, 731, 7911, 10985, 9964, 535...
Validation
5,519
9
Object_Lisp:object lisp object lisp computer programming language dialect lisp language object-oriented extension lisp dialect lisp machine lisp designed lisp machines inc object lisp also early example prototype-based programming seen competitor object-oriented extensions lisp around time flavors use symbolics common objects developed hewlett-packard commonloops use xerox object lisp also used early versions macintosh common lisp user interface toolkit written using object lisp 14 december 1985 net.lang.lisp usenet post common lisp meeting boston 9-11 december 1985 discusses object lisp objectlisp user manual g. drescher lmi 1985
[ 7267, 6502, 8262, 5384, 7880, 5360, 10104, 4122, 989 ]
None
5,520
2
Macintosh_startup:macintosh startup classic macintosh startup sequence included startup chime happy mac sad mac chimes death done away time release 2016 macbook pro eliminated final remaining startup feature startup chime favor discrete sequence black background audible indicators despite use security feature provided user-friendly audible verification computer nvram configuration authentic apple added startup chime back release 2017 macbook air macintosh startup chime played power-up trying boot operating system sound indicates diagnostic tests run immediately startup found hardware fundamental software problems specific sound differs depending rom greatly varies depending macintosh model first sound version first three macintosh models simple square-wave beep subsequent sounds various chords mark lentczner created code arpeggiated chord used macintosh ii variations sound used jim reekes created startup chime used quadra 700 quadra 800 reekes said startup sound done home studio korg wavestation ex c major chord played hands stretched wide possible 3rd top recall created sound annoyed tri-tone startup chimes felt associated death chimes computer crashes recalls apple give permission change sound secretly snuck sound computers help engineers charge rom chips apple found refused change using various claims order keep new sound intact also creator iconic earconic calls bong startup chime used macintoshes since quadra 840av slightly lower-pitched version chime used pci-based power macs imac g3 macintosh lc lc ii macintosh classic ii use reekes chime instead using f major chord produces ding sound first generation power macintosh computers also use reekes chime instead using chord strummed yamaha 12-string acoustic guitar jazz guitarist stanley jordan power macintosh 5200–6300 computers excluding 5400 5500 bong chime like one used pci-based power macs use unique chime also used television commercials power macintosh powerbook series 1995 1998 20th anniversary macintosh uses another unique sound models built prior introduction power macintosh 1994 sad mac icon error code distinctive sounds displayed failure initial self-diagnostic tests phenomenon referred chimes death chime mac computers 1998-2016 chime used first imac g3 chord f-sharp major chord produced pitch-shifting 840av sound mac startup chime registered trademark united states featured 2008 film wall-e titular robot character fully recharged solar panels well 2007 brad paisley song online apple removed startup chime starting late 2016 macbook pro apple since updated support documentation reflect change removing references startup chime nvram reset instructions model happy mac normal bootup startup icon apple macintosh computer running older versions mac operating system designed susan kare 1980s drawing inspiration design compact macintosh series batman character two-face icon remained unchanged introduction new world rom macs updated 8-bit color happy mac indicates booting successfully begun whereas sad mac along chimes death melody one beeps indicates hardware problem macintosh boots mac os 9 lower system play startup chime screen turn gray happy mac icon appear followed mac os splash screen small welcome macintosh screen system 7.5 earlier underwent several stylistic changes mac os versions 8.6 later also includes version number splash screen example welcome mac os 8.6 early macs internal hard drive computer boots point needs load operating system floppy disk user inserts correct disk mac displays floppy icon blinking question mark later macs folder icon question mark repeatedly changes finder icon shown system folder boot loader file found startup disk introduction mac os x addition blinking system folder icon prohibition icon added show incorrect os version found bomb screen replaced kernel panic originally colored white changed black version 10.3 mac os x 10.1 new happy mac included also last version happy mac icon version 10.2 happy mac symbol replaced apple logo face id logo iphone x based happy mac sad mac symbol used older-generation apple macintosh computers hardware using old world rom open firmware predating onboard usb starting original 128k macintosh ending last nubus-based power macintosh models including first-generation 6100 7100 8100 well powerbook 5300 1400 indicate severe hardware software problem prevented startup occurring successfully sad mac icon displayed along set hexadecimal codes indicate type problem startup different codes different errors used place normal happy mac icon indicates startup-time hardware tests successful 68k models made macintosh ii chimes death played models prior macintosh ii crash silently display sad mac without playing tone powerpc macs play sound effect car crash computers equipped powerpc upgrade card use three note brass fanfare death chime e-natural e-flat followed sound drum macintosh performa 6200 macintosh performa 6300 sad mac may deliberately generated startup pressing interrupt switch macintosh computers one installed pressing command power keys shortly startup chime macintoshes powerbook 540c user presses command power keys boot screen displays play chimes death chimes fraction normal speed sad mac displayed old world rom power macintosh powerbook models based pci architecture use sad mac icon instead play error/car-crash sound hardware failure missing bad memory unusable cpu similar mac os x 10.2 later use universal symbol denote hardware software error renders computer non-bootable ipod damage error occurs hardware firmware example files deleted sad ipod appears similar sad mac instead macintosh ipod chimes death icon also lacks nose frown flipped horizontally also show hexadecimal codes indicating problem occurred ipod error screen show problem occurs newer ipods chimes death macintosh equivalent beep code ibm pc compatibles macintosh models predating adoption pci open firmware chimes death often accompanied sad mac icon middle screen different macintosh series used different death chimes macintosh ii first use death chimes loud eerie upward major arpeggio different chimes many models macintosh quadra centris performa lc macintosh classic played generally softer lower pitched version upward major arpeggio followed three four notes slight variation depending model macintosh powerbook 5300 190 1400 used second half 8-note arpeggio found quadra centris models entire death chime error occurred screen lights macintosh quadra av660 centris av660 used sound single pass roland d-50 digital native dance sample loop nubus based power macintosh models including 6100 7100 8100 series used car crash sound power macintosh performa 6200 6300 series along power macintosh upgrade card used eerily dramatic 3-note brass fanfare rhythm drums cymbals pre-g3 pci power macs beige g3 power macs g3 all-in-one powerbook 2400 3400 g3 used sound glass shattering models display sad mac icon since introduction imac 1998 chimes death longer used replaced series tones indicate hardware errors
[ 4741, 1542, 3977, 2571, 3598, 5520, 3474, 10130, 8852, 11037, 1694, 8222, 6048, 8480, 7842, 11171, 7335, 6319, 7983, 8625, 8114, 11444, 1592, 9919, 576, 10691, 7163, 713, 9035, 213, 9686, 6234, 10333, 3167, 9700, 4581, 6377, 4844, 5744, 6...
None
5,521
9
Comparison_of_programming_languages_(associative_array):comparison programming languages associative array comparison programming languages associative arrays compares features associative array data structures array-lookup processing 39 various computer programming languages following comparison associative arrays also mapping hash dictionary various programming languages awk built-in language-level support associative arrays example also loop associated array follows also check element associative array delete elements associative array multi-dimensional associative arrays simulated standard awk using concatenation e.g subsep standard implementation associative array c 3rd party library bsd license available archived source code available posix 1003.1-2001 describes functions codice_1 codice_2 codice_3 another 3rd party library uthash also creates associative arrays c structures structure represents value one structure fields acts key finally glib library also supports associative arrays along many advanced data types recommended implementation gnu project similar glib apple cross-platform core foundation framework provides several basic data types particular reference counted cfdictionary cfmutabledictionary dictionary also initialized entries construction called object initialization foreach loop enumerate entire collection guarantee order order matters programmer could choose use sorteddictionary use .sort linq extension method c++ also form associative array called codice_4 see standard template library containers one could create map information using c++ following code less efficiently creates temporary codice_5 values extension initialization lists c++11 entries added map construction shown iterate list following code c++03 task new c++11 using structured binding available c++17 c++ codice_4 class templated allows data types keys values different different codice_7 instances given instance codice_7 class keys must base type must true values although codice_4 typically implemented using self-balancing binary search tree c++11 defines second map called codice_10 algorithmic characteristics hash table common vendor extension stl well usually called codice_11 available implementations sgi stlport structure cfml equivalent associative array initializing empty dictionary adding items alternatively dictionary initialized items construction dictionary enumerated for-loop guaranteed order offers direct support associative arrays core language – implemented chaining hash table binary trees equivalent example would keys values types keys associative array must type values also loop properties associated values i.e follows property removed follows delphi supports several standard generic containers including tdictionary versions delphi prior 2009 offer direct support associative arrays however simulate associative arrays using tstrings class example erlang offers many approaches represent mappings two common standard library keylists dictionaries keylists lists tuples first element tuple key second value functions operating keylists provided codice_12 module accessing element keylist done codice_13 function dictionaries implemented codice_14 standard library new dictionary created using codice_15 function new key/value pairs stored using codice_16 function serial initialization would idiomatically represented erlang appropriate function dictionary accessed using codice_17 function cases erlang term used key variations include codice_18 module implementing ordered dictionaries codice_19 implementing general balanced trees f constructs maps lists sequences arrays tuples using functions provided map module f represents tuple two elements separated comma list sequence elements enclosed square brackets separated semi-colons values looked via one codice_20 functions codice_21 returns option type value codice_22 successful lookup codice_23 unsuccessful one pattern matching used extract raw value default result example codice_24 value contain string codice_25 f .net language also access features .net framework including codice_26 objects codice_27 objects used purpose c visual basic objects may preferred writing code intended linked languages .net framework visual foxpro implements mapping collection class getkey returns 0 key found see collection foxpro help details go built-in language-level support associative arrays called maps map key type may boolean numeric string array struct pointer interface channel type map type written like map keytype valuetype adding elements one time map literal iterating map haskell programming language report provides one kind associative container list pairs output note lookup function returns maybe value nothing found result found ghc commonly used implementation haskell provides two types associative containers implementations might also provide one polymorphic functional maps represented immutable balanced binary trees output specialized version integer keys also exists data.intmap finally polymorphic hash table output lists pairs functional maps provide purely functional interface idiomatic haskell contrast hash tables provide imperative interface io monad java associative arrays implemented maps part java collections framework since j2se 5.0 introduction generics java collections type specified example associative array mapping strings strings might specified follows method used access key example value expression codice_28 codice_25 code uses hash map store associative array calling constructor class however since code uses methods common interface one could also use self-balancing binary tree calling constructor class implements subinterface without changing definition codice_30 variable rest code use number underlying data structures implement codice_31 interface hash function java used hashmap hashset provided method since every class java inherits every object hash function class override default implementation codice_32 provide custom hash function based properties object codice_33 class also contains method tests object equality another object hashed data structures java rely objects maintaining following contract codice_32 codice_35 methods two objects b order maintain contract class overrides codice_35 must also override codice_32 maybe vice versa codice_32 based properties subset properties codice_35 contract hashed data structures object results codice_32 codice_35 methods change object inserted map reason generally good practice base hash function immutable properties object analogously treemap sorted data structures requires ordering defined data type either data type must already defined ordering implementing interface custom must provided time map constructed hashmap relative ordering keys treemap change inserted map javascript standardized version ecmascript prototype-based object-oriented language javascript object mapping property names values—that associative array one caveat since property names strings string coerced integer keys allowed difference objects also include one feature unrelated associative arrays prototype link object inherit lookup property forward lookup prototype object define property object literal written codice_42 example property name valid identifier quotes omitted e.g lookup written using property access notation either square brackets always works dot notation works identifier keys also loop enumerable properties associated values follows property removed follows mentioned properties strings however since every native object primitive implicitly converted string object including built-in objects array dynamically extended new properties example modern javascript considered bad form use array type associative array consensus object type best purpose reasoning behind array extended via prototype object kept pristine 'for loops work expected associative 'arrays issue drawn focus popularity javascript frameworks make heavy sometimes indiscriminate use prototype extend javascript inbuilt types see javascript array object prototype awareness day information issue declare dictionary access element add element delete element get keys values iterables definition dereference lisp originally conceived list processing language one important data types linked list treated association list alist syntax codice_43 used indicate codice_44ed pair keys values need type within alist lisp scheme provide operators codice_45 manipulate alists ways similar associative arrays linear nature alists used relatively small sets data common lisp also supports hash table data type scheme implemented srfi 69 hash tables greater overhead alists provide much faster access many elements easy construct composite abstract data types lisp using structures and/or object-oriented programming features conjunction lists arrays hash tables lpc implements associative arrays fundamental type known either map mapping depending driver keys values type mapping literal written codice_46 procedural use looks like mappings accessed reading using indexing operator way writing shown phone_book sally smart would return string 555-9999 phone_book john smith would return 0 testing presence done using function member e.g codice_47 deletion accomplished using function called either m_delete map_delete depending driver used like codice_48 lpc drivers amylaar family implement multivalued mappings using secondary numeric index drivers mudos family support multivalued mappings example syntax lpc drivers modern enough support foreach construct allow iteration mapping types using lua table fundamental type used either array numerical index fast associative array keys values type except nil following focuses non-numerical indexes table literal written codice_49 example key valid identifier keyword quotes omitted case sensitive lookup written using either square brackets always works dot notation works identifier keys also loop keys associated values iterators loops entry removed setting nil likewise overwrite values add mathematica uses association expression represent associative arrays access keys strings key keyword necessary list keys values mumps every array associative array built-in language-level direct support associative arrays applies private process-specific arrays stored memory called locals well permanent shared arrays stored disk available concurrently multiple jobs name globals preceded circumflex distinguish local variable names access value element simply requires using name subscript also loop associated array follows cocoa api gnustep handle associative arrays using codice_50 mutable version codice_51 class cluster class allows assignments two objects made copy key object made inserted codice_50 therefore keys must conform codice_53 protocol inserted dictionary value object receives retain message increase reference count value object receive release message deleted dictionary explicitly adding dictionary different object key keys added creation lookup written using codice_54 notation using codice_55 action also loop keys values codice_56 key removed using codice_57 rexx associative arrays called stem variables compound variables stem variables numeric keys typically start 1 go 0 key stem variable used convention count items whole stem rexx easy way automatically accessing keys stem variable typically keys stored separate associative array numeric keys ruby hash used follows ruby supports hash looping iteration following syntax ruby also supports many useful operations hashes merging hashes selecting rejecting elements meet criteria inverting swapping keys values flattening hash array s-lang associative array type example also loop associated array number ways one print sorted-list better take advantage s-lang strong support standard arrays scala provides immutable map class part scala.collection framework scala type inference work codice_58 access array returns option type scala equivalent maybe monad haskell smalltalk dictionary used access entry message codice_59 sent dictionary object gives dictionary hashes/compares based equality holds strong references key value variants exist hash/compare identity identitydictionary keep weak references weakkeydictionary weakvaluedictionary every object implements hash object used key course also value snobol one first first programming languages use associative arrays associative arrays snobol called tables sml'97 standard standard ml programming language provide associative containers however various implementations standard ml provide associative containers library popular standard ml new jersey implementation provides signature somewhat like interface codice_60 defines common interface ordered functional immutable associative arrays several general functors codice_61 codice_62 codice_63 codice_64 allow create corresponding type ordered map types self-balancing binary search tree sorted association list red-black tree splay tree respectively using user-provided structure describe key type comparator functor returns structure follows codice_60 interface addition two pre-defined modules associative arrays integer keys codice_66 codice_67 sml/nj also provides polymorphic hash table monomorphic hash tables also supported using codice_68 functor another standard ml implementation moscow ml also provides associative containers first provides polymorphic hash tables codice_69 structure also functional maps sml/nj library available codice_70 codice_71 codice_72 structures two tcl facilities support associative array semantics array collection variables dict full implementation associative arrays dict look item iterate dict array literal space character variable name must grouped using either curly brackets substitution performed double quotes substitution performed alternatively several array elements set single command providing mappings list words containing whitespace braced access one array entry put standard output result retrieve entire array dictionary result order keys unspecified dictionary unordered array standard implementation common dialects visual basic use dictionary class microsoft scripting runtime shipped visual basic 6 visual basic .net relies collection classes provided .net framework unlike many command line interpreters powershell built-in language-level support defining associative arrays example like javascript property name valid identifier quotes omitted e.g entries separated either semicolon newline e.g keys values .net object type e.g also possible create empty associative array add single entries even associative arrays later new entries also added using array index operator property operator codice_73 method underlying .net object dereference assigned objects array index operator property operator parameterized property codice_74 .net object used loop associative array follows entry removed using codice_75 method underlying .net object hash tables added e.g many data serialization formats also support associative arrays see table json associative arrays also referred objects keys strings yaml associative arrays also called map elements key-value pairs yaml places restrictions type keys particular restricted scalar string values
[ 2304, 6016, 3076, 4101, 3462, 8582, 1931, 2062, 6414, 6160, 5521, 10510, 8854, 3736, 11674, 1435, 155, 10145, 11555, 3876, 5796, 7076, 5677, 5806, 9008, 692, 3765, 8628, 7479, 10043, 10684, 6718, 6335, 963, 8644, 8262, 5961, 1610, 1611, 9...
None
5,522
2
Android_Froyo:android froyo android froyo sixth version android codename android mobile operating system developed google spanning versions 2.2 2.2.3 versions longer supported unveiled may 20 2010 google i/o 2010 conference one prominent changes froyo release usb tethering wi-fi hotspot functionality changes include support android cloud device messaging c2dm service enabling push notifications additional application speed improvements implemented jit compilation displayed within applications top-of-the-screen banners new features introduced froyo include following
[ 5637, 8719, 3600, 7700, 9244, 11294, 11304, 1578, 10284, 5677, 1083, 6212, 69, 8262, 4683, 4685, 11343, 3664, 8280, 8285, 2658, 8821, 11391, 1670, 7816, 5262, 10393, 8858, 7835, 673, 8870, 1191, 1203, 7359, 196, 3269, 3782, 8907, 2259, 37...
Test
5,523
3
Itanium:itanium itanium family 64-bit intel microprocessors implement intel itanium architecture formerly called ia-64 intel markets processors enterprise servers high-performance computing systems itanium architecture originated hewlett-packard hp later jointly developed hp intel itanium-based systems produced hp hp integrity servers line several manufacturers 2008 itanium fourth-most deployed microprocessor architecture enterprise-class systems behind x86-64 power isa sparc february 2017 intel released current generation test customers may began shipping volume last processor itanium family intel officially announced end life product discontinuance itanium cpu family january 30th 2019 1989 hp determined reduced instruction set computing risc architectures approaching processing limit one instruction per cycle hp researchers investigated new architecture later named explicitly parallel instruction computing epic allows processor execute multiple instructions clock cycle epic implements form long instruction word vliw architecture single instruction word contains multiple instructions epic compiler determines advance instructions executed time microprocessor simply executes instructions need elaborate mechanisms determine instructions execute parallel goal approach twofold enable deeper inspection code compile time identify additional opportunities parallel execution simplify processor design reduce energy consumption eliminating need runtime scheduling circuitry hp believed longer cost-effective individual enterprise systems companies develop proprietary microprocessors partnered intel 1994 develop ia-64 architecture derived epic intel willing undertake large development effort ia-64 expectation resulting microprocessor would used majority enterprise systems manufacturers hp intel initiated large joint development effort goal delivering first product merced 1998 development intel hp industry analysts predicted ia-64 would dominate servers workstations high-end desktops eventually supplant risc complex instruction set computing cisc architectures general-purpose applications compaq silicon graphics decided abandon development alpha mips architectures respectively favor migrating ia-64 several groups ported operating systems architecture including microsoft windows openvms linux hp-ux solaris tru64 unix monterey/64 latter three canceled reaching market 1997 apparent ia-64 architecture compiler much difficult implement originally thought delivery timeframe merced began slipping intel announced official name processor itanium october 4 1999 within hours name itanic coined usenet newsgroup reference rms titanic unsinkable ocean liner sank maiden voyage 1912 itanic since often used register others imply multibillion-dollar investment itanium—and early hype associated it—would followed relatively quick demise time itanium released june 2001 performance superior competing risc cisc processors itanium competed low-end primarily four-cpu smaller systems servers based x86 processors high-end ibm power sun microsystems sparc processors intel repositioned itanium focus high-end business hpc computing attempting duplicate x86 successful horizontal market i.e. single architecture multiple systems vendors success initial processor version limited replacing pa-risc hp systems alpha compaq systems mips sgi systems though ibm also delivered supercomputer based processor power sparc remained strong 32-bit x86 architecture continued grow enterprise space building economies scale fueled enormous installed base thousand systems using original merced itanium processor sold due relatively poor performance high cost limited software availability recognizing lack software could serious problem future intel made thousands early systems available independent software vendors isvs stimulate development hp intel brought next-generation itanium 2 processor market year later itanium 2 processor released 2002 marketed enterprise servers rather whole gamut high-end computing first itanium 2 code-named mckinley jointly developed hp intel relieved many performance problems original itanium processor mostly caused inefficient memory subsystem mckinley contains 221 million transistors 25 million logic measured 19.5 mm 21.6 mm 421 mm fabricated 180 nm bulk cmos process six layers aluminium metallization 2003 amd released opteron cpu implements 64-bit architecture called amd64 opteron gained rapid acceptance enterprise server space provided easy upgrade x86 influence microsoft intel responded implementing amd x86-64 instruction set architecture instead ia-64 xeon microprocessors 2004 resulting new industry-wide de facto standard intel released new itanium 2 family member codenamed madison 2003 madison used 130 nm process basis new itanium processors montecito released june 2006 march 2005 intel announced working new itanium processor codenamed tukwila released 2007 tukwila would four processor cores would replace itanium bus new common system interface would also used new xeon processor later year intel revised tukwila delivery date late 2008 november 2005 major itanium server manufacturers joined intel number software vendors form itanium solutions alliance promote architecture accelerate software porting alliance announced members would invest 10 billion itanium solutions end decade 2006 intel delivered montecito marketed itanium 2 9000 series dual-core processor roughly doubled performance decreased energy consumption 20 percent intel released itanium 2 9100 series codenamed montvale november 2007 may 2009 schedule tukwila follow-on revised release oems planned first quarter 2010 itanium 9300 series processor codenamed tukwila released february 8 2010 greater performance memory capacity device uses 65 nm process includes two four cores 24 mb on-die caches hyper-threading technology integrated memory controllers implements double-device data correction helps fix memory errors tukwila also implements intel quickpath interconnect qpi replace itanium bus-based architecture peak interprocessor bandwidth 96 gb/s peak memory bandwidth 34 gb/s quickpath processor integrated memory controllers interfaces memory directly using qpi interfaces directly connect processors i/o hubs quickpath also used intel processors using nehalem microarchitecture possibly enabled tukwila nehalem use chipsets tukwila incorporates four memory controllers supports multiple ddr3 dimms via separate memory controller much like nehalem-based xeon processor code-named beckton itanium 9500 series processor codenamed poulson follow-on processor tukwila released november 8 2012 according intel skips 45 nm process technology uses 32 nm process technology features eight cores 12-wide issue architecture multithreading enhancements new instructions take advantage parallelism especially virtualization poulson l3 cache size 32 mb l2 cache size 6 mb 512 kb 256 kb per core die size 544 mm² less predecessor tukwila 698.75 mm² isscc 2011 intel presented paper called 32nm 3.1 billion transistor 12-wide-issue itanium processor mission critical servers given intel history disclosing details itanium microprocessors isscc paper likely referred poulson analyst david kanter speculated poulson would use new microarchitecture advanced form multithreading uses two threads improve performance single threaded multithreaded workloads information also released hot chips conference information presented improvements multithreading resiliency improvements intel instruction replay ras new instructions thread priority integer instruction cache prefetching data access hints intel product change notification pcn 111456-01 lists four models itanium 9500 series cpu later removed revised document parts later listed intel material declaration data sheets mdds database intel later posted itanium 9500 reference manual models following 2012 hewlett-packard co. v. oracle corp. support lawsuit court documents unsealed santa clara county court judge revealed 2008 hewlett-packard paid intel around 440 million keep producing updating itanium microprocessors 2009 2014 2010 two companies signed another 250 million deal obliged intel continue making itanium cpus hp machines 2017 terms agreements hp pay chips gets intel intel launches tukwila poulson kittson kittson+ chips bid gradually boost performance platform rumors successor poulson code named kittson began circulate 2012–2013 first associated forthcoming 22 nm process shrink later revised face declining itanium sales less-ambitious 32 nm node april 2015 intel although yet confirmed formal specifications confirm continued work project meanwhile aggressively multicore xeon e7 platform displaced itanium-based solutions intel roadmap july 2016 hp spin-off hewlett packard enterprise hpe announced computer world kittson would released mid-2017 february 2017 intel reported shipping kittson test customers plans ship volume later year intel officially launched itanium 9700 series processor family may 11 2017 notably kittson microarchitecture improvements poulson higher clock speeds intel announced 9700 series last itanium chips produced models comparison xeon family server processors itanium never high-volume product intel intel release production numbers one industry analyst estimated production rate 200,000 processors per year 2007 according gartner inc. total number itanium servers processors sold vendors 2007 55,000 unclear whether clustered servers counted single server compares 417,000 risc servers spread across risc vendors 8.4 million x86 servers idc reports total 184,000 itanium-based systems sold 2001 2007 combined power/sparc/itanium systems market idc reports power captured 42 revenue sparc captured 32 itanium-based system revenue reached 26 second quarter 2008 according idc analyst 2007 hp accounted perhaps 80 itanium systems revenue according gartner 2008 hp accounted 95 itanium sales hp itanium system sales annual rate 4.4bn end 2008 declined 3.5bn end 2009 compared 35 decline unix system revenue sun 11 drop ibm x86-64 server revenue increase 14 period december 2012 idc released research report stating itanium server shipments would remain flat 2016 annual shipment 26,000 systems decline 50 compared shipments 2008 2006 hp manufactured least 80 itanium systems sold 7,200 first quarter 2006 bulk systems sold enterprise servers machines large-scale technical computing average selling price per system excess us 200,000 typical system uses eight itanium processors 2012 manufacturers offered itanium systems including hp bull nec inspur huawei addition intel offered chassis could used system integrators build itanium systems 2015 hp supplied itanium-based systems hp split late 2015 itanium systems branded integrity handled hewlett-packard enterprise hpe recent major update 2017 integrity i6 hp-ux 11i v3 update 16 hpe also supports operating systems including windows server 2008 r2 linux openvms nonstop itanium affected spectre meltdown itanium bus interfaces rest system via chipset enterprise server manufacturers differentiate systems designing developing chipsets interface processor memory interconnections peripheral controllers chipset heart system-level architecture system design development chipset costs tens millions dollars represents major commitment use itanium ibm created chipset 2003 intel 2002 neither developed chipsets support newer technologies ddr2 pci express tukwila moved away fsb chipsets supporting technologies manufactured itanium server vendors hp fujitsu sgi nec hitachi tukwila itanium processor model designed share common chipset intel xeon processor ex intel xeon processor designed four processor larger servers goal streamline system development reduce costs server oems many develop itanium- xeon-based servers however 2013 goal pushed back evaluated future implementation opportunities itanium supported i.e windows version longer bought following operating systems microsoft announced windows server 2008 r2 would last version windows server support itanium support started xp would also discontinue development itanium versions visual studio sql server likewise red hat enterprise linux 5 first released march 2007 last itanium edition red hat enterprise linux debian longer supports itanium officially last release official support debian 7 wheezy covered long term support lts unofficial support newer debian still available limited form via debian ports last available kernel wheezy-backports linux 3.14.0 released march 30 2014 possible manually update latest 3.14.x version recent kernel versions like 4.17.17 september 2018 addition canonical ltd. chose support itanium ubuntu 10.04 lts released april 2010 discontinued hp supporting certifying linux itanium 9300 tukwila servers late september 2012 nec announced return ia-64 previous noah line proprietary mainframe processors produced quad-core variant 40 nm called noah-6 hp sells virtualization technology itanium called integrity virtual machines allow software run itanium intel supported development compilers optimized platform especially suite compilers starting november 2010 introduction new product suites intel itanium compilers longer bundled intel x86 compilers single product intel offers itanium tools intel x86 tools including compilers independently different product bundles gcc open64 microsoft visual studio 2005 later also able produce machine code itanium according itanium solutions alliance 13,000 applications available itanium-based systems early 2008 though sun contested itanium application counts past isa also supported gelato itanium hpc user group developer community ported supported open-source software itanium emulation technique allows computer execute binary code compiled different type computer ibm acquisition quicktransit 2009 application binary software irix/mips solaris/sparc could run via type emulation called dynamic binary translation linux/itanium similarly hp implemented method execute pa-risc/hp-ux itanium/hp-ux via emulation simplify migration pa-risc customers radically different itanium instruction set itanium processors also run mainframe environment gcos groupe bull several x86 operating systems via instruction set simulators itanium aimed enterprise server high-performance computing hpc markets enterprise- hpc-focused processor lines include oracle fujitsu sparc processors ibm power microprocessors measured quantity sold itanium serious competition comes x86-64 processors including intel xeon line amd opteron line since 2009 servers shipped x86-64 processors 2005 itanium systems accounted 14 hpc systems revenue percentage declined industry shifted x86-64 clusters application october 2008 gartner report tukwila processor stated ... future roadmap itanium looks strong risc peer like power sparc itanium-based computer first appeared list top500 supercomputers november 2001 best position ever achieved itanium 2 based system list 2 achieved june 2004 thunder lawrence livermore national laboratory entered list rmax 19.94 teraflops november 2004 columbia entered list 2 51.8 teraflops least one itanium-based computer top 10 june 2007 peak number itanium-based machines list occurred november 2004 list 84 systems 16.8 june 2012 dropped one system 0.2 itanium system remained list november 2012 itanium processors show progression capability merced proof concept mckinley dramatically improved memory hierarchy allowed itanium become reasonably competitive madison shift 130 nm process allowed enough cache space overcome major performance bottlenecks montecito 90 nm process allowed dual-core implementation major improvement performance per watt montvale added three new features core-level lockstep demand-based switching front-side bus frequency 667 mhz first released 2001 itanium performance disappointing compared better-established risc cisc processors emulation run existing x86 applications operating systems particularly poor one benchmark 2001 reporting equivalent best 100 mhz pentium mode 1.1 ghz pentiums market time itanium failed make significant inroads ia-32 risc suffered following arrival x86-64 systems offered greater compatibility older x86 applications 2009 article history processor — itanium killed computer industry — journalist john c. dvorak reported continues one great fiascos last 50 years tech columnist ashlee vance commented delays underperformance turned product joke chip industry interview donald knuth said itanium approach ... supposed terrific—until turned wished-for compilers basically impossible write red hat microsoft announced plans drop itanium support operating systems due lack market interest however linux distributions gentoo debian remain available itanium march 22 2011 oracle corporation announced would longer develop new products hp-ux itanium although would continue provide support existing products following announcement hp sued oracle breach contract arguing oracle violated conditions imposed settlement oracle hiring former hp ceo mark hurd co-ceo requiring vendor support itanium software time hp discontinues sales itanium-based servers breach harmed business 2012 court ruled favor hp ordered oracle resume support itanium june 2016 hewlett-packard enterprise corporate successor hp server business awarded 3 billion damages lawsuit former intel official reported itanium business become profitable intel late 2009 2009 chip almost entirely deployed servers made hp 95 itanium server market share making main operating system itanium hp-ux march 22 2011 intel reaffirmed commitment itanium multiple generations chips development schedule although itanium attain limited success niche market high-end computing intel originally hoped would find broader acceptance replacement original x86 architecture amd chose different direction designing less radical x86-64 64-bit extension existing x86 architecture microsoft supported forcing intel introduce extensions x86-based processors designs run existing 32-bit applications native hardware speed offering support 64-bit memory addressing enhancements new applications architecture become predominant 64-bit architecture desktop portable market although itanium-based workstations initially introduced companies sgi longer available 1989 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2009 2010 2011 2012 2013 2014 2017 2019
[ 7173, 9739, 4108, 8716, 9741, 5649, 2066, 7699, 5655, 10779, 10781, 6175, 7713, 7714, 6181, 8229, 8231, 8233, 2604, 3630, 6192, 6705, 7218, 10813, 2623, 10303, 2113, 7234, 1606, 3142, 7755, 4173, 2638, 4174, 2135, 4185, 1119, 2656, 6243, ...
Test
5,524
8
Google_Analytics:google analytics google analytics web analytics service offered google tracks reports website traffic currently platform inside google marketing platform brand google launched service november 2005 acquiring developer urchin google analytics widely used web analytics service web google analytics provides sdk allows gathering usage data ios android app known google analytics mobile apps google analytics used track website activity users session duration pages per session bounce rate etc along information source traffic integrated google ads users review online campaigns tracking landing page quality conversions goals goals might include sales lead generation viewing specific page downloading particular file google analytics approach show high-level dashboard-type data casual user in-depth data report set google analytics analysis identify poorly performing pages techniques funnel visualization visitors came referrers long stayed website geographical position also provides advanced features including custom visitor segmentation google analytics e-commerce reporting track sales activity performance e-commerce reports shows site transactions revenue many commerce-related metrics september 29 2011 google analytics launched real time analytics enabling user insight visitors currently site user 100 site profiles profile generally corresponds one website limited sites traffic fewer 5 million pageviews per month roughly 2 pageviews per second unless site linked google ads campaign google analytics includes google website optimizer rebranded google analytics content experiments google analytics cohort analysis helps understanding behaviour component groups users apart user population beneficial marketers analysts successful implementation marketing strategy google acquired urchin software corp. april 2005 google service developed urchin demand system also brings ideas adaptive path whose product measure map acquired used redesign google analytics 2006 google continued sell standalone installable urchin webanalytics software network value-added resellers discontinuation march 28 2012 google-branded version rolled november 2005 anyone wished sign however due extremely high demand service new sign-ups suspended week later capacity added system google began using lottery-type invitation-code model august 2006 google sending batches invitation codes server availability permitted since mid-august 2006 service fully available users – whether use google advertising newer version google analytics tracking code known asynchronous tracking code google claims significantly sensitive accurate able track even short activities website previous version delayed page loading performance reasons generally placed codice_1 body close html tag new code placed codice_2 html head tags triggered runs parallel page loading april 2011 google announced availability new version google analytics featuring multiple dashboards custom report options new interface design version later updated features real-time analytics goal flow charts october 2012 another new version google analytics announced called 'universal analytics key differences previous versions cross-platform tracking flexible tracking code collect data device introduction custom dimensions custom metrics march 2016 google released google analytics 360 software suite provides analytics return investment marketing indicators google analytics 360 includes five main products analytics tag manager optimize data studio surveys attribution audience center october 2017 new version google analytics announced called global site tag stated purpose unify tagging system simplify implementation june 2018 google introduced google marketing platform online advertisement analytics brand consists two former brands google doubleclick digital marketing google analytics 360 google analytics implemented page tags case called google analytics tracking code snippet javascript code website owner adds every page website tracking code runs client browser client browses page javascript enabled browser collects visitor data sends google data collection server part request web beacon tracking code loads larger javascript file google web server sets variables user account number larger file currently known ga.js typically 18 kb date file size unknown however recent size 40kbytes may 2018 c dir ga.js /s command pc shows following file sizes 2009 2018 2009/10/07 23,536 ga.js 2014/05/27 40,155 ga.js 2014/10/10 40,924 ga.js 2015/09/13 41,100 ga.js 2017/08/06 43,082 ga.js 2018/04/08 46,275 ga.js file usually loaded however due browser caching assuming caching enabled browser downloads ga.js start visit furthermore websites implement google analytics ga.js code use master file google browser previously visited website running google analytics already file cached machine addition transmitting information google server tracking code sets first party cookie cookies enabled browser visitor computer cookie stores anonymous information called clientid launch universal analytics several cookies storing information whether visitor site new returning visitor timestamp current visit referrer site campaign directed visitor page e.g. search engine keywords banner email visitor arrived site clicking link tagged utm parameters urchin traffic monitor tag values passed database addition google analytics mobile package allows google analytics applied mobile websites mobile package contains server-side tracking codes use php javaserver pages asp.net perl server-side language however many ad filtering programs extensions firefox adblock noscript mobile phone app disconnect mobile block google analytics tracking code prevents traffic users tracked leads holes collected data also privacy networks like tor mask user actual location present inaccurate geographical data small fraction users javascript-enabled/capable browsers turn feature limitations mainly ad filtering program allow significant amount visitor avoid tracker sometimes majority one potential impact data accuracy comes users deleting blocking google analytics cookies without cookies set google analytics collect data individual web user block delete cookies resulting data loss visits google analytics users website owners encourage users disable cookies example making visitors comfortable using site posting privacy policy limitations affect majority web analytics tools use page tags usually javascript programs embedded web pages collect visitor data store cookies visitor computer transmit remote database pretending load tiny graphic beacon another limitation google analytics large websites use sampling generation many reports reduce load servers provide users relatively quick response query google analytics limits reports 500,000 randomly sampled sessions profile level calculations margins error indicated visits metric margins error provided metrics google analytics reports small segments data margin error large several online discussions impact google analytics site performance however google introduced asynchronous javascript code december 2009 reduce risk slowing loading pages tagged ga.js script due ubiquity google analytics raises privacy concerns whenever someone visits website uses google analytics google tracks visit via users ip address order determine user approximate geographic location meet german legal requirements google analytics anonymize ip address google also released browser plugin turns data page visit sent google however browser extension available mobile browsers since plug-in produced distributed google met much discussion criticism furthermore realisation google scripts tracking user behaviours spawned production multiple often open-source browser plug-ins reject tracking cookies plug-ins allow users block google analytics similar sites tracking activities however partially new european privacy laws modern browsers allow users reject tracking cookies though flash cookies separate problem anecdotally reported errors occur behind proxy servers multiple firewalls changing timestamps registering invalid searches webmasters seek mitigate google analytics specific privacy issues employ number alternatives backends hosted machines discontinuation example product urchin webanalytics software google january 20 2015 associated press reported healthcare.gov providing access enrollees personal data private companies specialized advertising mentioning google analytics specifically google offers free google analytics iq lessons google analytics certification test free help center faq google groups forum official google analytics product support new product features announced google analytics blog enterprise support provided google analytics certified partners google academy ads google analytics api used third parties build custom applications reporting tools many applications exist one built run ios apple devices featured apple app store third party products also provide google analytics-based tracking management api core reporting api mcf reporting api real time reporting api subject limits quotas google analytics widely used website statistics service may 2008 pingdom released survey stating 161 500 32 biggest sites globally according alexa rank using google analytics later piece market share analysis claimed google analytics used around 49.95 top 1,000,000 websites ranked 2010 alexa 2012 use around 55 10,000 popular websites august 2013 google analytics used 66.2 10,000 popular websites ordered popularity reported builtwith
[ 4096, 8719, 3600, 7700, 10262, 9244, 10284, 3633, 3634, 3643, 5182, 10814, 1096, 6729, 4683, 11343, 3664, 8285, 2658, 3688, 10355, 8821, 7816, 5262, 6800, 11408, 10393, 8858, 7841, 9901, 1203, 7359, 196, 3269, 3782, 10445, 10450, 3795, 1240...
Test
5,525
7
Business_Intelligence_2.0:business intelligence 2.0 business intelligence 2.0 bi 2.0 future development existing business intelligence model began mid-2000s data obtained many sources process allows querying real-time corporate data employees approaches data web browser based solution contrast previous proprietary querying tools characterizes previous bi software growth service-oriented architectures soa one main factors happening bi 2.0 intended flexible adaptive normal business intelligence data exchange processes also differ xbrl extensible business reporting language web services various semantic web ontologies enable using data external organization benchmarking type information business intelligence 2.0 believed named web 2.0 although takes elements web 2.0 focus user empowerment community collaboration technologies like rss concept mashups semantic web sometimes called web 3.0 semantic integration shared ontologies enable easier exchange data according analytics expert neil raden bi 2.0 also implies move away standard data warehouse business intelligence tools used give way context contingency need relate information quickly many sources
[ 772, 4107, 10452, 247, 10938 ]
None
5,526
2
OS-tan:os-tan os- tan internet meme originated within japanese futaba channel os- tan moe anthropomorphism/personification several operating systems various amateur japanese artists os- tan typically depicted women os- tan representative microsoft windows operating systems usually depicted sisters varying ages -tan element term hypocoristic suffix japanese though initially appearing fan work os- tan proved popular enough microsoft branches singapore taiwan used os- tan concept basis ad campaigns internet explorer microsoft silverlight respectively concept os- tan reported begun personification common perception windows released 2000 microsoft 9x counterpart windows 2000 unstable prone frequent crashes discussions futaba channel likened stereotype fickle troublesome girl personification expanded me- tan created followed characters one early works predominantly feature os- tan interactive flash animation showing possible intro imaginary anime show known trouble windows fansub eventually created partly responsible spread os- tan english language imageboards os- tan original concept pre-dated toy imac girl featured series desktops released august 1998 march 1999 ohzora publishing produced one book based os- tan characters titled includes illustrations 25 contributors also includes 95- tan me- tan xp- tan figures titled os girl 95 os girl os girl xp respectively include molded space 2k- tan named os girl 2k me- tan 2k- tan xp- tan designed guhico stranger workshop 95- tan designed fujisaki shiro h.b.company parthenon production limited company commercialized pink company os- tan products malino deja vu artworks produced document shared folder trilogy sold digital format japanese version windows 7 ultimate dsp edition includes unofficial nanami madobe mascot inspired microsoft taiwan launch official mascot microsoft silverlight hikaru followed giving hikaru sisters lei aoi yu special package japanese windows 7 ultimate dsp edition called touch mouse artist edition touch mouse limited edition artist series came animated tutorial windows theme custom sounds three desktop backgrounds featuring madobe nanami 2009 ubuntu-based comic titled ubunchu serialized kantan ubuntu spinoff weekly ascii magazine authored hiroshi seo english version translated fumihito yoshida hajime mizuno martin owens arturo silva anton ekblad japanese suffix mispronunciation informal intimate diminutive honorific suffix person used friends family pets case mispronunciation used intentionally achieve contrived cute charming effect commonly associated use young children also sometimes added names non-mascot characters personifications whole commonly simply called mascots mascot characters -tan suffix means nothing outside role honorific implications cuteness normal suffixes including -san -chan -kun also used name os- tan depending character speaker preference suffix may omitted entirely name windows 10 mascot officially introduced tōko touko madobe 31 july 2015 confirmed character official facebook page name homonym one readings japanese word 'ten name chosen fans online poll according fictional profile origins madobe family set 100 years future likes online gaming supporting others personal traits excellent student expanding knowledge technology manager often worries since ’ bit spontaneous also enjoys cheering people working hard best part-time job akibano custom computer company rookie level back story rather unusual os- tan japanese windows 8.1 pro dsp edition madobe family version windows navi+ techno-alliance corp. limited 1000 units version windows 8.1 pro 32/64-bit edition three types madobe family picture password wallpapers madobe character voices nanami yū ai claudia madobe family complete edition windows theme pack previously unpublished madobe family designs final pasocom data hikkoshi 9+ licence key skype three-month free trial historical windows logo stickers xp vista 7 8 editions include memorial pack version without voice theme pack stickers 6191 units 64-bit windows memorial pack version sculpt mobile mouse nanami decor 810 units editions available preorder 2013-10-04 release date 2013-10-18 part market launch facebook draw 8 followers took place follower count reaches 80001 total twitter follower count yū ai reach 8001 winners receive yū- ai-themed prizes additional types windows 8.1 pro dsp edition madobe family theme packs also sold ark towerhill zoa corporation tsukumo project white dospara buy unit.com big camera sofmap pc one versions include two types wallpapers christmas new year theme pack system voices japanese windows 8 pro dsp editions released madobe yū yuu madobe ai editions windows navi+ techno-alliance corp. versions 4,000 units per character thus 8,000 total include microsoft wedge touch mouse windows 8 logo character-specific windows theme three theme pack wallpapers event sounds respective character voice picture password images addition limited akihabara editions 444 units per character 888 total sold tokyo akihabara shopping district include madobe ai/yū edition microsoft wedge touch mouse alternate character-specific event sound samples theme pack alternate wallpaper respective character nipponbashi versions 500 units per character sold nipponbashi osaka include microsoft wedge touch mouse ai yū decal three theme pack wall papers two common one character-specific yū ai event sounds nipponbashi packages include different art 32/64-bit version availability depends retailer asuka nishi voices short-haired yū nao tamura voices long-haired ai windows 8 edition unitcom available first 2,888 copies included notepad t-shirt two-way mouse pad pocket media case smart phone stand cleaning two-way pc cleaner yū ai badges freeze blanket extended fictional madobe family tree detailed yū older sister parents eiichi netsu 根津 family shii madobe family yū ai said birthdate 18 november 1996 windows ce release date age 15 height 152 cm conflicts back-story materials suggesting ai younger sister masatakap electrocutica produced windows 8 music video titled window featuring madobe characters nanami yū silhouette claudia video presented opening microsoft keynote second day windows developer days japan 2012 2013 windows navi+ techno-alliance corp. also created separate twitter accounts ai yū respectively two theme songs yū ai – mir8cle days donna mirai demo unveiled 15 june 2013 sold cd bundled windows 8 pro dsp edition sold twinbox akihabara akiba pc reported first 7777 copies japanese windows 7 ultimate dsp editions include special wallpaper sound sets character called voiced nana mizuki character designed wakaba premium set includes windows 7 theme featuring 3 nanami wallpapers 19 event sound sets cd 5 extra nanami sounds regular dsp edition includes digest windows 7 theme including nanami wallpaper event sound set preorder users also download extra nanami wallpaper 6 event sound sets makes first os- tan marketed company producing operating system addition character also got twitter account initial sales event windows 7 dsp edition official profile character also revealed shows madobe nanami born 1992-04-06 release date windows 3.1 17 years age time release lives chiyoda tokyo nanami among extended family 16 members elder brother named goichi 吾一 elder sister named mutsumi むつみ mother named mikaho 美佳穗 madobe 窓辺 family father named kyuuachi 究八 shirato 白戸 family nanami cousin claudia madobe クロード 蔵人 later appeared microsoft cloud girl comic strip windows vista distinguishing characteristic usually horn-shaped pigtails variants four pigtails heterochromatic eyes silver white hair appears frequent although light blue black also seen common costume design white red sailor fuku stockings since release details vista interface look changed slightly black maid outfit emerging popularity matches new default vista color scheme well circular windows logo hair clip identical new start menu button vista also seems finalized version hair colour similar vista wallpapers range light blue yellow green also wears type long coat covers left right sides transparent imitate aero glass effect xp- tan dark-haired girl ribbons hair xp hair ornament typically worn left side windows xp criticized bloating system pretty without useful xp- tan commonly depicted wearing tight clothing big breasts additionally reference memory usage windows xp often seen eating holding empty rice bowl labeled memory variants include version xp home known homeko green hair wears short ponytail two large xp-shaped hairclips cover ears well less common variation representing windows xp media center edition outfits worn two main variants based loading lines windows splash screen startup although variants exist common operating system represented windows 2000 professional typically drawn intelligent professional reserved looking woman short blue hair glasses hair clips resemble cat ears flanking small white bonnet ruffle similar maid bonnet shows windows logo outfit resembles swimsuit suggesting windows logo colors worn long blue coat alluding popular opinion windows 2000 stable dependable windows operating systems due greater stability win2k compared winme released near 2000 2k- tan often described guardian me- tan particular shade blue used drawings similar default windows 2000 desktop color design me- tan personification windows much line japanese concept kawaii cuteness design changed little artist original designs depicted green hair long pigtails wearing maid outfit badge front reminiscent windows active desktop recovery screen often shown rebooting system crash considered hard worker webcomics often depict failing anything tries often literally crashing irritating sisters frozen control tends things showing lack common sense knowledge putting soda microwave oven defending swinging welsh onion many variations exist common depiction windows 98 operating systems pair young girls os- tan representative original release windows 98 shown white blue uniform includes windows logo part neck tie navy blue hair 98 hair clip windows 98 second edition os- tan similar appearance wears green sailor school uniform letters se front two early representations also seen pair stick-limbed pocky boxes face version number drawn crayon reference vulcan 300 character zatch bell anime series early representations still used mecha piloted girls dolls carried girls sometimes even hiding places windows 95 considered oldest modern 32-bit windows operating systems usually represented traditional lady early modern era japan typically depicted gentle-looking brown haired woman kimono hair ribbon showing four windows colors outfit traditional kimono hakama japan wears thick sandals geta feet woman college student typical clothes seen earliest period course modernization japan meiji period taishō period reference modernization windows comparison modernization japan additionally pattern kimono based file hana256.bmp used desktop wallpaper pattern japanese version windows typically depicted engaged drinking tea serving meals housework one recurring theme stories unfamiliarity newer post win-95 technologies usb devices even though osr 2.x supported broadband internet connections also occasionally depicted wielding katana aggressive manner symbolizing generation operating systems microsoft finally achieved full dominance personal computer market windows 3.1 short girl long silver hair long light purple dress large purple bow head often seen carrying small black cat head well acts servant maid sort serves tends dos- tan reference fact windows 3.1 full operating system rather gui ms-dos mac os x girl often portrayed catgirl following apple wild cat naming tradition every mac os x release os x mavericks codename like jaguar panther tiger snow leopard etc. otherwise shown older variation mac os 9 girl wearing white coat wearing airport wireless hub fashioned hat occasionally shown holding publication sort macs often used desktop publishing originally seen bearded penguin reference tux penguin mascot linux kernel image girl helmet flippers chosen human alternative helmet likely metaphor linux kernel oft-claimed excellent security usually horns likely reference gnu software comprises common system programs present nearly linux distributions gear teeth helmet reference kde common desktop environment used gnu/linux shirt reference gnome another common desktop environment often seen spear flags attached representing grub lilo gcc tools linux artist drew konqi tyson tan submitted mascot libreoffice contest run document foundation late 2017 mascot officially accepted foundation developed fandom 8chan reddit msx-dos girl often portrayed young grey-haired girl carrying large cartridge-shaped bag msx-dos logo even short game featuring os- tan player character bag os- tan often shown holding cartridge-shaped likely msxdos2 required cartridge extra 64 kb rom order work americanized versions windows related os- tan named xp-usa me-usa 2k-usa published ohzora fanbook comic strip named trouble windows usa saint muscle heavy associations operating systems supporting programs anti-virus clients web browsers many supporting characters created personify applications examples wired news rated os- tan among lamest technology mascots ever yet strangely compelling
[ 704, 321, 1252, 4326, 11559, 3496, 8584, 4074, 6797, 9166, 1935, 7983, 82, 11283, 823, 10872, 8092, 3167 ]
Validation
5,527
9
Cryptol:cryptol cryptol domain specific programming language cryptography developed portland oregon based software development firm galois inc.. language originally developed use united states national security agency language also used private firms provide information technology systems american company rockwell collins provides aerospace defense contractors united states programming language used aspects developing using cryptography design implementation new ciphers verification existing cryptographic algorithms cryptol designed allow cryptographer watch stream processing functions program manipulate ciphers encryption algorithms
[ 9345, 2691, 9224, 5395, 9626, 3613, 4770, 3876, 3629, 5680, 9780, 1591, 4410, 191, 9926, 4042, 7887, 5845, 477, 7395, 4838, 1768, 9330, 9331, 7421 ]
Test
5,528
7
Monjin:monjin monjin digital interviewing assessment platform powered artificial intelligence described portmanteau skype linkedin monjin founded 2014 industry veterans abhijit kashyape ashutosh kulkarni aniruddha fansalkar prafulla paraskar company led abhijit 100 employees across globe 2016 monjin set operations uk usa sweden 2017 monjin partnered microsoft create first azure-based aggregator platform using interviewers create global assessment standard
[ 1935 ]
Test
5,529
3
Interrupt_latency:interrupt latency computing interrupt latency time elapses interrupt generated source interrupt serviced many operating systems devices serviced soon device interrupt handler executed interrupt latency may affected microprocessor design interrupt controllers interrupt masking operating system os interrupt handling methods usually trade-off interrupt latency throughput processor utilization many techniques cpu os design improve interrupt latency decrease throughput increase processor utilization techniques increase throughput may increase interrupt latency increase processor utilization lastly trying reduce processor utilization may increase interrupt latency decrease throughput minimum interrupt latency largely determined interrupt controller circuit configuration also affect jitter interrupt latency drastically affect real-time schedulability system intel apic architecture well known producing huge amount interrupt latency jitter maximum interrupt latency largely determined methods os uses interrupt handling example processors allow programs disable interrupts putting execution interrupt handlers order protect critical sections code execution critical section interrupt handlers execute safely within critical section blocked save minimum amount information required restart interrupt handler critical sections exited interrupt latency blocked interrupt extended end critical section plus interrupts equal higher priority arrived block place many computer systems require low interrupt latencies especially embedded systems need control machinery real-time sometimes systems use real-time operating system rtos rtos makes promise specified maximum amount time pass executions subroutines order rtos must also guarantee interrupt latency never exceed predefined maximum advanced interrupt controllers implement multitude hardware features order minimize overhead context switches effective interrupt latency include features like also many methods hardware may use help lower requirements shorter interrupt latency order make given interrupt latency tolerable sitation include buffers flow control example network cards implement transmit receive ring buffers interrupt rate limiting hardware flow control buffers allow data stored transferred flow control allows network card pause communications without discard data buffer full modern hardware also implements interrupt rate limiting helps prevent interrupt storms live-lock hardware wait programmable minimum amount time interrupt generates interrupt rate limiting reduces amount time spent servicing interrupts allowing processor spend time useful work exceeding time results soft recoverable hard non-recoverable error
[ 7173, 9105, 5270, 6806, 1176, 9366, 1058, 4773, 7983, 4918, 10813, 5823, 2623, 3010, 9932, 5457, 3157, 3294, 5862, 1660 ]
None
5,530
9
Quantum_(statistical_programming_language):quantum statistical programming language quantum software package programming language statistical survey data validation manipulation tabulation originally developed quantime run unix systems incorporated spss inc. spss mr product line acquisition quantime september 1997
[ 522, 8262 ]
Test
5,531
5
Internet_protocol_suite:internet protocol suite internet protocol suite conceptual model set communications protocols used internet similar computer networks commonly known tcp/ip foundational protocols suite transmission control protocol tcp internet protocol ip occasionally known department defense dod model development networking method funded united states department defense darpa internet protocol suite provides end-to-end data communication specifying data packetized addressed transmitted routed received functionality organized four abstraction layers classify related protocols according scope networking involved lowest highest layers link layer containing communication methods data remains within single network segment link internet layer providing internetworking independent networks transport layer handling host-to-host communication application layer providing process-to-process data exchange applications technical standards underlying internet protocol suite constituent protocols maintained internet engineering task force ietf internet protocol suite predates osi model comprehensive reference framework general networking systems internet protocol suite resulted research development conducted defense advanced research projects agency darpa late 1960s initiating pioneering arpanet 1969 darpa started work number data transmission technologies 1972 robert e. kahn joined darpa information processing technology office worked satellite packet networks ground-based radio packet networks recognized value able communicate across spring 1973 vinton cerf helped develop existing arpanet network control program ncp protocol joined kahn work open-architecture interconnection models goal designing next protocol generation arpanet summer 1973 kahn cerf worked fundamental reformulation differences local network protocols hidden using common internetwork protocol instead network responsible reliability arpanet function delegated hosts cerf credits hubert zimmermann louis pouzin designer cyclades network important influences design protocol implemented transmission control program first published 1974 initially tcp managed datagram transmissions routing protocol grew researchers recommended division functionality protocol layers advocates included jonathan postel university southern california information sciences institute edited request comments rfcs technical strategic document series documented catalyzed internet development postel stated screwing design internet protocols violating principle layering encapsulation different mechanisms intended create environment upper layers could access needed lower layers monolithic design would inflexible lead scalability issues transmission control program split two distinct protocols transmission control protocol internet protocol design network included recognition provide functions efficiently transmitting routing traffic end nodes intelligence located edge network end nodes design known end-to-end principle using design became possible connect almost network arpanet irrespective local characteristics thereby solving kahn initial internetworking problem one popular expression tcp/ip eventual product cerf kahn work run two tin cans string years later joke ip avian carriers formal protocol specification created successfully tested computer called router provided interface network forwards network packets back forth originally router called gateway term changed avoid confusion types gateways 1973 1974 cerf networking research group stanford worked details idea resulting first tcp specification significant technical influence early networking work xerox parc produced parc universal packet protocol suite much existed around time darpa contracted bbn technologies stanford university university college london develop operational versions protocol different hardware platforms four versions developed tcp v1 tcp v2 tcp v3 ip v3 tcp/ip v4 last protocol still use today 1975 two-network tcp/ip communications test performed stanford university college london november 1977 three-network tcp/ip test conducted sites us uk norway several tcp/ip prototypes developed multiple research centers 1978 1983 march 1982 us department defense declared tcp/ip standard military computer networking year peter t. kirstein research group university college london adopted protocol migration arpanet tcp/ip officially completed flag day january 1 1983 new protocols permanently activated 1985 internet advisory board later internet architecture board held three-day tcp/ip workshop computer industry attended 250 vendor representatives promoting protocol leading increasing commercial use 1985 first interop conference focused network interoperability broader adoption tcp/ip conference founded dan lynch early internet activist beginning large corporations ibm dec attended meeting ibm dec first major corporations adopt tcp/ip despite competing proprietary protocols ibm 1984 barry appelman group tcp/ip development navigated corporate politics get stream tcp/ip products various ibm systems including mvs vm os/2 time several smaller companies ftp software wollongong group began offering tcp/ip stacks dos microsoft windows first vm/cms tcp/ip stack came university wisconsin early tcp/ip stacks written single-handedly programmers jay elinsky ibm research wrote tcp/ip stacks vm/cms os/2 respectively 1984 donald gillies mit wrote ntcp multi-connection tcp ran atop ip/packetdriver layer maintained john romkey mit 1983-4 romkey leveraged tcp 1986 ftp software founded starting 1985 phil karn created multi-connection tcp application ham radio systems ka9q tcp spread tcp/ip fueled june 1989 university california berkeley agreed place tcp/ip code developed bsd unix public domain various corporate vendors including ibm included code commercial tcp/ip software releases microsoft released native tcp/ip stack windows 95 event helped cement tcp/ip dominance protocols microsoft-based networks included ibm systems network architecture sna platforms digital equipment corporation decnet open systems interconnection osi xerox network systems xns british academic network janet converted tcp/ip 1991 end-to-end principle evolved time original expression put maintenance state overall intelligence edges assumed internet connected edges retained state concentrated speed simplicity real-world needs firewalls network address translators web content caches like forced changes principle robustness principle states general implementation must conservative sending behavior liberal receiving behavior must careful send well-formed datagrams must accept datagram interpret e.g. object technical errors meaning still clear second part principle almost important software hosts may contain deficiencies make unwise exploit legal obscure protocol features encapsulation used provide abstraction protocols services encapsulation usually aligned division protocol suite layers general functionality general application highest level model uses set protocols send data layers data encapsulated level early architectural document emphasizes architectural principles layering rfc 1122 titled host requirements structured paragraphs referring layers document refers many architectural principles emphasize layering loosely defines four-layer model layers names numbers follows link layer networking scope local network connection host attached regime called link tcp/ip literature lowest component layer internet protocols tcp/ip designed hardware independent result tcp/ip may implemented top virtually hardware networking technology link layer used move packets internet layer interfaces two different hosts link processes transmitting receiving packets given link controlled software device driver network card well firmware specialized chipsets perform data link functions adding packet header prepare transmission actually transmit frame physical medium tcp/ip model includes specifications translating network addressing methods used internet protocol link layer addresses media access control mac addresses aspects level however implicitly assumed exist link layer explicitly defined tcp/ip model link layer also layer packets may selected sent virtual private network networking tunnels scenario link layer data may considered application data traverses another instantiation ip stack transmission reception another ip connection connection virtual link may established transport protocol even application scope protocol serves tunnel link layer protocol stack thus tcp/ip model dictate strict hierarchical encapsulation sequence link layer tcp/ip model corresponding functions layer 2 open systems interconnection osi model internet layer responsibility sending packets across potentially multiple networks internetworking requires sending data source network destination network process called routing internet protocol performs two basic functions internet layer agnostic data structures transport layer also distinguish operation various transport layer protocols ip carries data variety different upper layer protocols protocols identified unique protocol number example internet control message protocol icmp internet group management protocol igmp protocols 1 2 respectively protocols carried ip icmp used transmit diagnostic information igmp used manage ip multicast data layered top ip perform internetworking functions illustrates differences architecture tcp/ip stack internet osi model tcp/ip model internet layer corresponds layer three open systems interconnection osi model referred network layer internet layer provides unreliable datagram transmission facility hosts located potentially different ip networks forwarding transport layer datagrams appropriate next-hop router relaying destination functionality internet layer makes possible internetworking interworking different ip networks essentially establishes internet internet protocol principal component internet layer defines two addressing systems identify network hosts computers locate network original address system arpanet successor internet internet protocol version 4 ipv4 uses 32-bit ip address therefore capable identifying approximately four billion hosts limitation eliminated 1998 standardization internet protocol version 6 ipv6 uses 128-bit addresses ipv6 production implementations emerged approximately 2006 transport layer establishes basic data channels applications use task-specific data exchange layer establishes host-to-host connectivity meaning provides end-to-end message transfer services independent structure user data logistics exchanging information particular specific purpose independent underlying network protocols layer may provide error control segmentation flow control congestion control application addressing port numbers end-to-end message transmission connecting applications transport layer categorized either connection-oriented implemented tcp connectionless implemented udp purpose providing process-specific transmission channels applications layer establishes concept network port numbered logical construct allocated specifically communication channels application needs many types services port numbers standardized client computers may address specific services server computer without involvement service announcements directory services ip provides best effort delivery transport layer protocols offer reliability however ip run reliable data link protocol high-level data link control hdlc example tcp connection-oriented protocol addresses numerous reliability issues providing reliable byte stream newer stream control transmission protocol sctp also reliable connection-oriented transport mechanism message-stream-oriented—not byte-stream-oriented like tcp—and provides multiple streams multiplexed single connection also provides multi-homing support connection end represented multiple ip addresses representing multiple physical interfaces one fails connection interrupted developed initially telephony applications transport ss7 ip also used applications user datagram protocol connectionless datagram protocol like ip best effort unreliable protocol reliability addressed error detection using weak checksum algorithm udp typically used applications streaming media audio video voice ip etc on-time arrival important reliability simple query/response applications like dns lookups overhead setting reliable connection disproportionately large real-time transport protocol rtp datagram protocol designed real-time data streaming audio video applications given network address distinguished tcp udp port convention certain well known ports associated specific applications tcp/ip model transport host-to-host layer corresponds roughly fourth layer open systems interconnection osi model also called transport layer application layer includes protocols used applications providing user services exchanging application data network connections established lower level protocols may include basic network support services protocols routing host configuration examples application layer protocols include hypertext transfer protocol http file transfer protocol ftp simple mail transfer protocol smtp dynamic host configuration protocol dhcp data coded according application layer protocols encapsulated transport layer protocol units tcp udp messages turn use lower layer protocols effect actual data transfer tcp/ip model consider specifics formatting presenting data define additional layers application transport layers osi model presentation session layers functions realm libraries application programming interfaces application layer protocols generally treat transport layer lower protocols black boxes provide stable network connection across communicate although applications usually aware key qualities transport layer connection end point ip addresses port numbers application layer protocols often associated particular client-server applications common services well-known port numbers reserved internet assigned numbers authority iana example hypertext transfer protocol uses server port 80 telnet uses server port 23 clients connecting service usually use ephemeral ports i.e. port numbers assigned duration transaction random specific range configured application transport layer lower-level layers unconcerned specifics application layer protocols routers switches typically examine encapsulated traffic rather provide conduit however firewall bandwidth throttling applications must interpret application data example resource reservation protocol rsvp also sometimes necessary network address translator nat traversal consider application payload application layer tcp/ip model often compared equivalent combination fifth session sixth presentation seventh application layers open systems interconnection osi model furthermore tcp/ip model distinguishes user protocols support protocols support protocols provide services system network infrastructure user protocols used actual user applications example ftp user protocol dns support protocol following table shows various networking models number layers varies three seven networking models textbooks secondary sources may conflict intent rfc 1122 ietf primary sources three top layers osi model i.e application layer presentation layer session layer distinguished separately tcp/ip model application layer transport layer pure osi protocol applications x.400 also combined requirement tcp/ip protocol stack must impose monolithic architecture transport layer example nfs application protocol runs external data representation xdr presentation protocol turn runs protocol called remote procedure call rpc rpc provides reliable record transmission safely use best-effort udp transport different authors interpreted tcp/ip model differently disagree whether link layer entire tcp/ip model covers osi layer 1 physical layer issues whether hardware layer assumed link layer several authors attempted incorporate osi model layers 1 2 tcp/ip model since commonly referred modern standards example ieee itu often results model five layers link layer network access layer split osi model layers 1 2 ietf protocol development effort concerned strict layering protocols may fit cleanly osi model although rfcs sometimes refer often use old osi layer numbers ietf repeatedly stated internet protocol architecture development intended osi-compliant rfc 3439 addressing internet architecture contains section entitled layering considered harmful example session presentation layers osi suite considered included application layer tcp/ip suite functionality session layer found protocols like http smtp evident protocols like telnet session initiation protocol sip session layer functionality also realized port numbering tcp udp protocols cover transport layer tcp/ip suite functions presentation layer realized tcp/ip applications mime standard data exchange conflicts apparent also original osi model iso 7498 considering annexes model e.g. iso 7498/4 management framework iso 8648 internal organization network layer ionl ionl management framework documents considered icmp igmp defined layer management protocols network layer like manner ionl provides structure subnetwork dependent convergence facilities arp rarp ietf protocols encapsulated recursively demonstrated tunneling protocols generic routing encapsulation gre gre uses mechanism osi uses tunneling network layer internet protocol suite presume specific hardware software environment requires hardware software layer exists capable sending receiving packets computer network result suite implemented essentially every computing platform minimal implementation tcp/ip includes following internet protocol ip address resolution protocol arp internet control message protocol icmp transmission control protocol tcp user datagram protocol udp internet group management protocol igmp addition ip icmp tcp udp internet protocol version 6 requires neighbor discovery protocol ndp icmpv6 igmpv6 often accompanied integrated ipsec security layer application programmers typically concerned interfaces application layer often also transport layer layers services provided tcp/ip stack operating system ip implementations accessible programmers sockets apis unique implementations include lightweight tcp/ip open source stack designed embedded systems ka9q nos stack associated protocols amateur packet radio systems personal computers connected via serial lines microcontroller firmware network adapter typically handles link issues supported driver software operating system non-programmable analog digital electronics normally charge physical components link layer typically using application-specific integrated circuit asic chipset network interface physical standard high-performance routers large extent based fast non-programmable digital electronics carrying link level switching
[ 4609, 10242, 1541, 1030, 11269, 6152, 9233, 7187, 5652, 8211, 6681, 26, 6682, 10270, 10271, 6689, 9251, 2085, 7717, 7208, 7214, 8238, 7217, 562, 1586, 9269, 1081, 11321, 3133, 1086, 5181, 6723, 11332, 8265, 3150, 4687, 592, 10851, 10341, ...
Test
5,532
4
Web_Sheriff:web sheriff web sheriff anti-piracy company based united kingdom provides intellectual property copyright privacy rights protection services company monitors various websites host links downloads music film web sheriff operation since 2000 two offices uk company founded intellectual property lawyer john giacobbi acts managing director web sheriff sends legal take-down notice bittorrent file sharing sites according los angeles times web sheriff leading advocate soft sell anti-piracy industry web sheriff performs various copy protection services include protection copyright infringement libel cyber-bullying identity theft privacy issues social media policing trading sites recovery fraudulently registered domain names also furnishes online security concert tours web sheriff uses proprietary software web crawler programs search internet using human auditing determine type site posting clients copyrighted material relies heavily phone calls relationship building locating unauthorized links targets persons running sites supposed offending party sent take-down notice action taken torrent sites file sharing sites mediafire rapidshare provide access company remove infringing content los angeles times described company approach representing sharp turn recording industry life-and-death struggle piracy one driven largely performers managers rather record companies contracts protect new music releases company encourages artists represents give fans several tracks ahead release web sheriff founded 2000 former music attorney industry consultant john giacobbi 2005 company responsible removal ken bigley execution footage videos posted terrorist website bigley beheading web sheriff related approached mail sunday authorities refused intervene citing lack power video hosted website entitled headlessamericans.com isp initially refused take saying protected freedom speech complied finally 48 hours argument year work done mail sunday company spokesman writing newspaper disclosed web sheriff also closed extreme pornographic strangulation sites center notorious jane longhurst murder case web sheriff hired prince september 2007 help disappear entirely internet star spokesman related prince believes strongly artist music rights must remain artist thus copyrights protected across board artists ever taken kind action rights web sheriff announced would launch lawsuits youtube ebay pirate bay behalf prince refused compliance removing links unauthorized photos videos music peter sunde co-founder pirate bay dismissed threats stating american law applicable sweden youtube complied removing 2,000 videos site ebay removed 300 auctions november 2007 three fans sites given notice remove images singer lyrics anything linked prince likeness prince fans fought back formed organization called prince fans united hired attorney multiple unauthorized overseas online sites selling merchandise featuring prince shut 2008 company hired bryan adams take fan sites tribute bands well owner domain name pointlookout.com nothing artist company hired axl rose remove unflattering picture claiming copyright belonged axl rose photographer music fans bloggers often initially respond angrily first approached web sheriff clients official unofficial forums according evening standard music blogging sites littered comments sheriff contact details top thanking bloggers obeying rules fans sometimes interpret web sheriff saying 've got eye company reports eventually fans tend respect wishes favored artists cooperating related guardian prodigy fans brainkiller forum engaged web sheriff thread lasted 18 pages fans hostile beginning asked could help band web sheriff method using velvet glove approach appeal fans said randy lewis los angeles times notable successes including lady gaga born way adele 21 journalist also notes despite examples success diplomatic strategy company gentle approach still skeptics critics calling naive brad buckles executive copyright enforcement riaa quoted saying certainly well-intended may work cases problem many many cases 're dealing people respect whatsoever intellectual property record labels artists billboard journalist concludes appeal sites post links unauthorized music engaging fans redirecting authorized content artist strategy future implemented properly
[ 113 ]
None
5,533
1
International_Medical_Education_Directory:international medical education directory international medical education directory imed public database worldwide medical schools imed published joint collaboration educational commission foreign medical graduates ecfmg foundation advancement international medical education research faimer information available imed derived data collected educational commission foreign medical graduates ecfmg throughout history evaluating medical education credentials international medical graduates using data starting point foundation advancement international medical education research faimer began developing imed 2001 made publicly available april 2002 april 2014 imed merged avicenna directory create world directory medical schools world directory definitive list medical schools world imed avicenna discontinued 2015
[]
None
5,534
2
Berkeley_Software_Design:berkeley software design berkeley software design inc. bsdi later bsdi corporation developed sold licenses supported bsd/os originally known bsd/386 commercial partially proprietary variant bsd unix operating system pc compatible later computer systems name chosen similarity berkeley software distribution source primary product specifically 4.3bsd networking release 2 bsdi founded rick adams members computer systems research group csrg university california berkeley including keith bostic kirk mckusick mike karels bill jolitz donn seeley jolitz seeley trent hein working rick adam uunet time became bsdi first employees company began operations 1991 december 1991 usenix secretary former head software convex computer rob kolstad university illinois hired would take company operations two years later bsd/386 released january 1992 full system including source code retailed 995 affordable equivalent source code license rival unix system v cost 20,000 late 1980s rob kolstad direction company decided pursue internet infrastructure primary customer audience mid 1990s top-10 websites world almost using bsd/386 bsd source codebase late 1991 unix system laboratories usl brought lawsuit bsdi alleging bsd/386 contained proprietary trade secrets source code usl acquired novell settlement reached january 1994 bsdi agreed base future releases product called bsd/os csrg 4.4bsd-lite release declared free usl intellectual property rob kolstad university illinois convex computer corporation president bsdi period headed company close decade 1999 bsdi employees sought initial public offering installed new president reach goal soon possible given recent success red hat ipo linux market unfortunately strategy successful soon rob kolstad exited company facing bankruptcy 2000 company merged walnut creek cdrom distributor freeware open source software cd-rom shortly acquired telenet system solutions inc. internet infrastructure server supplier 2001 severe financial pressure excessive leverage bsdi known bsdi time sold software business unit comprising bsd/os former walnut creek freebsd slackware linux open source offerings wind river systems renamed remainder ixsystems renewed focus server hardware wind river dropped sponsorship slackware soon afterwards freebsd unit divested separate entity freebsd mall inc. 2002 faced competition open-source bsd- linux-based operating systems wind river discontinued bsd/os december 2003 many technologies live community-led bsd derivatives like freebsd 2002 offmyserver acquired ixsystems hardware business reverted ixsystems name 2005
[ 7552, 5506, 1927, 4745, 10761, 2061, 9743, 657, 6675, 8725, 2584, 1316, 684, 4908, 1839, 7983, 2995, 1718, 823, 1080, 9151, 9153, 3651, 7748, 10436, 9927, 8395, 850, 6361, 9306, 10202, 3551, 607, 8671, 9320, 873, 9452, 9455, 6129, 5492, ...
Test
5,535
7
Citrix_Workspace:citrix workspace citrix workspace formerly citrix workspace suite digital workspace software platform developed citrix systems allows multiple users remotely access operate microsoft windows desktops running datacenter public private cloud via devices located elsewhere users able access virtual desktops applications citrix workspace app applications delivered managed via citrix virtual apps virtualization technology led xendesktop first developed 2000 open-source hypervisor research project led ian pratt university cambridge called xen project x86 pratt founded company called xensource 2004 made commercial version xen hypervisor 2007 citrix acquired xensource releasing xendesktop version 2.0 2008 company continues release updated versions xendesktop 7.6 featuring hdx technology enhancements audio video graphics user experience well reduction storage costs associated virtual desktop deployments result improvements citrix provisioning services 2018 software renamed citrix workspace product aim give employees ability work anywhere cutting information technology management costs desktops applications centralized xendesktop also aims provide security data stored devices end users instead saved centralized datacenter cloud infrastructure citrix developed software use medium large enterprise customers citrix workspace able manage deliver applications desktops using connection broker called desktop delivery controller supports multiple hypervisors including citrix hypervisor vmware vsphere microsoft hyper-v nutanix acropolis create virtual machines run applications desktops software allows several types delivery methods compatible multiple architectures including desktops servers datacenters private public hybrid clouds virtualized applications delivered virtual desktops using virtual apps
[ 3584, 4194, 5732, 1801, 6797, 3822, 7983, 5371 ]
None
5,536
4
Ad_blocking:ad blocking ad blocking ad filtering software capability removing altering online advertising web browser application popular ad blocking tools browser extensions methods also available online advertising exists variety forms including web banners pictures animations embedded audio video text pop-up windows employ audio video autoplay browsers offer ways remove alter advertisements either targeting technologies used deliver ads embedded content delivered browser plug-ins via html5 targeting urls source ads targeting behaviors characteristic ads use html5 autoplay audio video standpoint internet user various fundamental reasons one would want use ad blocking addition manipulated brands publishers representative trade bodies hand argue web ads provide revenue website owners enable website owners create otherwise purchase content website publishers claim prevalent use ad blocking software devices could adversely affect website owner revenue thus turn lower availability free content websites users benefits ad blocking software include quicker loading cleaner looking web pages fewer distractions lower resource waste bandwidth cpu memory etc privacy benefits gained exclusion tracking profiling systems ad delivery platforms blocking ads also save substantial amounts electrical energy lower users power bills additional energy savings also expected grid level fewer data packets need transmitted user machine website server ad blocking software may benefits users quality life decreases internet users exposure advertising marketing industries promote purchase numerous consumer products services potentially harmful unhealthy creating urge buy immediately unwanted advertising also harm advertisers users become annoyed ads irritated users might make conscious effort avoid goods services firms using annoying pop-up ads block web content user trying view users interested making purchases blocking ads also save time ad appears website exerts toll user attention budget since ad enters user field view must either consciously ignored closed dealt way user strongly focused reading solely content seeking likely desire diverted advertisements seek sell unneeded unwanted goods services contrast users actively seeking items purchase might appreciate advertising particular targeted ads another important aspect improving security online advertising subjects users higher risk infecting devices computer viruses surfing pornography websites high-profile case malware distributed advertisements provided youtube malicious customer google doubleclick august 2015 0-day exploit firefox browser discovered advertisement website forbes required users disable ad blocking viewing website users immediately served pop-under malware australian signals directorate recommends individuals organizations block advertisements improve information security posture mitigate potential malvertising attacks machine compromise information security firm webroot also note employing ad blockers provide effective countermeasures malvertising campaigns less technically-sophisticated computer users ad blocking also save money user user personal time worth one dollar per minute unsolicited advertising adds extra minute time user requires reading webpage i.e user must manually identify ads ads click close use techniques either deal tax user intellectual focus way user effectively lost one dollar time order deal ads might generate fractional pennies display-ad revenue website owner problem lost time rapidly spiral control malware accompanies ads ad blocking also reduces page load time saves bandwidth users users pay total transferred bandwidth capped pay-for-usage connections including mobile users worldwide direct financial benefit filtering ad loaded analysis 200 popular news sites ranked alexa 2015 showed mozilla firefox tracking protection lead 39 reduction data usage 44 median reduction page load time according research performed new york times ad blockers reduced data consumption sped load time half 50 news sites including journalists concluded visiting home page boston.com site ad data study every day month would cost equivalent 9.50 data usage ads streaming audio video even presented user interface rapidly consume gigabytes transfer especially faster 4g connection even fixed connections often subject usage limits especially faster connections 100mbit/s quickly saturate network filled streaming media known problem web browsers including firefox restoring sessions often plays multiple embedded ads however annoyance easily averted simply setting web browser clear cookies browsing-history information time browser software closed another preventive option use script blocker enables user disable scripts selectively re-enable certain scripts desired order determine role script user thus quickly learn scripts truly necessary standpoint webpage functionality consequently sources scripts undesirable insight helpful visiting websites general thus precisely controlling scripts run webpage viewed user retains full control happens his/her computer cpu computer screen use mobile desktop ad blocking software designed remove traditional advertising grew 41 worldwide 48 u.s. q2 2014 q2 2015 q2 2015 45 million americans using ad blockers survey research study released q2 2016 metafacts reported 72 million americans 12.8 million adults uk 13.2 million adults france using ad blockers pcs smartphones tablet computers march 2016 internet advertising bureau reported uk adblocking already 22 among people 18 years old one method filtering simply block prevent autoplay flash animation image loading microsoft windows audio video files done browsers easily also improves security privacy crude technological method refined numerous browser extensions every web browser handles task differently general one alters options preferences application extensions filter specific media types additional add-on usually required differentiate ads non-ads using technology wanted unwanted ads behaviors advanced ad blocking filter software allow fine-grained control advertisements features blacklists whitelists regular expression filters certain security features also effect disabling ads antivirus software act ad blocker filtering intermediaries isp providers national governments increasingly common 2015 many web browsers block unsolicited pop-up ads automatically current versions konqueror internet explorer also include content filtering support content filtering added firefox chromium-based browsers opera safari browsers extensions adblock adblock plus ublock origin number sources provide regularly updated filter lists adblock plus provided german software house eyeo gmbh included freeware browser maxthon people republic china default another method filtering advertisements uses cascading style sheets css rules hide specific html xhtml elements beginning 2018 google confirmed built-in ad blocker chrome/chromium browsers would go live 15th february ad blocker blocks certain ads specified better ads standard defined coalition better ads® google board member built-in ad blocking mechanism disputed could unfairly benefit google advertising number external software applications offer ad filtering primary additional feature traditional solution customize http proxy web proxy filter content programs work caching filtering content displayed user browser provides opportunity remove ads also content may offensive inappropriate even malicious drive-by download popular proxy software blocks content effectively include netnanny privoxy squid content-control software main advantage method freedom implementation limitations browser working techniques centralization control proxy used many users proxies good filtering ads several limitations compared browser-based solutions proxies difficult filter transport layer security ssl codice_1 traffic full webpage context available filter well proxies find difficult filter javascript-generated ad content operating systems even aware domain name system dns still offer backward compatibility locally administered list foreign hosts configuration historical reasons stored flat text file default contains hostnames associated ip addresses editing hosts file simple effective dns clients read local hosts file querying remote dns server storing black-hole entries hosts file prevents browser accessing ad server manipulating name resolution ad server local nonexistent ip address codice_2 codice_3 typically used ipv4 addresses simple implement methods circumvented advertisers either hard-coding ip address server hosts ads turn worked around changing local routing table using example iptables blocking firewalls loading advertisements server serves main content blocking name resolution server would also block useful content site using dns sinkhole manipulating hosts file exploits fact operating systems store file ip address domain name pairs consulted browsers using dns server look domain name assigning loopback address known ad server user directs traffic intended reach ad server local machine virtual black hole /dev/null bit bucket advertising blocked using dns server configured block access domains hostnames known serve ads spoofing address users choose use already modified dns server set dedicated device raspberry pi manipulating dns widely employed method manipulate end user sees internet also deployed locally personal purposes china runs root dns eu considered google required google public dns used applications android devices accordingly dns addresses domains used advertising may extremely vulnerable broad form ad substitution whereby domain serves ads entirely swapped one serving local ads subset users especially likely countries notably russia india china advertisers often refuse pay clicks page views dns-level blocking domains non-commercial reasons already common china android apps run local vpn connection host filtering ability dns address without requiring root access approach allows adblocking app download adblocking host files use filter ad networks throughout device blokada dns66 adguard popular apps accomplish adblocking without root permission adblocking active local vpn turned completely stops vpn connection disconnected convenience makes easy access content blocked anti-adblock scripts approach optimizes battery usage reduces internet slowdown caused using external dns vpn adblocking needs overall less configuration devices adtrap use hardware block internet advertising based reviews adtrap device uses linux kernel running version privproxy block ads video streaming music streaming web browser another solution provided network-level ad blocking telcos israeli startup shine internet providers especially mobile operators frequently offer proxies designed reduce network traffic even targeted specifically ad filtering proxy-based arrangements block many types advertisements large bandwidth-consuming otherwise deemed unsuited specific internet connection target device many internet operators block form advertisements time injecting ads promoting services specials content providers argued widespread ad blocking results decreased revenue website sustained advertisements e-commerce-based businesses blocking detected argued since advertisers ultimately paying ads increase revenues eliminating ad blocking would dilute value per impression drive price advertising arguing like click fraud impressions served users use ad blockers little value advertisers consequently argue eliminating ad blocking would increase overall ad revenue content providers long run websites taken countermeasures ad blocking software attempting detect presence ad blockers informing users views outright preventing users accessing content unless disable ad blocking software whitelist website buy ad-removal pass several arguments supporting opposing assertion blocking ads wrong publisher companies taken steps protect rights conduct business according prevailing law suggested european union practice websites scanning ad blocking software may run afoul e-privacy directive claim validated iab europe guidelines released june 2016 stating indeed may legal issue ad blocker detection anti-blocking stakeholders tried refute seems safe assume publishers follow guidelines provided main publisher lobby iab joint effort announced iab sweden prior iab europe guideline matter never materialized would likely found european anti-competition laws august 2017 vendor counter-measures issued demand section 1201 u.s. digital millennium copyright act demand removal domain name associated service ad-blocking filter list vendor argued domain constituted component technological protection measure designed protect copyrighted work thus made violation anti-circumvention law frustrate access 2015 advertisers marketers look involve brands directly entertainment native advertising product placement also known brand integration embedded marketing example product placement would soft drink manufacturer pay reality tv show producer show cast host appear onscreen holding cans soft drink another common product placement automotive manufacturer give free cars producers tv show return show producer depicting characters using vehicles show digital publications turned customers help example guardian asking readers donations help offset falling advertising revenue according newspaper editor-in-chief katharine viner newspaper gets amount money membership paying readers advertising newspaper considered preventing readers accessing content usage ad-blocking software becomes widespread far keeps content accessible readers employ ad-blockers
[ 2945, 2182, 3462, 5254, 7304, 6797, 5524, 10270, 8224, 3490, 2213, 6186, 1708, 7983, 6576, 2611, 9908, 823, 11319, 1849, 3643, 2108, 444, 7739, 8639, 11461, 2887, 10057, 7885, 4310, 5078, 6747, 8923, 1501, 8413, 735, 3555, 1642, 877, 6513...
Test
5,537
9
Method_chaining:method chaining method chaining also known named parameter idiom common syntax invoking multiple method calls object-oriented programming languages method returns object allowing calls chained together single statement without requiring variables store intermediate results local variable declarations syntactic sugar method chaining eliminates extra variable intermediate step developer saved cognitive burden naming variable keeping variable mind method chaining referred producing train wreck due increase number methods come one another line occurs methods chained together similar syntax method cascading method call expression evaluates current object return value method cascading implemented using method chaining method return current object cascading key technique fluent interfaces since chaining widely implemented object-oriented languages cascading n't form cascading-by-chaining returning often referred simply chaining chaining cascading come smalltalk language chaining syntax semantic consequences namely requires methods return object implementing cascading via chaining must current object prevents return value used purpose returning error value common example iostream c++ example codice_1 returns left object allowing chaining compare equivalent another example javascript uses built-in methods array
[ 5059, 10435, 3462, 7175, 9416, 9225, 1034, 333, 9871, 337, 8499, 3990, 1210, 2011 ]
None
5,538
3
Vampire_Killer:vampire killer vampire killer platform-adventure video game released konami msx2 computer october 30 1986 parallel version original castlevania debuted month earlier famicom disk system japanese title however msx2 version localized first europe thus published without castlevania branding franchise would start using abroad 1987 nes version released north america neither vampire killer msx2 platform released like castlevania player controls vampire hunter simon belmont ventures dracula castle armed mystical whip inherited father order slay evil count vampire killer shares premise soundtrack characters locations original castlevania structure game play mechanics differ significantly nes counterpart like castlevania vampire killer consists 18 stages boss encounter end every third stage contrast linear level designs castlevania vampire killer features labyrinth-like stages requiring player seek exit next stage also skeleton key required unlock due hardware limitations msx2 vampire killer uses flip screens instead scrolling game played keyboard game controller items weapons obtained breaking candle stands certain walls like nes version also purchasing merchants hidden throughout castle unlocking treasure chests using keys simon default whip also replaced one four weapons chain whip throwing daggers ax cross latter two function like boomerang must retrieved return path player wishes preserve also four items simon carry similar sub-weapons nes version map shows current position location exit used three times pressing f2 holy water used jumping pressing left right mid-air hourglass temporarily paralyzes enemies pressing jumping one two types shields heart points used ammunition holy water hourglass requiring five hearts per use also currency merchants items provide auxiliary effects increasing decreasing prices items sold merchants temporary invulnerability increased walking speed jumping height health recovery defeating boss simon start next stage without previously-accumulated equipment aside number hearts map used already player starts game three lives way gain extra lives continues unless game played game master cartridge second slot playing game master also enable option select stage number lives start well ability skip screens
[ 8819, 11380, 10931, 9006 ]
Test
5,539
4
Hi-Tech_Crime_Enquiry_Cell:hi-tech crime enquiry cell hi-tech crime enquiry cell special unit kerala police kerala india began operations 5 may 2006 formed prevent detect defend serious organized high technology crimes unit organized purpose prevent investigate prosecute computer related crimes working government agencies private sector academic institutions foreign counterparts
[ 2558 ]
None
5,540
4
HackTool.Win32.HackAV:hacktool.win32.hackav hacktool.win32.hackav not-a-virus keygen hacktool win32/keygen microsoft malware protection center definition kaspersky labs program designed assist hacking programs often contain signatures potential malware dangerous interfere work pc used hacker get personal information user computer according microsoft malware protection center first known detection goes back july 16 2009 riskware able create license keys illegally downloaded non-registered software kind tool may appear differently depending software tool designed create key following security threats often found pcs related tools
[ 7809, 8, 1417, 1994, 1992, 10574, 9055, 7515, 4956, 127 ]
Validation
5,541
3
Zen_2:zen 2 zen 2 codename successor amd zen zen+ microarchitectures due fabricated 7 nanometer node tsmc product sampling planned late 2018 followed commercial release july 2019 powering third generation ryzen processors known ryzen 3000 mainstream desktop chips threadripper 3000 high-end desktop systems computex 2019 amd announced product release date july 7 2019 zen 2 expected bring increase instructions per clock zen nearly large jump excavator zen according userbenchmark.com translates 13 ipc uplift zen+ 2018 consumer electronics show ces amd confirmed zen 2 design complete however release announced 2018 leading analysts predict 2019 release date zen 2 planned include hardware mitigations spectre security vulnerability zen 2-based epyc server cpus codename rome use design multiple cpu dies eight total manufactured 7 nm process chiplets combined 14 nm i/o die mcm package 64 physical cores 128 total compute threads simultaneous multithreading supported per socket 2019 ces amd showed ryzen third-generation engineering sample contains one chiplet eight cores 16 threads lisa su also said expect eight cores final lineup computex 2019 amd revealed zen 2 matisse chips would feature 12 cores weeks later 16 core chip also revealed e3 2019 zen 2 significant departure physical design paradigm amd previous zen architectures zen zen+ zen 2 moves multi-chip module design i/o components cpu laid separate die separation benefits scalability manufacturability physical interfaces n't scale well shrinks process technology separation different die allows components manufactured using larger mature process node cpu dies cpu dies referred amd compact due move i/o components onto another die manufactured using smaller process fewer manufacturing defects larger monolithic die would exhibit addition central i/o die service multiple chiplets making easier construct processors large number cores zen 2 cpu chiplet houses 8 cores arranged two ccx 4 cores chiplets manufactured using tsmc 7 nanometer node 74 80 mm size chiplet 3.9 billion transistors 12 nm iod ~125 mm 2.09 billion transistors amount l3 cache doubled 32 mib core 8-core chiplet access 4 mib l3 compared 2 mib zen zen+ avx2 fully supported increase execution unit width 128-bit 256-bit multiple variants i/o die one manufactured globalfoundries 14 nanometer process another manufactured using company 12 nanometer process 14 nanometer dies features used epyc rome processors whereas 12 nm versions used consumer processors may 26 2019 amd announced six zen 2 based desktop processors included 6-core 8-core variants ryzen 5 ryzen 7 product lines well new ryzen 9 line includes company first 12-core 16-core mainstream desktop processors amd 2nd generation epyc processors known rome features 64 cores launched august 7 2019
[ 3586, 8322, 5380, 9092, 6151, 8327, 10375, 5645, 398, 7963, 2719, 11047, 1322, 2094, 1329, 7218, 10675, 833, 6978, 7234, 9541, 11080, 2764, 7247, 473, 9435, 7783, 1260, 1005, 5356, 9964, 1137, 2549, 3070 ]
None
5,542
4
XOFTspy_Portable_Anti-Spyware:xoftspy portable anti-spyware xoftspy portable anti-spyware proprietary application developed paretologic inc. microsoft windows computers anti-spyware program designed run usb drive protect users malicious threats software free download scan user must purchase license clean license valid clean multiple computers u3 usb drive portability useful situations computer heavily infected bogged sluggish accessing computer directly u3 device xoftspy portable removes malware items regardless computer infected unable download anti-spyware programs online xoftspy retired new product name digitalcare
[ 7983, 6786, 6797, 2151 ]
Test
5,543
4
Same-origin_policy:same-origin policy computing same-origin policy important concept web application security model policy web browser permits scripts contained first web page access data second web page web pages origin origin defined combination uri scheme host name port number policy prevents malicious script one page obtaining access sensitive data another web page page document object model mechanism bears particular significance modern web applications extensively depend http cookies maintain authenticated user sessions servers act based http cookie information reveal sensitive information take state-changing actions strict separation content provided unrelated sites must maintained client-side prevent loss data confidentiality integrity important remember same-origin policy applies scripts means resources images css dynamically-loaded scripts accessed across origins via corresponding html tags fonts notable exception cross site request forgery attacks take advantage fact origin policy apply html tags concept same-origin policy dates back netscape navigator 2 1995 policy originally designed protect access document object model since broadened protect sensitive parts global javascript object modern browsers implement form same-origin policy important security cornerstone policies required match exact specification often extended define roughly compatible security boundaries web technologies microsoft silverlight adobe flash adobe acrobat mechanisms direct dom manipulation xmlhttprequest algorithm used calculate origin uri specified rfc 6454 section 4 absolute uris origin triple protocol host port uri use hierarchical element naming authority see section 3.2 uri absolute uri globally unique identifier used two resources considered origin values exactly illustrate following table gives overview typical outcomes checks url nowiki http //www.example.com/dir/page.html /nowiki unlike browsers internet explorer include port calculation origin using security zone place same-origin policy helps protect sites use authenticated sessions following example illustrates potential security risk could arise without same-origin policy assume user visiting banking website n't log user goes another site malicious javascript code running background requests data banking site user still logged banking site malicious code could anything user could banking site example could get list user last transactions create new transaction etc browser send receive session cookies banking site based domain banking site user visiting malicious site would expect site visiting access banking session cookie true javascript direct access banking session cookie could still send receive requests banking site banking site session cookie script essentially user would even csrf protections banking site would effective circumstances same-origin policy restrictive posing problems large websites use multiple subdomains first number workarounds using fragment identifier codice_1 property used pass data documents residing different domains modern browsers support multiple techniques relaxing same-origin policy controlled manner two windows frames contain scripts set domain value same-origin policy relaxed two windows window interact example cooperating scripts documents loaded orders.example.com catalog.example.com might set document.domain properties “ example.com ” thereby making documents appear origin enabling document read properties setting property implicitly sets port null browsers interpret differently port 80 even unspecified port assure access allowed browser set document.domain property pages technique relaxing same-origin policy standardized name cross-origin resource sharing standard extends http new origin request header new access-control-allow-origin response header allows servers use header explicitly list origins may request file use wildcard allow file requested site browsers firefox 3.5 safari 4 internet explorer 10 use header allow cross-origin http requests xmlhttprequest would otherwise forbidden same-origin policy another technique cross-document messaging allows script one page pass textual messages script another page regardless script origins calling postmessage method window object asynchronously fires onmessage event window triggering user-defined event handlers script one page still directly access methods variables page communicate safely message-passing technique since html script elements allowed retrieve execute content domains page bypass same-origin policy receive json data different domain loading resource returns jsonp payload jsonp payloads consist internal json payload wrapped pre-defined function call script resource loaded browser designated callback function invoked process wrapped json payload modern browsers permit script connect websocket address without applying same-origin policy however recognize websocket uri used insert origin header request indicates origin script requesting connection ensure cross-site security websocket server must compare header data whitelist origins permitted receive reply behavior same-origin checks related mechanisms well-defined number corner cases pseudo-protocols clearly defined host name port associated urls file data etc. historically caused fair number security problems generally undesirable ability locally stored html file access files disk communicate site internet lastly certain types attacks dns rebinding server-side proxies permit host name check partly subverted make possible rogue web pages directly interact sites addresses true canonical origin impact attacks limited specific scenarios since browser still believes interacting attacker site therefore disclose third-party cookies sensitive information attacker even same-origin policy effect without relaxed cross-origin resource sharing certain cross-origin computer attacks performed webrtc used find internal ip address victim attempting connect cross-origin port responses read face same-origin policy javascript still make inferences whether port open closed checking onload/onerror event fires get timeout gives opportunities cross-origin portscanning javascript even fingerprint services cross-origin taking advantage default files example javascript loaded site evil.com attempts open file hxxp //127.0.0.1/images/jenkins.png onload event fires inferred victim runs jenkins computer way attacker find potentially vulnerable services example internal network even face same-origin policy service vulnerable cross-site request forgery even compromised
[ 10368, 7044, 3462, 1802, 7708, 7965, 3616, 2470, 8615, 11559, 4797, 6209, 8386, 5078, 5724, 4198, 9834, 115, 2169, 4095 ]
Train
5,544
3
Trailblazer_(video_game):trailblazer video game trailblazer video game requires player direct ball along series suspended passages released originally gremlin graphics zx spectrum commodore 64 atari 8-bit family amstrad cpc c16/plus/4 1986 also enhanced version amstrad cpc 3 disc ported amiga atari st 2005 port gizmondo handheld games console released game played either time trial arcade mode music background matches gameplay electronica genre races quite brief usually last 15 45 seconds special fields track let ball jump slow speed warp speed ball invert controls holes game reviewed 1990 dragon 158 hartley patricia kirk lesser role computers column part mastertronic mega pack 10 games previously released europe reviewers gave game 5 5 stars stating favorite disk racing cosmic causeway roads clock robot one really fun zzap 64 reviewers also enjoyed game thought excellent variation race game theme overall rating given 93 steve panak reviewing atari 8-bit version analog computing concluded game original arcade action wristbuster come pike long time one best two-player competition games 've seen
[ 10931, 9006 ]
Test
5,545
4
Sri_Lankan_cyber_security_community:sri lankan cyber security community cyber security information assurance community sri lanka diverse many stakeholders groups contributing support national information cyber security strategy following list stakeholders established information communication technology agency 2006 sri lanka computer emergency response team slcert functions incidentally government private company preview ministry digital infrastructure information technology providing services computer emergency response team finance sector computer security incident response team fincsirt specializes computer security relating banking financial industry sri lanka joint initiative central bank sri lanka slcert sri lankan bankers association national cyber security agency proposed draft cyber security bill techcert formed lk domain registry provides computer security incident response services
[ 10190 ]
None
5,546
1
SQLite:sqlite sqlite relational database management system rdbms contained c library contrast many database management systems sqlite client–server database engine rather embedded end program sqlite acid-compliant implements sql standard generally following postgresql syntax however sqlite uses dynamically weakly typed sql syntax guarantee domain integrity means one example insert string column defined integer sqlite attempt convert data formats appropriate string 123 integer case guarantee conversions store data as-is conversion possible sqlite popular choice embedded database software local/client storage application software web browsers arguably widely deployed database engine used today several widespread browsers operating systems embedded systems mobile phones among others sqlite bindings many programming languages unlike client–server database management systems sqlite engine standalone processes application program communicates instead sqlite library linked thus becomes integral part application program linking may static dynamic application program uses sqlite functionality simple function calls reduce latency database access function calls within single process efficient inter-process communication sqlite stores entire database definitions tables indices data single cross-platform file host machine implements simple design locking entire database file writing sqlite read operations multitasked though writes performed sequentially due server-less design sqlite applications require less configuration client-server databases sqlite called zero-conf require service management startup scripts access control based grant passwords access control handled means file system permissions given database file databases client-server systems use file system permissions give access database files daemon process another implication serverless design several processes may able write database file server-based databases several writers connect daemon able handle locks internally sqlite hand rely file-system locks less knowledge processes accessing database time therefore sqlite preferred choice write-intensive deployments however simple queries little concurrency sqlite performance profits avoiding overhead passing data another process sqlite uses postgresql reference platform would postgresql used make sense sql standard one major deviation exception primary keys sqlite enforce type checking type value dynamic strictly constrained schema although schema trigger conversion storing conversion potentially reversible sqlite strives follow postel rule d. richard hipp designed sqlite spring 2000 working general dynamics contract united states navy hipp designing software used damage-control system aboard guided missile destroyers originally used hp-ux ibm informix database back-end sqlite began tcl extension design goals sqlite allow program operated without installing database management system requiring database administrator hipp based syntax semantics postgresql 6.5 august 2000 version 1.0 sqlite released storage based gdbm gnu database manager sqlite 2.0 replaced gdbm custom b-tree implementation adding transaction capability sqlite 3.0 partially funded america online added internationalization manifest typing major improvements 2011 hipp announced plans add nosql interface managing documents expressed json sqlite databases develop unqlite embeddable document-oriented database sqlite implements sql-92 standard sql lacks features example partially provides triggers write views however provides instead triggers provide functionality provides complex queries still limited alter table function modify delete columns sqlite uses unusual type system sql-compatible dbms instead assigning type column sql database systems types assigned individual values language terms dynamically typed moreover weakly typed ways perl one insert string integer column although sqlite try convert string integer first column preferred type integer adds flexibility columns especially bound dynamically typed scripting language however technique portable sql products common criticism sqlite type system lacks data integrity mechanism provided statically typed columns products sqlite web site describes strict affinity mode feature yet added however implemented constraints like codice_1 tables normally include hidden rowid index column gives faster access database includes integer primary key column sqlite typically optimize treating alias rowid causing contents stored strictly typed 64-bit signed integer changing behavior somewhat like auto-incrementing column future versions sqlite may include command introspect whether column behavior like rowid differentiate columns weakly-typed non-autoincrementing integer primary keys sqlite full unicode function optional several computer processes threads may access database concurrently several read accesses satisfied parallel write access satisfied accesses currently serviced otherwise write access fails error code automatically retried configurable timeout expires concurrent access situation would change dealing temporary tables restriction relaxed version 3.7 write-ahead logging wal turned enabling concurrent reads writes sqlite version 3.7.4 first saw addition fts4 full text search module features enhancements older fts3 module fts4 allows users perform full text searches documents similar search engines search webpages version 3.8.2 added support creating tables without rowid may provide space performance improvements common table expressions support added sqlite version 3.8.3 2015 json1 extension new subtype interfaces sqlite version 3.9 introduced json content managing sqlite code hosted fossil distributed version control system built upon sqlite database standalone command-line program provided sqlite distribution used create database define tables insert change rows run queries manage sqlite database file also serves example writing applications use sqlite library sqlite uses automated regression testing prior release 2 million tests run part release verification starting august 10 2009 release sqlite 3.6.17 sqlite releases 100 branch test coverage one components code coverage tests test harnesses partially public domain partially proprietary sqlite included default large number programming languages provide bindings sqlite including
[ 9729, 9732, 5637, 11269, 3080, 6664, 1034, 2570, 2062, 8718, 3600, 8719, 7700, 9244, 9245, 11294, 5663, 8225, 546, 1578, 5165, 5677, 9263, 10286, 6709, 1594, 5691, 6718, 6212, 69, 8262, 9286, 11338, 4685, 8781, 10831, 3664, 1112, 8280, 60...
Validation
5,547
4
Cloudbleed:cloudbleed cloudbleed security bug discovered february 17 2017 affecting cloudflare reverse proxies caused edge servers run past end buffer return memory contained private information http cookies authentication tokens http post bodies sensitive data result data cloudflare customers leaked went cloudflare customers happened server memory particular moment data cached search engines discovery reported google project zero team tavis ormandy posted issue team issue tracker said informed cloudflare problem february 17 proof-of-concept attack got cloudflare server return private messages major dating sites full messages well-known chat service online password manager data frames adult video sites hotel bookings 're talking full https requests client ip addresses full responses cookies passwords keys data everything effects cloudbleed similar 2014 heartbleed bug allowing unauthorized third parties access data memory programs running web servers including data shielded tls extent cloudbleed also could impacted many users heartbleed since affected security content delivery service used close 2 million websites tavis ormandy first discover vulnerability immediately drew comparison heartbleed saying took every ounce strength call issue 'cloudbleed report thursday february 23 2017 cloudflare wrote post noting bug serious leaked memory could contain private information cached search engines also discovered evidence malicious exploits bug reports existence. br greatest period impact february 13 february 18 around 1 every 3,300,000 http requests cloudflare potentially resulting memory leakage ’ 0.00003 requests .cloudflare acknowledged memory could leaked early september 22 2016 company also stated one private keys used machine-to-machine encryption leaked turned underlying bug caused memory leak present ragel-based parser many years memory leaked way internal nginx buffers used introducing cf-html subtly changed buffering enabled leakage even though problems cf-html john graham-cumming cloudflare cto noted cloudflare clients uber okcupid n't directly informed leaks due security risks involved situation “ backdoor communication outside cloudflare — google search engines ” said graham-cumming also said unfortunately ancient piece software contained latent security problem problem showed process migrating away added team already begun testing software possible issues tavis ormandy initially stated really impressed cloudflare quick response dedicated cleaning unfortunate issue however ormandy pressed cloudflare additional information gave several excuses n't make sense sending draft severely downplays risk customers uber stated impact service limited uber spokesperson added handful session tokens involved since changed passwords exposed okcupid ceo elie seidman said cloudflare alerted us last night bug 've looking impact okcupid members initial investigation revealed minimal exposure determine users impacted promptly notify take action protect fitbit representative stated company investigating issue concerned users change passwords immediately many major news outlets advised consumers sites using cloudflare change passwords even accounts protected 2-factor authentication could risk passwords mobile apps could impacted researchers arbor networks alert suggested us truly safe response large-scale information leak update passwords web sites app-related services use every day ... pretty much inc. magazine cybersecurity columnist joseph steinberg however advised people change passwords stating current risk much smaller price paid increased 'cybersecurity fatigue leading much bigger problems future
[ 1024, 5636, 4117, 8726, 535, 9761, 4644, 4133, 1608, 3657, 8779, 4703, 8288, 8292, 10875, 3711, 8320, 5764, 2187, 4240, 1688, 2717, 9375, 3237, 9904, 9395, 8886, 3789, 5325, 4304, 4314, 9435, 4830, 3807, 5349, 1254, 10477, 9460, 7418, 895...
Train
5,548
3
Valis_II:valis ii sd style remake released japanese mega drive north american genesis syd valis like titles series valis ii side-scrolling platform game requires player navigate two-dimensional levels battling enemies jumping ledge ledge running player faces boss end level despite details gameplay varying versions versions share several similar features well mobile remake added new stages alternate costumes weapons time passes vecanti set rule next emperor rogles brother voiced hirotaka suzuoki wishes stamp trace former tyrant point murdering supporters rogles might furthermore bloodthirsty tendencies recognize yuko valis sword viable threats claim throne orders minions eliminate first chance thwart megas falls magical blade peace comes dream world yuko returns home resume otherwise ordinary human life telenet japan developed two main versions valis ii around time pc engine cd-rom² released first later published nec north america home computer version believed entered development earlier released pc-88 pc-98 msx sharp x68000 japan featured graphic cutscenes another port game released mega drive japan sd valis telenet genesis north america renovation products syd valis title features gameplay plot original character design changed super deformed sd style north american version game incorrectly identifies yūko syd reuses box art naritore sugoroku '92 front cover project egg released various emulated versions game windows along 2011 compilation complete plus came soundtrack cd figure pc engine also released sunsoft playstation store 2011 1993 cd valis visual collection contains cutscenes pc engine version valis ii valis ii generally positively received critics review scores pc engine turbografx-16 version included 74 games machine 76 italian edition computer video games 70 génération 4 92 joystick 75 tilt three five stars turboplay whose reviewer impressed game visuals music disappointed perceived low difficulty hand sd valis syd valis rated 36 consoles+ 56 joystick 63 joypad sega force bashed dull gameplay despite great levels enemies predicting even platform addicts play james scullion sega pro gave sd valis mediocre score 65 recommending saving money game retrospectively sebastian sponsel sega-16 scored 2 10 stating syd valis disappointment fans non-fans alike ... ’ like game created joke one producers ’ get released anyway
[ 8355, 11460, 10931, 9006 ]
Test
5,549
9
Scriptcase:scriptcase scriptcase rad development platform php applications web oriented installed server internet acts like platform developers allows use graphical interface directly web browser automatically generate codes developed netmake year 2000 used mac windows linux operating system using scriptcase php developers generate complete online applications scriptcaseis rapid web development tool aims reduce development time increase productivity developers need xamp like environment web server like apache incl php dabase like mysql browser desktop accessible via network internet develop applications hosting applications server needs webserver incl php database programs finally developed deployed scriptcase longer necessary run application scriptcase used create crud create read update delete applications also enables add custom code manage business rules validation scriptcase lets create forms queries php ranging simple forms forms high level complex elements manipulate data databases mysql postgresql sqlite interbase firebird access oracle ms sqlserver db2 sybase informix odbc connections permits development javascript methods used within ajax events create applications ajax set features services easy fast hand coding navigation pages sections automatic validation fields date currency zip code social security number among others generated reports exported ms word ms excel pdf printed complex sql statements used sub-select joins even stored procedures scriptcase allows users write php handle exceptions create complex validation scriptcase compatible rtl right left writing support right left writing prevalent arabic languages also possible create infrastructure menus login screen security system authentication create tabs group forms queries executed page platform development began 2000 since receiving regular updates addresses web application developers desktops mobiles two ways enables starting developers limited knowledge programming php java basic knowledge databases sql build applications reads updates data web databases also aims experienced developer scriptcase put lot focus business logic rather editing forms build database connections etc pricing model shift buying software till end 2016 lease service 2016 due publication ceo subscribers current users scriptcase nov 14th 2016 prices currently 400- 600 buying software depending many databases supported per developer platform development started 2000 since tool received periodic updates improvements -was sold customers beta mode -big changes interface -native support ajax -internationalization support -graphics flash -new implementations jquery support -focused editing field types creating option edit fields -the biggest change performance 5 times faster -integration paypal -multi-thread processing scriptcase consolidation one strongest tools bi business intelligence migrating features help end user make decisions made major changes grid application option end users create group within application based fields defined developer add totals create graphics addition new graphic application added simplify creation applications implemented new filter functionality dynamic summary grid applications created new graphic application support user-defined combined final graphics new refined filter restricting values according universe exists database group buttons new chart toolbar button editor comes important implementations business intelligence complete redesign charts grids abstracts – pivot tables dashboards significant improvements security pdf report module menu interface redesign development improvement performance php7 among implementations scriptcase still allows advanced settings generated applications meet requirements complex systems also documentation generator integrate whole team
[ 6850, 7523, 8644, 10340, 522, 5546, 9389, 7022, 7983, 10413, 8539, 8627, 119, 11030, 823, 3096, 5403 ]
None
5,550
1
Load_file:load file load file litigation community commonly referred file used import data coded captured extracted data esi processing database file used link images load files carry commands commanding software carry certain functions data found load files usually ascii text files delimited fields information load files may data documents imported document management software concordance summation may path directory images may reside software link images corresponding records database programs take one load file importing images another importing data others take one load file pieces information ocr search-able text considered data also imported database programs via load files though people prefer load ocr databases running separate command search find desired text commonly used databases corresponding file extensions summation dii csv concordance opt dat sanction sdt ipro lfp ringtail mdb db/textworks txt
[ 2688, 9481, 10505, 10258, 10518, 4376, 9112, 7968, 290, 1314, 7461, 8742, 5808, 10418, 9527, 3768, 3004, 9661, 9663, 4416, 2369, 5441, 11457, 8518, 72, 853, 2901, 9942, 9177, 987, 860, 9183, 5857, 11362, 10471, 8808, 6383, 9079, 2681, 946...
None
5,551
9
SYMPL:sympl sympl obsolete programming language developed control data corporation cdc use cdc 6000 series computer systems 1970s 1980s based subset cdcs version jovial alternative assembly language number important cdc software products implemented sympl including compilers libraries full-screen editor major subsystems sympl compiled imperative procedural language compared fortran day sympl supports simplifications compared jovial include fewer built-in data types recursive calls procedures codice_1 concept
[ 3960, 8262, 4998, 10089 ]
None
5,552
6
Encryption_layer_in_storage_stack:encryption layer storage stack a0kq 9t4x mf5y x32a rhns 0p92 aecx 5ed5 plurality terms used describe implementations disk encryption on-the-fly encryption otfe full disk encryption fde whole disk encryption filesystem-level encryption encrypted filesystem cryptographic filesystem etc refer encryption layer storage stack article describes techniques explains pros cons article reference software hardware implementing techniques see disk encryption software hardware describe cryptographic theory behind see disk encryption theory fully understand techniques listed first need consider stack software hardware computer storage subsystem let us give example stack pc hard disk hardware provides interface read write sectors using logical block addressing lba cylinder-head-sector chs address top software layer interprets partition table stored master boot record mbr represents single hard disk set logical disks top another software layer filesystem represent logical disk collection files organized directories top may software text editor interprets file list text lines layer stack provides interface using interface provided layer example lba-accessible disk logical disk allow read write sectors fixed size given sector number layers called sector-addressable filesystem allows read write data arbitrary length given name file offset inside file text editor allows delete insert characters text file similar communication protocol stack modularity provides great flexibility layer easily replaced another far provides interface example hard disk replaced flash memory rest stack stays unchanged also possible introduce additional layer provides interface layer change data along way example provide on-the-fly encryption decryption encryption layer integrated layer example encryption implemented hardware hard disk single logical disk encrypted file encrypted filesystem even text editor transparently encrypt data storing file terms listed beginning article refer encryption layer different positions unfortunately naming conventions different different speakers general every method data transparently encrypted write decrypted read called on-the-fly encryption otfe although prefer use name encryption sector-addressable layer full disk encryption fde whole disk encryption used refer encryption sector-addressable layer physical disk logical disk whereas others use denote encryption physical disk logical disk filesystem-level encryption cryptographic filesystem used refer filesystem selectively encrypt files stored whereas others distinguish terms use former denote general purpose filesystem supports encryption use latter denote filesystem specifically designed provide encryption uses filesystem store files since many cases people mistakenly assume collocutor assigns meaning terms lot arguments whether particular implementation provides particular feature example one contrasts “ full disk encryption ” “ filesystem-level encryption ” may say software package provides fde whereas opponent contrasts “ fde ” “ logical disk encryption ” “ disk partition encryption ” say package provide fde article explains getting argument important understand meaning speaker assigns terms
[ 672, 9762, 5797, 6309, 1801, 7794, 4563, 3572, 3382, 7229 ]
Test
5,553
7
Zuora:zuora zuora enterprise software company creates provides software businesses launch manage subscription-based services zuora ’ applications designed automate recurring billing collections quoting revenue recognition subscription metrics tien tzuo founder company served ceo since 2007 2007 k.v rao cheng zou engineers webex tien tzuo early executive salesforce founded zuora name company derives combination three surnames concept behind company cloud-based billings platform alleviate need online businesses develop billing systems march 16 2018 company filed initial public offering april 12 2018 zuora listed nyse ticker symbol zuo company generated 154 million offering entered market public company 1.4 billion valuation end april 2018 company valued 2 billion 2016 zuora launched subscription economy index tracks revenue growth subscription businesses comparing growth sales benchmarks index based data hundreds businesses zuora platform index updated twice year zuora hosts conference series called subscribed covering topics related subscription economy taking place various cities year may 20 2015 zuora acquired frontleaf launched z-insights combining information subscriber invoicing billing platform customer usage information 2017 zuora purchased leeyo software revenue recognition platform december 17 2007 zuora announced raised 6 million series funding zuora announced 15 million series b funding september 15 2008 20 million series c funding october 2010 36 million series funding november 4 2011 50 million series e funding september 5 2013 115 million series f funding march 11 2015 bringing total funding 250 million investors include benchmark capital greylock partners redpoint ventures index ventures shasta ventures vulcan capital next world capital private investors include founder ceo salesforce marc benioff former peoplesoft vice-chair founder co-ceo workday dave duffield zuora sells subscription management saas platform businesses utilizing subscription-service model zuora central platform lets companies keep track subscription payments billing collections pricing product catalogs accounting addition zuora central zuora four primary saas applications zuora billing recurring billing operations zuora revpro revenue automation zuora cpq sales quoting subscription businesses zuora collect payment collections zuora app marketplace zuora connect allows partners develop list apps built zuora central platform june 5 2018 zuora announced subscription order management designed help customers process renewals complex deals addresses shift subscription growth related acquiring new customers growth existing customers
[ 10090, 1259, 11646 ]
None
5,554
4
Cardkey:cardkey cardkey producer electronic access control products based simi valley california first company develop widely distribute electronic access control systems company original readers used cards made barium ferrite worked magnetically attracting repelling locking/unlocking cores within reader module mechanism cards primarily used fraternal organizations clubs bpoe elks others first develop wiegand cards readers magnetically based reliable require calibration used barium ferrite readers cards readers highly programmable used applications ranging adt american district telegraph government installations worldwide uk offices manchester reading sold systems companies british telecom shell bp main facility cardkey located nordhoff mason chatsworth additional location cozycroft chatsworth housed customer engineering singular engineering project pass system approximately 1978 division greer hydraulics inc. january 1999 bought johnson controls company whose founder invented electric room thermostat late 1800s
[]
Validation
5,555
2
Robert_J._Chassell:robert j. chassell robert bob chassell one founding directors free software foundation fsf 1985 board directors chassell also treasurer fsf left fsf become full-time speaker free software topics bob born 22 august 1946 bennington vt diagnosed progressive supranuclear palsy psp 2010 died result 30 june 2017 chassell authored several books including
[ 2050, 1028, 2180, 4230, 11654, 9865, 4493, 1939, 2332, 10012, 3744, 802, 3618, 4265, 11180, 6962, 2233, 9148, 10687, 8258, 10822, 5703, 5833, 4561, 8147, 1112, 3674, 2010, 7904, 8673, 9696, 10464, 3817, 9579, 1007, 8304, 1394, 8436, 3068, ...
Test
5,556
3
Match_Day_(series):match day series match day association football video game franchise created jon ritman 1984 1980s 8-bit home computer market following games part match day series games published ocean exception super match soccer
[ 325, 9006 ]
Test
5,557
2
GOFF:goff goff generalized object file format specification developed ibm zsystem mainframe computer supersede ibm os/360 object file format compensate weaknesses older format original ibm os/360 object file format developed 1964 new ibm system/360 mainframe computer format also used makers plug compatible workalike mainframes including univac 90/60 90/70 90/80 fujitsu b2800 format expanded add symbolic records expanded information modules plus support procedures functions names longer 8 characters helped provide enhanced information necessary today complicated programming languages advanced features objects properties methods unicode support virtual methods goff object file format developed ibm approximately 1995 means overcome problems note os/360 object file format simply superseded goff format deprecated still use assemblers language compilers language withstand limitations older format note article use term module refer name equivalent symbol used provide identifier piece code data external scope referenced module may refer subroutine function method property object class named routine identifier external particular scope referencing external name format similar os/360 object file format adds additional information use building applications similarly older os/360 format object file records divided 6 different record types added deleted altered goff records may fixed variable length minimum length using variable-length records 56 characters although records longer except module class names characters ebcdic character set unix-based systems must use fixed-length 80-byte records records fixed-length files shorter fixed length zero-filled distinguish goff records older os/360 format commands may present file first byte goff record always binary value x'03 commands must start character value least space x'40 next 2 bytes goff record indicate record type continuation version file format first 3 bytes known ptv field ptv field represents first 3 bytes every goff record hdr record required must first record esd record gives public name module main program subroutine procedure function property method object fortran common alternate entry point esd record public name must present file reference name made record case fixed-length records name requires continuation records following used adata associated data records used provide additional symbol information module replaced older sym records 360 object file format create adata record adata records appended end class order declared class names assigned adata records translated ibm programs converting binary value text appending name c_adata item numbered x'0033 would become text string c_adata0033 txt records specify machine code instructions data placed specific address location module note wherever length must specified record length value must include continuations record compression table used bytes 20-21 txt record nonzero r value used determine number times repeat string l value indicates length text repeated r times could used pre-initializing tables arrays blanks zero purpose useful express repeated data repeat count value note unlike number values stored goff file version release trans_date values numbers text characters instead binary normally compilers assemblers generate format record typically created binder text item character data binary information used rld records allow module show references address must relocated references specific locations external modules clarify module c program named basura issue call exit function terminate r_pointer address would esdid routine exit p_pointer would esdid basura len records used declare length module known time esd record created e.g one-pass compilers deferred-length element entry continued split end must last record module 'entry point used address beginning module used start point execution used either program non-executable data appearing start module common older assembly programmers older versions assembler much slower assemble data stored programs instructions specified module calls external module first run-time library initialize entry-point name specified fixed-length end record longer 54 bytes record also continued longer additional 80 bytes following continuation record used
[ 1922, 4712, 6664, 6921, 8524, 10508, 2672, 3410, 3443, 2804, 5492, 8502, 7607, 3960, 3386, 2045, 2942, 8959 ]
Test
5,558
1
Alexander_Street_Press:alexander street press alexander street press asp electronic academic database publisher founded may 2000 alexandria virginia stephen rhind-tutt president janice cronin cfo eileen lawrence vice president sales marketing january 2016 company grown 100 employees offices united states australia brazil china united kingdom june 2016 acquired proquest company first product north american women letters diaries collection 150,000 pages letters diaries women colonial times 1950s 2000 collaboration artfl project university chicago company began using semantic indexing techniques humanities databases created metadata elements gender age sexual orientation characters within plays author nationality birthplace deathplace well item written elements combined full-text search allow material analyzed new ways 2003 company began major partnership center historical study women gender state university new york publish women social movements united states 1600–2000 subsequently become leading site study women history november 2004 alexander street acquired principal assets classical international london new york-based publisher streaming music libraries led new range music publications including partnership smithsonian institution provide smithsonian global sound libraries african american song november 2005 alexander street acquired range religious products produced ad fontes including digital library classic protestant texts digital library catholic reformation october 2006 company acquired assets university music editions small microfilm publisher specializing publication scores journals musically oriented publications collections subsequently released part classical scores library late 2006 company began developing online collections video theatre video published april 2007 followed succession online streaming video collections using techniques semantic indexing initially developed textual databases early provider synchronized scrolling transcripts allow watcher read ahead 2010 midsummer american library association company advertised 9 streaming video collections spanning 9,000 individual video titles april 2007 alexander street acquired principal products harpweek publisher harper weekly lincoln civil war june 2009 alexander street press arcadia publishing launched research website college local history information around united states canada september 2010 alexander street acquired microtraining associates specialist producer distributor therapy counseling videos december 2010 company acquired filmakers library distributor issue based documentaries 2011 alexander street acquired documentary film distributor filmmakers library 2012 acquired principal assets asia pacific films november 2013 alexander street announced acquisition insight media new york-based vendor dvd streaming media bringing asp catalog 50,000 academic video titles one first largest independent surveys streaming video north american academic libraries deg farrelly arizona state university jane hutchison william paterson university alexander street emerged leading vendor used 60 sites insight media present 10 sites 2013 company launched series case study databases combine books audio video reports pamphlets primary sources first two engineering case studies online documented major accidents 20th century psychological experiments online documented seminal experiments humans 2015 company secured arrangement cbs publish episodes sixty minutes 1996 2014 also announced open access initiatives anthropology anthropology commons music open music library following june alexander street press acquired proquest renamed alexander street proquest company 2016 company principal products academic video online 50,000 academically oriented video titles music online collection 8.3 million tracks music together scores reference works 120 primary source collections offerings across curriculum 60,000 video titles materials made available using wide range business models including demand driven access-to-own eba pda subscriptions perpetual licenses
[ 10270 ]
Test
5,559
5
IP_Flow_Information_Export:ip flow information export internet protocol flow information export ipfix ietf protocol well name ietf working group defining protocol created based need common universal standard export internet protocol flow information routers probes devices used mediation systems accounting/billing systems network management systems facilitate services measurement accounting billing ipfix standard defines ip flow information formatted transferred exporter collector previously many data network operators relying cisco systems proprietary netflow technology traffic flow information export ipfix standards requirements outlined original rfc 3917 cisco netflow version 9 basis ipfix basic specifications ipfix documented rfc 7011 rfc 7015 rfc 5103 following figure shows typical architecture information flow ipfix architecture pool metering processes collects data packets one observation points optionally filters aggregates information packets exporter gathers observation points together observation domain sends information via ipfix protocol collector exporters collectors many-to-many relationship one exporter send data many collectors one collector receive data many exporters similar netflow protocol ipfix considers flowưởuoz number packets observed specific timeslot sharing number properties e.g source destination protocol using ipfix devices like routers inform central monitoring station view potentially larger network ipfix push protocol i.e sender periodically send ipfix messages configured receivers without interaction receiver actual makeup data ipfix messages great extent sender ipfix introduces makeup messages receiver help special templates sender also free use user-defined data types messages protocol freely extensible adapt different scenarios ipfix prefers stream control transmission protocol sctp transport layer protocol also allows use transmission control protocol tcp user datagram protocol udp simple information set sent via ipfix might look like information set would sent following ipfix message seen message contains ipfix header two ipfix sets one template set introduces build-up data set used well one data set contains actual data ipfix sent protocol keeps session state tcp sctp template set need retransmitted since buffered collectors since template set change time must retransmitted new session state established ipfix sent udp session-less protocol
[ 5472, 10055, 10924, 6993, 6834, 7860, 11413, 3006 ]
Test
5,560
1
LevelDB:leveldb leveldb open-source on-disk key-value store written google fellows jeffrey dean sanjay ghemawat inspired bigtable leveldb hosted github new bsd license ported variety unix-based systems macos windows android leveldb stores keys values arbitrary byte arrays data sorted key supports batching writes forward backward iteration compression data via google snappy compression library leveldb sql database like nosql dbm stores relational data model support sql queries also support indexes applications use leveldb library provide server command-line interface mariadb 10.0 comes storage engine allows users query leveldb tables mariadb leveldb based concepts google bigtable database system table implementation bigtable system developed starting 2004 based different google internal code base leveldb code code base relies number google code libraries open sourced directly open sourcing code would difficult jeff dean sanjay ghemawat wanted create system resembling bigtable tablet stack minimal dependencies would suitable open sourcing also would suitable use chrome indexeddb implementation wrote leveldb starting early 2011 general design bigtable tablet stack sharing code leveldb used backend database google chrome indexeddb one supported backends riak additionally bitcoin core go-ethereum stores blockchain metadata using leveldb database minecraft pocket edition uses modified version chunk entity data storage autodesk autocad 2016 also uses leveldb google provided benchmarks comparing leveldb performance sqlite kyoto cabinet different scenarios leveldb outperforms sqlite kyoto cabinet write operations sequential-order read operations leveldb also excels batch writes slower sqlite dealing large values currently published benchmarks updated sqlite configuration mistakes noted earlier version results updated benchmarks show leveldb also outperforms berkeley db tests also show openldap lightningdb much faster ~10 times scenarios read operations write types e.g batch synchronous writes see link almost equal rest test leveldb history database corruption bugs study 2014 found older file systems database could become corrupted crash power failure
[ 1156, 7816, 11017, 6797, 19, 2966, 2456, 10921, 5546, 10413, 10292, 9397, 1594, 2234, 6851, 11221, 3427, 8683, 5492 ]
Validation
5,561
4
Secure_transmission:secure transmission computer science secure transmission refers transfer data confidential proprietary information secure channel many secure transmission methods require type encryption common email encryption called pki order open encrypted file exchange keys done many infrastructures banks rely secure transmission protocols prevent catastrophic breach security secure transmissions put place prevent attacks arp spoofing general data loss software hardware implementations attempt detect prevent unauthorized transmission information computer systems organization outside may referred information leak detection prevention ildp information leak prevention ilp content monitoring filtering cmf extrusion prevention systems used connection methods ensure secure transmission data wep deprecated algorithm secure ieee 802.11 wireless networks wireless networks broadcast messages using radio susceptible eavesdropping wired networks introduced 1999 wep intended provide confidentiality comparable traditional wired network later system called wi-fi protected access wpa since developed provide stronger security transport layer security tls predecessor secure sockets layer ssl cryptographic protocols provide secure communications internet things web browsing e-mail internet faxing instant messaging data transfers slight differences ssl tls substantially
[ 3629, 10831, 10329, 10332, 6013, 2558, 10271 ]
None
5,562
2
Time_Sharing_Option:time sharing option time sharing option tso interactive time-sharing environment ibm mainframe operating systems including os/360 mvt os/vs2 svs mvs os/390 z/os time-sharing means many people access operating system concurrently unaware others also accessing operating system appears tso user user system tso commonly used mainframe system administrators programmers provides tso interacts users either line-by-line mode full screen menu-driven mode line-by-line mode user enters commands typing keyboard turn system interprets commands displays responses terminal screen mainframe interaction actually via ispf allows customized menu-driven interaction combination called tso/ispf tso also provide unix-style environment os/390 z/os via unix system services command shell without ispf tso commands embedded rexx execs clists run interactively batch tso eliminated need punch cards keypunch machine send card decks computer room read card reading machine originally introduced 1971 ibm considered time-sharing optional feature compared standard batch processing hence offered tso option os/360 mvt introduction mvs 1974 ibm made standard component top-end mainframe operating system tso/e time sharing option/extensions set extensions original tso tso/e base element z/os z/os tso extensions tso/e element os/390 licensed program mvs mvs/esa system products since z/os installations usually tso tso/e functions installed normal refer tso tso/e tso first released tso module names always prefix ikj plus second third letters associated pre-tso functional group iea original functional group supervisor hence tso module name ikjeaxxx ieb original functional group dataset utilities hence tso module name ikjebxxx etc. common run tso batch opposed interactively usual tso line-mode interactive commands also executed via job control language jcl running programs codice_1 codice_2 codice_3 supplying line commands file pointed codice_4 primary difference three programs handling return codes executed commands batch execution tso one way allow ibm mainframe application access db2 resources
[ 6529, 10883, 2181, 10508, 909, 7053, 15, 8077, 9361, 11024, 9468, 789, 5397, 6678, 11673, 9370, 6557, 3358, 3359, 421, 7848, 8879, 7217, 11442, 10803, 7477, 7733, 10040, 11450, 573, 2625, 4546, 1219, 8388, 11075, 6342, 8136, 1235, 7507, 2...
Validation
5,563
4
FireEye:fireeye fireeye publicly traded cybersecurity company headquartered milpitas california provides hardware software services investigate cybersecurity attacks protect malicious software analyze security risks fireeye founded 2004 initially focused developing virtual machines would download test internet traffic transferring corporate government network company diversified time part acquisitions 2014 acquired mandiant provides incident response services following identification security breach fireeye went public 2013 usatoday says fireeye called investigate high-profile attacks target jp morgan chase sony pictures anthem others yahoo finance says fireeye fastest-growing cyber security firm according deloitte fireeye founded 2004 ashar aziz former sun microsystems engineer received early investment cia investment arm in-q-tel 2009 fireeye first commercial product developed sold 2010 year fireeye expanded middle-east followed opening new offices asia pacific 2010 europe 2011 africa 2013 december 2012 founder aziz stepped ceo former mcafee ceo david dewalt appointed position dewalt recruited order prepare company initial public offering ipo following year fireeye raised additional 50 million venture capital bringing total funding 85 million late 2013 fireeye went public raising 300 million time fireeye growing rapidly 175 employees 2011 grew 900 june 2012 revenues multiplied eight-fold 2010 2012 however fireeye yet profitable due high operating costs research development expenses january 2014 fireeye acquired mandiant 1 billion mandiant private company founded 2004 kevin mandia provided incident response services event data security breach mandiant known investigating high-profile hacking groups acquisition fireeye would often identify security breach partner mandiant investigate hackers mandiant became subsidiary fireeye late 2014 fireeye initiated secondary offering selling another 1.1 billion shares order fund development wider range products shortly afterward fireeye acquired another data breach investigation company npulse approximately 60 million 2015 fireeye making 100 million annual revenue still unprofitable largely due research development spending january 2016 fireeye acquired isight partners 275 million isight threat intelligence company gathered information hacker groups cybersecurity risks followed acquisition invotas security automation company dewalt stepped ceo 2016 replaced mandiant ceo former fireeye president kevin mandia afterwards downsizing restructuring response lower-than-expected sales resulting layoff 300-400 employees afterwards profit revenue increased account shifts subscription model lower costs fireeye started sandboxing company sandboxing incoming network traffic opened within virtual machine test malicious software introduced network fireeye products diversified time part acquisitions 2017 fireeye transitioned primarily selling appliances software-as-a-service model fireeye sells technology products including network email endpoint security platform managing security operations centers called helix consulting services primarily based incident response threat intelligence products central management system cms consolidates management reporting data sharing web mps malware protection system email mps file mps malware analysis system mas single network-based appliance acting distribution hub malware security intelligence fireeye cloud crowd-sources dynamic threat intelligence dti detected individual fireeye mps appliances automatically distributes time sensitive zero-day intelligence globally subscribed customers frequent updates content updates include combination dti fireeye labs generated intelligence identified research efforts fireeye known uncovering high-profile hacking groups october/november 2009 fireeye participated effort take mega-d botnet also known ozdok march 16 2011 rustock botnet taken action microsoft us federal law enforcement agents fireeye university washington july 2012 fireeye involved analysis grum botnet command control servers located netherlands panama russia 2013 mandiant acquired fireeye uncovered multi-year espionage effort chinese hacking group called apt1 2014 fireeye labs team identified two new zero-day vulnerabilities – cve-2014-4148 cve-2014-4113 – part limited targeted attacks major corporations zero-days exploit windows kernel microsoft addressed vulnerabilities october 2014 security bulletin also 2014 fireeye provided information threat group calls fin4 fin4 appears conduct intrusions focused single objective obtaining access insider information capable making breaking stock prices public companies group targeted hundreds companies specifically targets emails c-level executives legal counsel regulatory risk compliance personnel individuals would regularly discuss confidential market-moving information also 2014 fireeye released report focused threat group refers apt28 apt28 focuses collecting intelligence would useful government specifically fireeye found since least 2007 apt28 targeting privileged information related governments militaries security organizations would likely benefit russian government 2015 fireeye confirmed existence least 14 router implants spread across four different countries ukraine philippines mexico india referred synful knock implant stealthy modification router ’ firmware image used maintain persistence within victim ’ network september 2015 fireeye obtained injunction security researcher attempting report vulnerabilities fireeye malware protection system 2015 fireeye uncovered attack exploiting two previously unknown vulnerabilities one microsoft office cve-2015-2545 another windows cve-2015-2546 attackers hid exploit within microsoft word document .docx appeared résumé combination two exploits grant fully privileged remote code execution vulnerabilities patched microsoft 2015 fireeye service team singapore uncovered phishing campaign exploiting adobe flash player zero-day vulnerability cve-2015-3113 adobe released patch vulnerability out-of-band security bulletin fireeye attributed activity china-based threat group tracks apt3 2016 fireeye announced tracking pair cybercriminals referred “ vendetta brothers. ” company said enterprising duo uses various strategies compromise point-of-sale systems steal payment card information sell underground marketplace “ vendetta world. ” mid-2016 fireeye released report impact 2015 agreement former u.s. president barack obama chinese president xi jinping neither government would “ conduct knowingly support cyber-enabled theft intellectual property ” economic advantage security firm reviewed activity 72 groups suspects operating china otherwise support chinese state interests determined mid-2014 overall decrease successful network compromises china-based groups organizations u.s. 25 countries 2016 fireeye announced identified several versions ics-focused malware – dubbed irongate – crafted manipulate specific industrial process running within simulated siemens control system environment although siemens product computer emergency readiness team productcert confirmed fireeye irongate viable operational siemens control systems irongate exploit vulnerabilities siemens products security firm said irongate invokes ics attack concepts first seen stuxnet may 8 2016 fireeye detected attack exploiting previously unknown vulnerability adobe flash player cve-2016-4117 security firm reported issue adobe product security incident response team psirt adobe released patch vulnerability four days later 2016 fireeye discovered widespread vulnerability affecting android devices permits local privilege escalation built-in user “ radio ” making attacker potentially perform activities viewing victim ’ sms database phone history fireeye reached qualcomm january 2016 subsequently worked qualcomm product security team address issue 2016 fireeye provided details fin6 cyber criminal group steals payment card data monetization targets predominately hospitality retail sectors group observed aggressively targeting compromising point-of-sale pos systems making millions payment card numbers later sold underground marketplace fireeye firm mandiant hired russia alfa bank locate information connections u.s. president donald trump servers also hired equifax determine source data breach cases mandiant find anything conclusive 2017 fireeye detected malicious microsoft office rtf documents leveraging previously undisclosed vulnerability cve-2017-0199 vulnerability allows malicious actor download execute visual basic script containing powershell commands user opens document containing embedded exploit fireeye shared details vulnerability microsoft coordinated public disclosure timed release patch microsoft address vulnerability 2018 fireeye helped facebook identify 652 fake accounts
[ 3843, 5764, 9862, 9863, 7441, 2325, 2717, 1954, 3235, 2090, 2733, 5886, 704, 9665, 8133, 10952, 9052, 3933, 1886, 8288, 7522, 1254, 5866, 10348, 1645, 4462, 7418, 763, 2558 ]
Test
5,564
9
ObjVlisp:objvlisp objvlisp 1984 object-oriented extension vlisp–vincennes lisp lisp dialect developed since 1971 university paris viii – vincennes noteworthy one earliest implementations concept metaclasses particular explicit opposed implicit metaclasses objvlisp model entity instance single class classes instances classes called metaclasses model allows extension static part ool i.e structural aspects objects considered implementation abstract data types objvlisp provided far flexible metaclass model provided earlier object-oriented languages especially smalltalk smalltalk-80 whenever new class created corresponding metaclass created automatically name independent metaclass created–metaclasses implicit rather explicit contrast objvlisp possible define named metaclasses defining class one must specify named metaclass instantiate explicit metaclass support objvlisp influenced provision capability common lisp object system objvlisp object model later implemented prolog produce objvprolog python converge implement meta-class system equivalent objvlisp
[ 8421, 8262, 8554, 9877, 10712 ]
Test
5,565
6
Common_filesystem_features:common filesystem features glossary common filesystem features table intention table provide at-a-glance list features specifications filesystem list names credited design filesystem specification include responsible writing implementation full non abbreviated name filesystem name operating system filesystem debuted partitioning scheme marker used identify partition formatted filesystem describe filesystem allocates isolates bad sectors describes filesystem allocates sectors in-use files describes subdirectories implemented lists characters legal within file directory names maximum number characters file directory name may contain maximum number files filesystem handle maximum size volume filesystem specification handle may differ maximum size operating system supports using given implementation filesystem type dates times filesystem support may include date file “ created ” volume change working normally file e.g opening closing saving modifying file date file last accessed access move open simple access also tripped anti-virus scanners windows system processes therefore caution used stating “ file last accessed user xxx ” “ file access ” date ntfs work date shown windows change file e.g notepad document data added would trip date modified date time related attributes modified may include acls file/directory name date time file last backed maximum year handled filesystem per specification lists basic file attributes available determines filesystems supports multiple data streams ntfs refers alternate data streams hpfs extended attributes hfs calls forks filesystem support real-time transparent compression decompression entire volume filesystem support real-time transparent encryption decryption entire volume filesystem support real-time transparent compression decompression individual files filesystem support real-time transparent encryption decryption individual files filesystem support multi-user access control lists acls
[ 2193, 8114 ]
Test
5,566
4
Timestamping_(computing):timestamping computing computing timestamping refers use electronic timestamp provide temporal order among set events timestamping techniques used variety computing fields network management computer security concurrency control instance heartbeat network uses timestamping monitor nodes high availability computer cluster timestamping computer files updating timestamp per-file metadata every time file modified makes possible use efficient build automation tools
[ 9762, 11684, 5482, 4274, 950, 7446, 2558 ]
Test
5,567
9
JRuby:jruby jruby implementation ruby programming language atop java virtual machine written largely java free software released three-way epl/gpl/lgpl license jruby tightly integrated java allow embedding interpreter java application full two-way access java ruby code similar jython python language jruby lead developers charles oliver nutter thomas enebo many current past contributors including ola bini nick sieger september 2006 sun microsystems hired enebo nutter work jruby full-time june 2007 thoughtworks hired ola bini work ruby jruby july 2009 jruby developers left sun continue jruby development engine yard may 2012 nutter enebo left engine yard work jruby red hat jruby originally created jan arne petersen 2001 time several years following code direct port ruby 1.6 c code release ruby 1.8.6 effort began update jruby 1.8.6 features semantics since 2001 several contributors assisted project leading current core team around six members jruby 1.1 added just-in-time compilation ahead-of-time compilation modes jruby already faster cases then-current ruby 1.8.7 reference implementation jruby packages available platforms fedora 9 among first include standard package jruby 1.1.1 july 2009 core jruby developers sun microsystems charles oliver nutter thomas enebo nick sieger joined engine yard continue jruby development may 2012 nutter enebo left engine yard work jruby red hat jruby supported compatibility ruby mri versions 1.6 1.9.3 jruby 1.0 supported ruby 1.8.6 jruby 1.4.0 updating compatibility ruby 1.8.7 jruby 1.6.0 added simultaneous support ruby 1.9.2 jruby 1.7.0 making ruby 1.9.3 default execution mode ruby 1.8.7 compatibility available via command-line flag jruby 9.0.0.0 added support ruby 2.2 jruby able run ruby rails web framework since version 0.9 may 2006 ability execute rubygems webrick since hiring two lead developers sun rails compatibility speed improved greatly jruby version 1.0 successfully passed nearly rails test cases since developers begun use jruby rails applications production environments february 27 2008 sun microsystems university tokyo announced joint-research project implement virtual machine capable executing one ruby jruby application one interpreter jsr 292 supporting dynamically typed languages javatm platform proposes sun open source project multi language virtual machine aims prototype jsr first working prototype developed patch openjdk announced made available end august 2008 jruby team implemented dynamic invocation codebase dynamic invocation initially shipped 1.1.5 release primitive form version 1.7.0 enabled default java 8 builds table presents releases present significant steps jruby history aside versions mainly fixed bugs improved performance performance improvements also shown table every release usually brought improvements since early 2006 current jruby core team endeavored move jruby beyond simple c port support better performance aid eventual compilation java bytecode support end team set ambitious goal able run ruby rails unmodified using jruby process achieving goal jruby test suite expanded extent team gained confidence correctness jruby result toward end 2006 beginning 2007 began commit much complicated redesigns refactorings jruby core subsystems jruby designed work mixed-mode virtual machine ruby code either interpreted directly just-in-time compiled runtime java bytecode ahead-of-time compiled java bytecode execution october 2007 interpreted mode supported ruby constructs full aot/jit compiler available since version 1.1 compiler design allows interpreted compiled code run side-by-side well decompilation reoptimize outputting generated bytecode java class files jruby built-in support rails rspec rake rubygems embeds ffi subsystem allow use c libraries bundled gems also allows launching interactive ruby shell irb ruby mri netbeans ruby pack available netbeans 6 allows ide development ruby jruby well ruby rails two implementations ruby longer included netbeans 7.0 later jruby similar standard ruby interpreter except written java jruby features concepts including object-oriented programming dynamic-typing ruby key difference jruby tightly integrated java called directly java programs java significant footing development web applications one powerful feature jruby ability invoke classes java platform one must first load jruby java support calling require 'java following example creates java jframe jlabel jruby also allows user call java code using ruby-like underscore method naming refer javabean properties attributes jruby easily called java using either jsr 223 scripting java 6 apache bean scripting framework according benchmarks jruby faster alternatives since implementations vary much code loaded execution different methods measuring speed lead biased interpretations performance advantages time takes java virtual machine load often excluded execution times calculating benchmarks jruby significant architectural advantage able leverage jvm threads without constrained global interpreter lock similarly rubinius therefore achieving full parallelism within process ruby mri achieve despite leveraging os threads real mongrel web server application tested 2007 jruby performance better ruby mri 1.8 java virtual machine instantiated 2007 benchmark ruby implementations jruby faster ruby mri 1.8 tests yarv outperformed april 2014 computer language benchmarks game jruby 1.7.4 typically performance ruby mri 2.1.0 uses memory
[ 3712, 4358, 7430, 7176, 9229, 910, 2191, 7695, 10771, 11670, 9245, 10526, 8609, 5031, 5677, 7983, 6067, 564, 4277, 9011, 5048, 5945, 6074, 10683, 1852, 572, 7485, 3519, 7487, 9665, 6338, 10684, 7750, 11208, 5578, 6860, 3920, 10193, 1363, ...
Test
5,568
4
Ticket_Granting_Ticket:ticket granting ticket computer security systems ticket granting ticket ticket get tickets tgt small encrypted identification file limited validity period authentication file granted user data traffic protection key distribution center kdc subsystem authentication services kerberos tgt file contains session key expiration date user ip address protects user man-in-the-middle attacks tgt used obtain service ticket ticket granting service tgs user granted access network services service ticket provided
[ 7, 4242, 3477, 2080, 2083, 9635, 2087, 3629, 4663, 8760, 5433, 10058, 6098, 8670, 6750, 2143, 2274, 6888, 1012, 2558, 4863 ]
None
5,569
9
Le_Lisp:le lisp le lisp also le_lisp le-lisp programming language dialect language lisp developed french institute research computer science automation inria implementation language large scale integration vlsi workstation designed direction jean vuillemin le lisp also run various incompatible platforms mostly running unix operating systems used project main goals language powerful post-maclisp version lisp would portable compatible extensible efficient jérôme chailloux led le lisp team working emmanuel st. james matthieu devin jean-marie hullot 1980 dialect historically noteworthy one first lisp implementations available apple ii ibm pc
[ 10752, 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 4633, 4122, 8226, 3119, 2105, 3132, 6717, 576, 7234, 8258, 8771, 3142, 8262, 1613, 9299, 10841, 3675, 7267, 2660, 7269, 8293, 2666, 5751, 7805, 9345, 1159, 9865, 6797, 9877, 5803, 22...
Test
5,570
9
PROSE_modeling_language:prose modeling language prose mathematical 4gl virtual machine established holistic modeling paradigm known synthetic calculus aka metacalculus successor slang/cue simulation optimization language developed trw systems introduced 1974 control data supercomputers first commercial language employ automatic differentiation ad optimized loop instruction-stack cdc 6600 cpu although prose rich block-structured procedural language focus blending simultaneous-variable mathematical systems kinds system models distinct operator templates automate solve added procedural syntax automated system problems considered holistic unknowns simultaneous could reduced formulation solve piecewise algebra manipulation e.g substitution solved wholes wholeness also pertained algorithmic determinacy mathematical closure made solution convergence possible certain principle corrupted numerical instability since holistic problem models could independently automated solved due closure could blended higher wholes nesting one inside another manner subroutines users could regard ordinary subroutines yet semantically mathematical blending considerably complex mechanics subroutines iterative solution engine attached problem model calling operator template program hierarchy numerical solution process engine would take control would call problem model subroutine iteratively returning calling template system problem solved maybe iterative model-subroutine calls engine would invoke automatic differentiation formulas model holarchy respect model input-unknowns arguments defined calling template additional mechanisms performed semantics accommodate ubiquitous nesting holistic models nested solution prediction e.g numerical integration solution algorithm addition model formulas would also automatically differentiated since differentiation propagated via chain rule throughout integration initial conditions boundary conditions differentiation boundary conditions respect initial conditions called fréchet derivatives would performed enabled routine solution boundary-value problems iterative shooting methods using newton-method engines course time propagated differentiation could also performed respect arbitrary parameters differential equations shape integrated functions parameters could solved unknowns nest holarchy integration process significant convenience overall problem formulation inner nested problem search outer problem also search e.g optimization partial derivatives produced respect inner-search unknowns converted partial derivatives outer search via differential-geometry coordinate transformation also iterative process involving higher order differentiation sometimes different independent variables yet extended iterative differential-arithmetic processes totally hidden user hardly significant modeling task ordinary subroutines calls involved fact iterative number kind iterations indefinite whole sub-problem solved also part higher problem natural call problem nest holon dynamic entity perfectly fitted theory arthur koestler coined term done original prose documentation years koestler theory new somewhat controversial term later used ken wilber ratified koestler holon concepts complete modeling paradigm consisted three classes holons distinguished operator templates three operator templates created dynamic holons encapsulating equations model subroutine hierarchy could contain nested holons model subroutines could contain operator templates encapsulating sub-problems holon holarchy solver algorithm engine could interchanged others holon class extended arithmetic automatic differentiation ability dynamically differentiate numerical integration gave rise unique mode holarchy modeling illustrated figure 1 example problem originally fortran application rand report algorithm used optimization boundary-value problem applications report also published textbook described quasilinearization alternative dynamic programming invented author richard bellman fortran program appendix two textbook contains five times amount code 25-line prose program entirely embedded white boxes visible syntax figure 1 significant modeling versus programming discussion fortran program contains 14 loops whereas prose program contains loops another point make program simplification dynamic memory management could taken granted user return holon calling operator template holon destroyed memory freed use application actually trivial amount code required state problem prose program small iterative solution methodology hood solver engines ellipses figure 1 models seldom need loops spreadsheets modeling tools n't even example problem provides full encapsulation holon paradigm single application three holon types employed optimization searching highest level holarchy correlation searching restricted subset optimization searching middle holon system dynamics simulation innermost holon another prose program anatomy illustrated figure 2 somewhat larger application optimization cantilevered wing structure maximize lift subject structure weight constraints case ten coordinate dimensions optimization unknowns searched outer holon solver two outer holons hidden coordinate system unknowns search engine solves engines require partial derivatives downstream variables dependent upon unknowns evaluated automatic differentiation arithmetic derivatives outer coordinate system must computed derivatives inner coordinate system inner search engine converged found local solution differential-geometry coordinate transformation applied wing problem figure 2 downstream subprograms shown including integral quadrature function subprograms include numerical integration system dynamics differential equations model automatic differentiation arithmetic includes differentiation integration algorithm simulation engine quadrature solver evaluate derivatives boundary end-point integrated curves conditions respect initial conditions calculation possible via formal symbolic differentiation feasible finite difference approximation automatic differentiation exact chain-rule propagation feasible figure 3 shows generalized architecture holon profile showing visible modeling syntax invisible semantics architecture characteristic 5-step iteration process holon calculus problem-solving unit mathematically associated coordinate system dynamically created operation template operator solver engine either numerical predictor case simulation search engine case correlation optimization operand model procedure may holarchy subordinated holons essence holon metaphoric computation container like spreadsheet allowing procedural looping like ordinary algebraic language yet purpose frame algebraic formulas represent higher mathematics e.g differential equations algebraic formulas variables rates figures 4-7 show different holon classes simulation correlation optimization reflect architecture separating modeling science equations algorithmic solver engines art numerical approximation mathematics mentioned holon computation container like spreadsheet encapsulates set input algebraic formulas unlike spreadsheet formulas parts irreducible whole solved together unit involving succession approximations iterations spreadsheet involves single pass formula calculations may therefore thought degenerate reduced holon one involves single-pass calculations holon model elevates encapsulated system algebraic formulas higher problem archetype relating simultaneous unknowns definable solution condition single pass set formulas iterative calculus hood required converge multiple-pass approximations solution condition holon automates one three system-problem archetypes emerged higher math distinct class solution methods applicable interchangeable operators methods operate input formulas calculations guide successive approximations holon solution problem archetypes easily precipitate formula collections represent modeling natural phenomena used building blocks synthesize whole computation programs holarchies sequential nested holons used together alphabet archetypal problems become topology higher math modeling within algebraic programming language containing special semantic glue methodologies propagate calculus influence collections holons holons combine form greater wholes via alphabetic combination holarchies also tend become problem archetypes often precipitate natural phenomena modeling examples boundary-value problems solved combination correlation simulation holons prose introduced pantheon interchangeable solvers named mythical gods three engine categories solvers applied different numerical methods three engine categories depending upon nesting context applied simulation solvers janus mercury minerva merlin pegasus could nested automatic differentiation contexts correlation optimization overloaded automatic-differentiation arithmetic thus hybrid versions janisis isis janus gemini merlin neptune introduced would work efficiently automatic differentiation mode ordinary arithmetic mode differentiation internally turned greatly speeded iterative searches solvers like ajax mars jove zeus jupiter iteratively called models many times non-differentation mode various modes non-derivative search sub-steps applied
[]
Test
5,571
7
HP_Autonomy:hp autonomy hp autonomy previously autonomy corporation plc multinational enterprise software company founded cambridge united kingdom 1996 originally autonomy specialised analysis large scale unstructured big data becoming uk largest successful software business 2010 used combination technologies born research university cambridge developed variety enterprise search knowledge management applications using adaptive pattern recognition techniques centered bayesian inference conjunction traditional methods maintained aggressively entrepreneurial marketing approach controls described rod iron said include zero tolerance firing weakest 5 sales force quarter cosseting best sales staff like rock stars autonomy acquired hewlett-packard hp october 2011 deal valued autonomy 11.7 billion £7.4 billion premium around 79 market price widely criticized absurdly high botched strategy shift chaotic attempt rapidly reposition hp enhance earnings expanding high-margin software services sector within year major culture clashes became apparent hp written 8.8 billion autonomy value hp claims resulted accounting improprieties misrepresentations disclosure failures previous management successful fraud case brought cfo sushovan hussain previous management turn accused hp textbook example defensive stalling conceal evidence prior knowledge gross mismanagement undermining company noting public awareness since 2009 financial reporting issues even hp cfo disagreed price paid external observers generally state small part write-off appears due accounting mis-statements hp overpaid businesses previously hp recruited robert youngjohns ex-microsoft president north america take hp autonomy september 2012 worked towards turnaround expanding information management analytics software business though company integrating hp software autonomy remains singular operational business 2017 hp sold autonomy assets part wider deal british software company micro focus autonomy founded cambridge england michael lynch david tabizel richard gaunt 1996 spin-off cambridge neurodynamics firm specializing computer-based finger print recognition autonomy floated 1998 nasdaq exchange share price approximately £0.30 height dot-com bubble peak share price £30 december 2005 autonomy acquired verity inc. one main competitors approximately us 500 million 2005 autonomy also acquired neurodynamics may 2007 exercising option buy stake technology start blinkx inc combining consumer division autonomy floated blinkx valuation 250 million july 2007 autonomy acquired zantaz email archiving litigation support company 375 million october 2007 autonomy acquired meridio holdings ltd uk company based northern ireland specialised records management software £20 million 28 may 2008 kainos extended partnership autonomy high-end information processing information risk management irm deliver information governance solutions customer base january 2009 autonomy acquired interwoven niche provider enterprise content management software 775 million interwoven became autonomy interwoven autonomy imanage 2009 paul morland leading analyst started raising concerns autonomy exaggerated performance claims june 2010 autonomy announced acquire information governance business ca technologies terms sale disclosed 5 may 2011 mercedes formula one team announced 8 million sponsorship deal autonomy 8 july 2010 tottenham hotspur fc announced two-year sponsorship deal autonomy premier league kit 2011–12 season spurs premier league shirt featured autonomy augmented reality technology aurasma 16 may 2011 autonomy acquired iron mountain digital pioneer e-discovery online backup solutions provider 380 million iron mountain incorporated 18 august 2011 hewlett-packard announced would purchase autonomy us 42.11 per share transaction unanimously approved boards directors hp autonomy autonomy board recommended shareholders accept offer 3 october 2011 hp closed deal announcing acquired around 87.3 shares around 10.2 billion valuing company around 11.7 billion total may 2012 mike lynch left role autonomy ceo significant drop revenue previous quarter september 2012 robert youngjohns appointed svp gm autonomy/information management business unit november 2012 hewlett-packard announced taking 8.8 billion accounting charge claiming serious accounting improprieties outright misrepresentations autonomy share price fell decades low news however mike lynch counter-alleged problems due hp running autonomy citing internecine warfare within organization serious fraud office united kingdom u.s. securities exchange commission joined fbi investigating potential anomalies however january 2015 sfo closed investigation chance successful prosecution low three lawsuits brought shareholders hp fall value hp shares august 2014 united states district court judge threw proposed settlement autonomy previous management argued would collusive intended divert scrutiny hp executives responsibility knowledge fee 48 million april 2018 autonomy ex-cfo sushovan hussain charged us found guilty accounting fraud evidence lynch charged fraud november 30 january 2014 company announced one partners kainos integrated hp idol 10.5 new version hp autonomy ’ information analytics engine kainos electronic medical record platform evolve 31 october 2015 autonomy software products divided hp inc hpq hewlett packard enterprise hpe result hewlett-packard co separation hp inc assigned ownership largely consisting autonomy content management software components including teamsite qfiniti qfiniti managed services mediabin optimost explore hewlett packard enterprise retains ownership remaining software 2 may 2016 opentext acquires hp teamsite hp mediabin hp qfiniti hp explore hp aurasma hp optimost hp inc 170 million 1 september 2017 merged micro focus hp autonomy products include intelligent data operating layer idol allows search processing text taken structured data unstructured human information—including e-mail mobile data—whether originates database audio video text files streams processing information idol referred autonomy meaning-based computing hp autonomy offerings include api platform building data rich applications ease use quick deploy enterprise search solution built onto ondemand api platform june 2013 hp announced platform analyzing finding meaning big data petabytes structured unstructured information also aims identify information needed placed low cost storage even dumped components platform include january 2014 hp released new version hp idol strengthens integration several key components platform expanding upon idol ’ analytics reliability ease use cmswire reported new release lot hood catapult idol firmly center big data fray autonomy business primary offices cambridge sunnyvale california well major offices uk us canada france japan australia singapore germany smaller offices india throughout europe latin america
[ 4864, 8229, 1638, 9031, 5384, 11100, 11465, 6765, 3214, 2258, 1304, 8216, 5756 ]
Test
5,572
5
Reverse_telnet:reverse telnet reverse telnet specialized application telnet server side connection reads writes data computer terminal line rs-232 serial port rather providing command shell host device typically reverse telnet implemented embedded device e.g terminal/console server ethernet network interface serial port use reverse telnet device ip-networked users use telnet access serially-connected devices past reverse telnet typically used connect modems external asynchronous devices today reverse telnet used mostly connecting console port router switch device client command line initiating reverse telnet connection might look like telnet 172.16.1.254 2002 example 172.16.1.254 ip address console device 2002 tcp port associated terminal line server
[ 11112, 1121, 5492, 7188 ]
Validation
5,573
4
Attribute-based_access_control:attribute-based access control attribute-based access control abac also known policy-based access control defines access control paradigm whereby access rights granted users use policies combine attributes together policies use type attributes user attributes resource attributes object environment attributes etc. model supports boolean logic rules contain statements making request resource action example requestor manager allow read/write access sensitive data unlike role-based access control rbac employs pre-defined roles carry specific set privileges associated subjects assigned key difference abac concept policies express complex boolean rule set evaluate many different attributes attribute values set-valued atomic-valued set-valued attributes contain one atomic value examples role project atomic-valued attributes contain one atomic value examples clearance sensitivity attributes compared static values one another thus enabling relation-based access control although concept existed many years abac considered next generation authorization model provides dynamic context-aware risk-intelligent access control resources allowing access control policies include specific attributes many different information systems defined resolve authorization achieve efficient regulatory compliance allowing enterprises flexibility implementations based existing infrastructures attribute-based access control sometimes referred policy-based access control pbac claims-based access control cbac microsoft-specific term key standards implement abac xacml alfa xacml abac seen abac comes recommended architecture follows attributes anything anyone tend fall 4 different categories functions grammatical function policies statements bring together attributes express happen allowed policies abac granting denying policies policies also local global written way override policies examples include abac many policies like cater many different scenarios technologies historically access control models included mandatory access control mac discretionary access control dac recently role-based access control rbac access control models user-centric take account additional parameters resource information relationship user requesting entity resource dynamic information e.g time day user ip abac tries address defining access control based attributes describe requesting entity user targeted object resource desired action view edit delete ... environmental contextual information access control said attribute-based one standard implements attribute- policy-based access control xacml extensible access control markup language xacml defines architecture policy language request response scheme handle attribute management user attribute assignment object attribute assignment environment attribute assignment left traditional iam tools databases directories companies including every branch united states military started using abac basic level abac uses ‘ if/then/and ’ model protect data rather assigning data user take information anywhere please give hacker ability swipe file us department commerce made mandatory practice adoption spreading throughout several governmental military agencies concept abac applied level technology stack enterprise infrastructure example abac used firewall server application database data layer use attributes bring additional context evaluate legitimacy request access inform decision grant deny access important consideration evaluating abac solutions understand potential overhead performance impact user experience expected granular controls higher overhead abac used apply attribute-based fine-grained authorization api methods functions instance banking api may expose approvetransaction transid method abac used secure call abac policy author write following flow would follows one key benefits abac authorization policies attributes defined technology neutral way means policies defined apis databases reused application space common applications benefit abac process flow one described api section applies security databases long specific database vendors oracle vpd ibm fgac microsoft rls means achieve fine-grained abac-like security using abac possible define policies apply across multiple databases called dynamic data masking example would data security typically goes one step database security applies control directly data element often referred data-centric security traditional relational databases abac policies control access data table column field cell sub-cell using logical controls filtering conditions masking based attributes attributes data user session tools based deliver greatest level flexibility dynamically granting/denying access specific data element big data distributed file systems hadoop abac applied data layer control access folder sub-folder file sub-file granular attribute-based access control also applied big data systems like hadoop policies similar used previously applied retrieving data data lakes windows server 2012 microsoft implemented abac approach controlling access files folders achieved dynamic access control lists dacl security descriptor definition language sddl sddl seen abac language uses metadata user claims file folder control access gartner improving-runtime-authorization-maturity
[ 1792, 8838, 3213, 8210, 10389, 1961, 4912, 2737, 10933, 3262, 3521, 210, 10580, 5077, 7260, 2013, 6750, 9958, 6381, 5624, 6651 ]
Test
5,574
4
Dorothy_Blum:dorothy blum dorothy toplitzky blum february 21 1924 – october 1980 american computer scientist cryptanalyst worked national security agency predecessors 1944 death 1980 dorothy toplitzky born 1924 new york city austro-hungarian immigrant parents graduating brooklyn college 1944 joined cryptologic unit u.s. army remained organization world war ii became united states army security agency later national security agency nsa married nsa mathematician joseph blum 1950 later son 1950s blum worked nsa internal organization tasked keep ing abreast latest advances field computing recommended computer technologies could adapted cryptanalysis communications intelligence wrote computer software nsa spearheaded effort teach nsa employees write cryptanalytic programs began using fortran programming language three years public release 1957 throughout 1960s 1970s blum continued work field computer science helping design nsa computer systems automate processes 1972 became chief nsa computer operations organization c7 woman time organization management hierarchy appointed chief plans project development organization t4 telecommunications computer services organization 1977 also involved women nsa win group blum died cancer october 1980 aged 56 internal award nsa named 2004 inducted nsa hall honor official nsa biography states 36-year career blum significantly changed way nsa cryptanalysis also elected one top 100 outstanding women federal government
[ 3960, 1941, 7887 ]
Test
5,575
4
Security_BSides:security bsides security bsides commonly referred bsides series loosely affiliated information security conferences co-founded mike dahn jack daniel chris nickerson 2009 due overwhelming number presentation submissions black hat usa 2009 rejected presentations presented smaller group individuals time conference format matured released enable individuals start bsides conferences three event styles structured unconference hybrid structured event follows traditional conference model often times happens tandem larger conferences black hat rsa etc attendees typically intermingle attend one events talks submitted local event ahead time selected scheduled prior start conference unconference event style completely attendee driven attendees appear predetermined time discuss ideas collaboratively agree upon schedule look like day talks get attention conversation get added schedule
[ 7449, 2275, 7899, 11455 ]
Validation
5,576
5
H.248:h.248 gateway control protocol megaco h.248 implementation media gateway control protocol architecture providing telecommunication services across converged internetwork consisting traditional public switched telephone network pstn modern packet networks internet h.248 designation recommendations developed itu telecommunication standardization sector itu-t megaco contraction media gateway control protocol used earliest specifications internet engineering task force ietf standard published march 2013 itu-t entitled h.248.1 gateway control protocol version 3 megaco/h.248 follows guidelines published rfc 2805 april 2000 entitled media gateway control protocol architecture requirements protocol performs functions media gateway control protocol mgcp however formal standard mgcp informational status using different syntax symbolic representation two protocols directly interoperable complementary h.323 session initiation protocol sip protocols h.248 result collaboration megaco working group internet engineering task force ietf international telecommunication union telecommunication study group 16 ietf originally published standard rfc 3015 superseded rfc 3525 term megaco ietf designation megaco combines concepts mgcp media device control protocol mdcp mgcp originated combination simple gateway control protocol sgcp internet protocol device control ipdc itu took responsibility protocol maintenance ietf reclassified publications historic rfc 5125 itu published three versions h.248 recent september 2005 h.248 encompasses base protocol specification h.248.1 many extensions defined throughout h.248 sub-series h.248/megaco due master-slave nature describe establishment calls across domains across media gateway controllers h.248/megaco used communication downward media gateways constitute complete system architecture requires protocols communication multiple mgcs device handles call control function referred intelligent media gateway controller device handles media referred relatively unintelligent media gateway h.248 defines protocol media gateway controllers control media gateways support multimedia streams across ip networks public switched telephone network pstn typically used providing voice internet protocol voip services like voice fax ip networks pstn entirely within ip networks types devices targeted control h.248/megaco low level control structure h.248 generally viewed complementary h.323 session initiation protocol sip media gateway controller mgc uses h.248/megaco manage media establishment control number media gateways mgs voip protocols sip h.323 used one communication controllers sip perspective combination mgc mgs treated together sip gateway h.248/megaco model describes connection model contains logical entities objects within media gateways mgs controlled media gateway controller main entities contexts terminations ip multimedia subsystem ims media gateway control function mgcf control media gateways mgw send receive call pstn circuit switched cs networks using h.248 mgcf uses sip messages interact call session control function cscf breakout gateway control function bgcf although modeling media gateway differs h.248/megaco compared mgcp similarity semantics commands two specifications almost one-to-one mapping commands megaco mgcp example create connection command mgcp equivalent add termination command megaco modify connection command mgcp equates modify termination command megaco delete connection command equates subtract termination command megaco h.248/megaco model complex media gateway control protocol mgcp model provides flexibility defining media control example mgcp call use endpoint mode conference manage stream mixing achieve fine grain control h.248/megaco managing media streams h.248/megaco model simplifies connection setup within mg entities outside mg simplifies mechanism media gateway controller mgc specify associated media streams well specify direction media flow h.248/megaco therefore able provide greater application level support mgcp example setting multi-party conference h.248 merely involves adding several terminations context case mgcp however mgc needs establish several connections special type endpoint called conference bridge following main differences megaco/h.248 mgcp
[ 7681, 7407, 2802, 5843, 8437, 3580, 10271 ]
Validation
5,577
7
Sqrrl:sqrrl sqrrl data inc. american company founded 2012 markets software big data analytics cyber security company roots united states intelligence community national security agency sqrrl involved creation actively contributes apache accumulo related apache projects sqrrl ’ primary product threat hunting platform designed active detection advanced persistent threats january 2018 sqrrl acquired amazon sqrrl ’ founders previously worked national security agency ceo co-founder oren falkowitz formerly cybercommand co-founder ely kahn former director us cybersecurity policy sqrrl platform relies open-source apache accumulo technology accumulo began development 2008 went open source 2011 sqrrl founded summer 2012 use accumulo cybersecurity sqrrl founded washington d.c. quickly moved cambridge massachusetts august 2012 sqrrl announced 2 million seed round led accomplice formerly atlas venture matrix partners october 2013 sqrrl received 5.2 million funding led accomplice matrix partners february 2015 sqrrl raised another 7.1 million funding linked data analysis toolkit january 24 2018 reported sqrrl acquired amazon would become part amazon web services sqrrl ’ main product visual cyber threat hunting platform combines technology link analysis user behavior analytics user entity asset event data combined behavior graph users navigate respond security incidents well search undetected threats sqrrl integrates security information event management siem systems ibm qradar platform also integrates machine learning risk-scoring sqrrl mentioned cyber security industry marketing sc mag ’ top innovator award 2015 2016 2017 cybersecurity excellence award new threat hunting category
[ 7816, 3433, 10539, 7887, 7248, 11343, 7124, 53, 8921, 3323, 9631 ]
Test
5,578
2
RubyGems:rubygems rubygems package manager ruby programming language provides standard format distributing ruby programs libraries self-contained format called gem tool designed easily manage installation gems server distributing created chad fowler jim weirich david alan black paul brannan richard kilmer rubyconf 2004 interface rubygems command-line tool called gem install manage libraries gems rubygems integrates ruby run-time loader help find load installed gems standardized library folders though possible use private rubygems repository public repository commonly used gem management public repository helps users find gems resolve dependencies install rubygems bundled standard ruby package ruby 1.9 development rubygems started november 2003 released public march 14 2004 pi day 2004 2010 default public repository gems moved http //gems.rubyforge.org http //rubygems.org still use also rubygems development moved github 2010 though rubygems existed since ruby 1.8 part standard ruby distribution ruby 1.9 previously compatibility rubygems ruby varied many versions rubygems almost fully incompatible many versions ruby versions key features unusable example ruby 1.9 came rubygems 1.3.7 standard distribution rubygems 1.4.x compatible ruby 1.9 meant updating rubygems ruby 1.9 possible rubygems 1.5.0 released 2011 two years first stable release ruby 1.9 compatibility issues led rapid development rubygems switching 4–6 week release schedule reflected 38 releases 2004 2010 117 releases 2011 2016 45 versions released 2013 highest number releases year rubygems every gem contains name version platform gems work ruby designed particular platform based cpu architecture operating-system type version gem consists code organization follows following structure gem called gem_name gems packages similar ebuilds contain package information along files install gems usually built .gemspec files yaml files containing information gems however ruby code may also build gems directly practice usually used rake codice_1 command used build upload download install gem packages rubygems similar apt-get portage yum npm functionality installation uninstallation listing installed gems listing available gems e.g create rdoc documentation gems adding trusted certificate download install gem search available gems e.g gem command may also used build maintain codice_5 codice_6 files build codice_6 codice_5 file since ruby gems run code application may lead various security issues due installation malicious gems creator malicious gems may able compromise user system server number methods developed counter security threat
[ 8068, 7430, 8966, 9229, 2191, 7695, 9487, 10771, 788, 1813, 8213, 10900, 8476, 9245, 8354, 5155, 4775, 4777, 6828, 7341, 7983, 304, 3120, 564, 4277, 2105, 5945, 5819, 1852, 190, 5567, 6338, 9671, 11208, 5067, 9932, 3918, 463, 5070, 3667, ...
Validation
5,579
4
Nick_Levay:nick levay nick levay also known rattle american computer security expert hacker president ngo-isac former chief security officer council foreign relations carbon black computer security company boston area 2008 2013 director technical operations information security center american progress public policy research organization rattle subject pioneering profile hacker culture published nashville tennessee 1999 2001 tom cross co-founded industrial memetics built memestreams web log early social networking web site rattle presented phreaknic annual hacker technology convention held nashville 2005 2011 2011 talk counter espionage strategy tactics
[ 2976, 4956, 2558, 8575 ]
Test
5,580
6
Global_Storage_Architecture:global storage architecture gsa global storage architecture distributed file system created ibm replace andrew file system dce distributed file system
[ 3826, 3323, 3898 ]
Test
5,581
5
Token_passing:token passing local area network token passing channel access method signal called token passed nodes authorize node communicate contrast polling access methods pre-defined master node well-known examples token ring arcnet range others including fddi fiber distributed data interface popular early mid 1990s token passing schemes degrade deterministically load key reason popular industrial control lans map manufacturing automation protocol advantage contention based channel access csma/cd early ethernet collisions eliminated channel bandwidth fully utilized without idle time demand heavy disadvantage even demand light station wishing transmit must wait token increasing latency types token passing schemes need explicitly send token systems process passing token implicit example channel access method used contention free time slots itu-t g.hn standard high-speed local area networking using existing home wires power lines phone lines coaxial cable
[ 6857, 7498, 4691, 2911, 4543 ]
Validation
5,582
9
QUIKSCRIPT:quikscript quikscript simulation language derived simscript based 20-gate
[ 5584, 8262, 5775 ]
Train
5,583
1
Orbada:orbada orbada free tool database developers sql developers administrators software includes many wizards special features help database administrator job using java jdbc drivers allows users connect multiple databases orbada provided dedicated plug-in databases oracle sqlite firebird hsqldb derbydb help syntax highlighting database browser profiler tool still developed additional plug-ins program distributed gnu general public license
[ 10340, 5546, 5612, 9389, 7983, 2901, 9177, 9471 ]
Test
5,584
9
SIMSCRIPT:simscript simscript free-form english-like general-purpose simulation language conceived harry markowitz bernard hausner rand corporation 1962 implemented fortran preprocessor ibm 7090 designed large discrete event simulations influenced simula though earlier versions released public domain simscript commercialized markowitz company california analysis center inc. caci produced proprietary versions simscript i.5 simscript ii.5 simscript ii.5 last pre-pc incarnation simscript one oldest computer simulation languages although military contractor caci released 1971 still enjoys wide use large-scale military air-traffic control simulations simscript iii release 4.0 available 2009 ran windows 7 sun os linux object-oriented features 1997 simscript iii already gui interface compiler latest version release 5 earlier versions already supported 64-bit processing pl/i implementation developed 1968-1969 based public domain version released rand corporation
[ 8262, 5896, 10568, 5582, 5775, 7186, 8502, 823, 3960, 10458 ]
None
5,585
9
Programming_language_theory:programming language theory programming language theory plt branch computer science deals design implementation analysis characterization classification programming languages individual features falls within discipline computer science depending affecting mathematics software engineering linguistics even cognitive science well-recognized branch computer science active research area results published numerous journals dedicated plt well general computer science engineering publications ways history programming language theory predates even development programming languages lambda calculus developed alonzo church stephen cole kleene 1930s considered world first programming language even though intended model computation rather means programmers describe algorithms computer system many modern functional programming languages described providing thin veneer lambda calculus many easily described terms first programming language invented plankalkül designed konrad zuse 1940s publicly known 1972 implemented 1998 first widely known successful high-level programming language fortran developed 1954 1957 team ibm researchers led john backus success fortran led formation committee scientists develop universal computer language result effort algol 58 separately john mccarthy mit developed lisp programming language based lambda calculus first language origins academia successful success initial efforts programming languages became active topic research 1960s beyond key events history programming language theory since several fields study either lie within programming language theory profound influence many considerable overlap addition plt makes use many branches mathematics including computability theory category theory set theory formal semantics formal specification behaviour computer programs programming languages three common approaches describe semantics meaning computer program denotational semantics operational semantics axiomatic semantics type theory study type systems tractable syntactic method proving absence certain program behaviors classifying phrases according kinds values compute many programming languages distinguished characteristics type systems program analysis general problem examining program determining key characteristics absence classes program errors program transformation process transforming program one form language another form comparative programming language analysis seeks classify programming languages different types based characteristics broad categories programming languages often known programming paradigms metaprogramming generation higher-order programs executed produce programs possibly different language subset original language result domain-specific languages languages constructed efficiently solve problems particular part domain compiler theory theory writing compilers generally translators programs translate program written one language another form actions compiler traditionally broken syntax analysis scanning parsing semantic analysis determining program optimization improving performance program indicated metric typically execution speed code generation generation output equivalent program target language often instruction set cpu runtime systems refers development programming language runtime environments components including virtual machines garbage collection foreign function interfaces conferences primary venue presenting research programming languages well known conferences include symposium principles programming languages popl programming language design implementation pldi international conference functional programming icfp international conference object oriented programming systems languages applications oopsla international conference architectural support programming languages operating systems asplos notable journals publish plt research include acm transactions programming languages systems toplas journal functional programming jfp journal functional logic programming higher-order symbolic computation
[ 5635, 4612, 10246, 9224, 3601, 2619, 2620, 4670, 8262, 9804, 2666, 3698, 9330, 9345, 8324, 10909, 4770, 6306, 10403, 3767, 6332, 3263, 4799, 9926, 9932, 731, 8926, 7394, 8421, 2283, 2798, 9969, 2294, 5880, 3323, 5373, 2304, 2817, 6406, 11...
Test